CompTIA Certmaster CE Security+ Domain 1.0
General Security Concepts Assessment
Save
Students also studied
Flashcard sets Study guides
CompTIA Certmaster CE Security+ D... Domain 2.0 Threats, Vulnerabilities, ... AWS CLF-C01
45 terms Teacher 22 terms Teacher 608 terms
maryjane_burnham Preview mauithedemi123 Preview WEEKEND025
In a cybersecurity operation A. Allowlists can specify approved software, hardware, and
where downtime is critical to its change types that are essential for the operation's functioning.
mission, a cybersecurity analyst D. Denylists can block unauthorized software, hardware, and
incorporates allowlists and change types that pose high risk to the operation's availability
denylists restrictions. The and security.
objective is to guarantee high
availability (HA) and safeguard
against potential security
threats. How would a
cybersecurity analyst utilize
these lists in this scenario?
(Select the two best options.)
How can a cybersecurity analyst C. Use version control to track changes in network diagrams and
effectively utilize version control configuration files.
to maintain a historical record of
changes and ensure security in
the organization's IT systems and
applications?
, A malicious actor initiates an D. Honeyfile
attack on a software
organization, believing it to have
successfully acquired sensitive
data. Unbeknownst to the
attacker, the organization has
deceived the attacker by
intentionally providing fake
sensitive information and has
now captured the attacker's
tactics and tools. What
deception technology did the
organization deploy to capture
the attacker's techniques and
tools?
A cyber technician reduces a B. Hardware Security Module (HSM)
computer's attack surface by
installing a cryptoprocessor that
a plug-in peripheral component
interconnect express (PCIe)
adaptor card can remove. What
type of cryptoprocessor can
support this requirement?
A corporation's IT department is A. Policy-driven access control
integrating a new framework
that permits, ascertains, and
applies various resources in
accordance with established
company policies. Which
principle should the department
incorporate?
The organization is B. Schedule the upgrade during nonworking hours to reduce the
implementing a significant impact on users.
software upgrade that
necessitates application restarts.
How can the cybersecurity
analyst ensure a smooth
transition without causing
extended downtime?
A security analyst wants to (C. Authenticating systems incorrect)
ensure that the privileges
granted to an individual align
with the role within the
organization. What is the primary
tool that the analyst should
implement?