Security Plus Sy0-201

5 Questions | Attempts: 506
Share

SettingsSettingsSettings
Security Plus Quizzes & Trivia

Here are the questions from the SY0-201 test bank. I noticed many of these questions are not industry standards, but its what Comptia wants.


Questions and Answers
  • 1. 

    Why do security researchers often use virtual machines?

    • A.

      To offer an environment where new network applications can be tested

    • B.

      To offer a secure virtual environment to conduct online deployments

    • C.

      To offer a virtual collaboration environment to discuss security research

    • D.

      To offer an environment where malware can be executed with minimal risk to equipment and software

    Correct Answer
    D. To offer an environment where malware can be executed with minimal risk to equipment and software
  • 2. 

    Virtualized applications, such as virtualized browsers, can protect the underlying operating system from which of the following?

    • A.

      Malware installation from suspects Internet sites

    • B.

      DDoS attacks against the underlying OS

    • C.

      Man—in—the—middle attacks

    • D.

      Phishing and span attacks

    Correct Answer
    A. Malware installation from suspects Internet sites
  • 3. 

    For the following items, which is a security limitation of virtualization technology?

    • A.

      A compromise of one instance will immediately compromise all instances.

    • B.

      It increases false positives on the NIDS.

    • C.

      Patch management becomes more time consuming.

    • D.

      If an attack occurs, it could potentially disrupt multiple servers.

    Correct Answer
    D. If an attack occurs, it could potentially disrupt multiple servers.
  • 4. 

    A company’s new employees are asked to sign a document that describes the methods of and purposes for accessing the company’ s IT systems. Which of the following BEST describes this document?

    • A.

      Privacy Act of 1974

    • B.

      Authorized Access Policy

    • C.

      Due diligence form

    • D.

      Acceptable Use Policy

    Correct Answer
    D. Acceptable Use Policy
  • 5. 

    What technology is able to isolate a host OS from some types of security threats?

    • A.

      Kiting

    • B.

      Virtualization

    • C.

      Cloning

    • D.

      Intrusion detection

    Correct Answer
    B. Virtualization

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jan 07, 2013
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 06, 2009
    Quiz Created by
    Rhalverson86
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.