100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

CompTIA CASP+ Security Architecture Test 1 with 100% Correct answers

Beoordeling
-
Verkocht
-
Pagina's
7
Cijfer
A+
Geüpload op
26-10-2024
Geschreven in
2024/2025

What is the primary goal of security architecture? • A) To reduce the cost of security implementations • B) To ensure a secure environment for information systems • C) To comply with regulatory standards • Answer: B) To ensure a secure environment for information systems • Explanation: The primary goal of security architecture is to create a structured framework that protects the integrity, confidentiality, and availability of information systems.

Meer zien Lees minder
Instelling
CASP - Comptia Advanced Security Practitioner
Vak
CASP - Comptia Advanced Security Practitioner









Oeps! We kunnen je document nu niet laden. Probeer het nog eens of neem contact op met support.

Geschreven voor

Instelling
CASP - Comptia Advanced Security Practitioner
Vak
CASP - Comptia Advanced Security Practitioner

Documentinformatie

Geüpload op
26 oktober 2024
Aantal pagina's
7
Geschreven in
2024/2025
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

Voorbeeld van de inhoud

CompTIA CASP+ Security Architecture Test 1 with 100% Correct answers


1. What is the primary goal of security architecture?

• A) To reduce the cost of security implementations
• B) To ensure a secure environment for information systems
• C) To comply with regulatory standards
• Answer: B) To ensure a secure environment for information systems
• Explanation: The primary goal of security architecture is to create a structured framework that
protects the integrity, confidentiality, and availability of information systems.

2. Which of the following is a foundational principle of security architecture?

• A) Usability
• B) Confidentiality
• C) Affordability
• Answer: B) Confidentiality
• Explanation: Confidentiality is a core principle of security architecture, ensuring that sensitive
information is protected from unauthorized access.

3. What does the term "defense in depth" refer to?

• A) Using a single security measure to protect assets
• B) Implementing multiple layers of security controls
• C) Limiting access to critical systems
• Answer: B) Implementing multiple layers of security controls
• Explanation: Defense in depth is a strategy that employs multiple security measures to protect
assets, making it more difficult for an attacker to breach security.

4. Which framework is commonly used for developing an enterprise security
architecture?

• A) COBIT
• B) TOGAF
• C) NIST SP 800-53
• Answer: C) NIST SP 800-53
• Explanation: NIST SP 800-53 provides a comprehensive framework for selecting and specifying
security controls for federal information systems, widely adopted in enterprise security
architecture.

5. What is the purpose of an access control model?

• A) To define how users are authenticated
• B) To specify how access to resources is granted and managed
• C) To monitor network traffic for suspicious activity

, • Answer: B) To specify how access to resources is granted and managed
• Explanation: An access control model outlines the policies and procedures that dictate how
access to resources is determined and enforced.

6. In which access control model are access rights based on user roles?

• A) Mandatory Access Control (MAC)
• B) Role-Based Access Control (RBAC)
• C) Discretionary Access Control (DAC)
• Answer: B) Role-Based Access Control (RBAC)
• Explanation: RBAC assigns access rights based on user roles within an organization, allowing for
easier management of permissions.

7. What is the primary function of a firewall?

• A) To encrypt data
• B) To monitor network performance
• C) To control incoming and outgoing network traffic
• Answer: C) To control incoming and outgoing network traffic
• Explanation: A firewall acts as a barrier between a trusted internal network and untrusted
external networks, controlling the flow of traffic based on predefined security rules.

8. Which of the following describes "least privilege" in security?

• A) Users have unrestricted access to all resources
• B) Users are given only the access necessary to perform their job functions
• C) Access rights are granted based on seniority
• Answer: B) Users are given only the access necessary to perform their job functions
• Explanation: The principle of least privilege limits users' access rights to only those necessary for
their roles, reducing the risk of unauthorized access.

9. Which type of attack involves intercepting communication between two
parties?

• A) Man-in-the-middle attack
• B) Phishing
• C) Denial of Service (DoS)
• Answer: A) Man-in-the-middle attack
• Explanation: A man-in-the-middle attack occurs when an attacker secretly relays and possibly
alters the communication between two parties who believe they are directly communicating
with each other.

10. What is the primary purpose of data encryption?

• A) To improve system performance
• B) To protect data integrity
€7,80
Krijg toegang tot het volledige document:

100% tevredenheidsgarantie
Direct beschikbaar na je betaling
Lees online óf als PDF
Geen vaste maandelijkse kosten


Ook beschikbaar in voordeelbundel

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
UndisputedPundit University Of Southern California
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
17
Lid sinds
2 jaar
Aantal volgers
12
Documenten
969
Laatst verkocht
1 week geleden
Undisputed Pundit

Unlock your academic potential with Undisputed Pundit. You find all quality documents and package deals offered at very affordable prices. Your success is our priority.

3,3

3 beoordelingen

5
1
4
0
3
1
2
1
1
0

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Veelgestelde vragen