Chapter 5

What does the term ’Rights Management’ primarily refer to?

The use of technologies to provide copyright protection for copyrighted works

What is the difference between public and private subnets in a cloud-based network?

Public subnets have public IP addresses and are accessible via the internet, whereas private subnets have private IP addresses and aren’t directly accessible via the internet.

What can a cloud-based DLP policy be configured to do after detecting sensitive information?

Send an alert to a security administrator, block attempts to save the data, and quarantine the data

What actions does a data loss prevention (DLP) system perform in an organization?

All of the above

Searching for specific words or phrases in data traffic and taking action when it detects them

Examining outgoing data and detecting all types of unauthorized data transfers

Blocking the use of USB flash drives and controlling the use of removable media

What kind of memory does the Arduino microcontroller board contain?

Random-access memory (RAM) and read-only memory (ROM)

The Arduino microcontroller board, as described in the passage, contains the CPU, random access memory (RAM), and read-only memory (ROM).

Why is encrypting data considered a primary way to prevent the loss of confidentiality?

What is a Trusted Platform Module (TPM)?

Which of the following explains a key security challenge specific to embedded systems?

What is the main difference between COPE (corporate-owned, personally enabled) and CYOD (choose your own device) deployment models?

What is likely to happen if the cost of an embedded system device is minimized by the manufacturer?

What is a potential benefit of hardening a system?

What is the difference between the function of FPGA and Arduino in terms of configurability?

What are the consequences of implied trust in embedded systems?

What is a hybrid cloud in the context of cloud deployment models?

What is the function of RFID systems in mobile devices?

What is the function of the Permissive mode in the Security-Enhanced Linux (SELinux) policy?

What are the three steps in the use of secure baselines in organizations?

Which of the following is a key function of a next-generation Secure Web Gateway (SWG)?

What differentiates an application approved list from an application block list?

Which of the following limitations of embedded systems could potentially lead to security vulnerabilities?

What are the limitations of mobile devices when it comes to the use of passwords or personal identification numbers (PINs) in the context of Mobile Device Management (MDM) systems?

What does the ’remote wipe’ feature in Mobile Device Management (MDM) do?

What is the risk associated with the use of third-party app stores?

What is the main difference between Corporate-owned, personally enabled (COPE) model and the traditional corporate-owned model?

Which of the following features of Mobile Device Management (MDM) can be useful if a mobile phone is lost or stolen?

Which of the following methods is commonly used as a payment gateway allowing you to make payments simply by waving your phone in front of a reader at a retailer?

What is the main benefit of using cloud computing for heavily utilized systems and networks?

Which of the following is NOT true about Software as a Service (SaaS)?

What is the term for the process of modifying an Android device to give full administrative access to a user?

What does ’Range’ constraint in embedded systems refer to?

What is the primary difference between edge computing and fog computing based on the given text?

What type of wireless protocol do most mobile devices use to support the use of a Bluetooth headset for hands-free use?

What is meant by ’hardware root of trust’ in the context of TPM?

What is a characteristic of a non-persistent virtual desktop?

What is one of the primary risks associated with Multimedia Messaging Service (MMS) as stated in the text?

Which of the following statements best describes Rich Communication Services (RCS)?

Which of the following describes the limitations of 5G communication method for embedded systems and IoT devices?

What is the role of integrity measurements in baseline deviations?

What is the function of security groups within cloud-based resources according to CompTIA?

What is meant by ’High availability and high availability across zones’ in terms of cloud security controls?

What does ’Host elasticity’ in terms of virtual machines (VM) mean?

What is one key difference between a Managed Security Service Provider (MSSP) and a Managed Service Provider (MSP)?

In the context of mobile device management, what does ’context-aware authentication’ entail?

What is an example of the harm that can be caused by faults in the Industrial Control Systems (ICS)?

What is a primary benefit of utilizing an off-premises cloud service provider (CSP) solution?

What does the term ’Narrow-band’ generally refer to in the context of communication methods for embedded systems and IoT devices?

What does MDM tools do when the organization owns the device?

What does the term ’Guest’ refer to in the context of VMs and virtualization?

What is the purpose of a Virtual Private Cloud (VPC) endpoint within a virtual network?

What is a common use of an Industrial Control System (ICS) and Supervisory Control and Data Acquisition (SCADA) in the manufacturing and industrial sector?

What is the potential security threat associated with GPS tagging?

What does strong authentication methods in APIs prevent?

What is the process of copying an application package in the Application Packet Kit (APK) format to the device and then activating it?

Which of the following deployment models for mobile devices allows employees to use their corporate-owned devices for personal activities?

What is the main challenge that organizations face when implementing a BYOD (bring your own device) policy?

What is the purpose of Endpoint Detection and Response (EDR) tools in Endpoint Security?

What is the main difference between Wi-Fi Direct and a wireless ad hoc network?

What is the primary reason for an organization to potentially block the ability to switch carriers on a COPE device?

What is a key difference in traffic routing between a software-defined network (SDN) and traditional hardware routers?

What does dynamic resource allocation in cloud-based resources mean?

What does the term ’jailbreaking’ refer to?

What is a characteristic of Container Virtualization?

What is the main concept of Platform as a Service (PaaS)?

What are the primary issues associated with VM sprawl?

What is the function of a real-time operating system (RTOS) in the context of embedded systems?

What can MDM tools do to control applications on mobile devices?

What is the purpose of using secure baselines as a part of an organization’s security strategy?

Which cloud deployment model is only available for one specific organization?

What method of authentication discussed in chapter 2 does mobile device management (MDM) support?

Which type of cloud deployment model is provided by third-party companies and is available to anyone willing to pay for the services?

What does high availability across zones indicate in the context of cloud security controls?

What is the characteristic of Zigbee as a communication protocol?

What is a point-to-point connection in mobile devices?

What is the purpose of the screen-locking feature supported by most mobile devices?

What is the primary use of NFC (near field communication) in mobile devices?

What does ’Instance awareness’ refer to in the context of cloud-based resources?

What are two important benefits of using master images for baseline configurations?

What is the main purpose of a hypervisor in a virtualized system?

Which of the following are NOT common considerations developers should address to ensure APIs aren’t vulnerable to common exploits?

What does resource policies control in a cloud-based system?

What are the functions of a network-based Data Loss Prevention (DLP) system in preventing data exfiltration?

What is the purpose of data replication in cloud data security as mentioned in the CompTIA Security+ SY0-701 syllabus?

Why might an organization want to limit a mobile device’s ability to tether or use Wi-Fi Direct?

In the context of cloud security controls, what does segmentation refer to?

What is a private cloud?

What is the purpose of storage segmentation in mobile device management?

What is a VM escape attack?

What are some methods to protect the confidentiality of data within a database?

Why is using a master image beneficial for system deployments?

Which of the following practices increases the security risk to a mobile device?

What is a community cloud in terms of cloud deployment models?

What is a point-to-multipoint connection?

What network security mechanism is typically used to block unwanted traffic from reaching a SCADA system or an ICS, that is connected to the corporate network?

Which of the following correctly describes a USB (Universal Serial Bus) in the context of mobile devices?

Which of the following is a method to distribute updated version of firmware on Android devices?

What is the role of a hypervisor in a virtualization setup?

How does an organization typically protect the confidentiality of its data?

What is the benefit of adding Software-defined visibility (SDV) to an organization’s network?

Which of the following represents a potential risk associated with hardware features on mobile devices, and how MDM tools can be tailored to mitigate such risks?

Why is it often not possible to patch embedded systems?

Which communication method is typically used when transferring data over a cable rather than over the air?

How is replication beneficial for a virtual machine?

What does the use of a USB data blocker in the context of a security policy generally serve to prevent?

What is the role of a transit gateway in a cloud-based network?

What is an embedded system as defined by the CompTIA Security+ objectives?

What is monitored by SCADA systems in water treatment facilities?

What is the primary difference between the traditional Corporate-owned model and the Corporate-owned, personally enabled (COPE) model?

What are the primary goals of configuration management practices in an organization?

What is the purpose of using push notifications in Mobile Device Management (MDM)?

What is the primary purpose of taking a snapshot of a virtual machine?

What is the role of a Cloud Access Security Broker (CASB)?

What distinguishes Raspberry Pi from Arduino in terms of its functionality?

Which communication method has a significantly lower range compared to 4G and can be blocked by physical barriers such as trees, walls, and glass?

What are the shared responsibilities between a cloud service provider and a customer in IaaS, PaaS, SaaS models?

Which connection method is typically used by smartphones and tablets to connect to a high-speed digital transfer service that is provided by a cellular network?

Which of the following is not considered a constraint of embedded systems based on the provided text?

What does the term ’Anything as a Service’ (XaaS) refer to?

What is the process of ’Remediation’ in the context of secure baselines?

What does the term ’On-premises’ refer to in relation to organization’s resources?

Which of the following does not accurately describe a constraint faced by embedded systems?

What does encryption aid in when referring to Cloud Service Providers (CSPs)?

What is the role of authorization in the context of APIs?

Why might designers skip authentication when designing embedded systems?

What distinguishes a microservices API from a web services-based API in terms of its business tie-in?

Why do embedded systems often have weak defaults?

According to NIST SP 800-124, which of the following characteristics are NOT found in mobile devices?

What potential risk does Universal Serial Bus On-The-Go (USB OTG) cables pose to an organization’s information security?

Which of the following describes a technique used by organizations to create a virtual geographic boundary using mobile device’s GPS capabilities?

What does ’Host Scalability’ refer to in the context of virtual machines?

What are some common uses of Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) systems in the context of Energy?

What is the primary difference between a non-Opal-compliant SED and an Opal-compliant SED?

What is Bluetooth commonly used with in the context of mobile devices?

Which of the following is a common use of the supervisory control and data acquisition (SCADA) systems and ICS?

What function does geofencing perform in the context of mobile device security?

Which of the following best describes the main point regarding ’Implementing Secure Systems?’

What are Subscriber identity module (SIM) cards typically used for in the context of embedded systems and IoT devices?

Management within an organization might want to limit a mobile device’s connections to prevent certain security threats. What could be a potential threat if employees use tethering within the organization?

What does full device encryption provide in terms of mobile device security?

What is the role of a host in the context of virtualization?

What is the primary function of permissions in a cloud service provider’s system?

Which of the following best describes the risks associated with using Short Message Service (SMS) and Multimedia Messag Service (MMS)?

What does a customer have to do with a server provided via Infrastructure as a Service (IaaS)?

What is a field programmable gate array (FPGA) in the context of an embedded system?

What is a constraint of power in embedded systems?

Which among the following embedded systems does not use an operating system, but uses firmware for functionality?

What is the purpose of content management in mobile device management (MDM)?

What does it mean when a system or service is said to have high availability?

What does patch management mainly include?

Which of the following is not a common constraint of an embedded system?

What is the purpose of a CSP integrating auditing methods into the cloud-based resources?

What types of resources can access virtual desktop infrastructures (VDIs)?

What are the primary risks associated with text messaging services such as Short Message Service (SMS) and Multimedia Messaging Service (MMS)?

Which of the following defines the ’Enforcing mode’ in the context of Security-Enhanced Linux (SELinux) used by the security-enhanced Android (SEAndroid) security model?

Which type of network depends on the cellular provider and the device in use?

What is the role of transport level security in an API?

Which of the following statements regarding SEAndroid security model is NOT correct?

What is the major advantage of UEFI over BIOS?

What are the main characteristics of an on-premises cloud solution according to the text?

What does Infrastructure as code refer to?

What distinguishes the Cloud Security Alliance’s (CSA) Cloud Controls Matrix (CCM) from SP-800-53 Revision 5?

What does ’instance awareness’ in cloud security controls refer to?

What are two benefits of deploying systems using a master image?

What is the function of containerization in mobile device management?

What type of wireless technology is Infrared and how is it used?

Which of the following is NOT a way in which IoT (Internet of Things) technology is commonly used?

Which of the following is NOT true about Change Management Policy in IT?

What is the primary purpose of boot integrity processes implemented by many organizations?

According to the section ’Firewall Considerations’, which one is NOT a characteristic of cloud-based firewalls?

What does ’secrets management’ refers to in the context of cloud security controls?

What is a key difference between a hardware security module (HSM) and a TPM?

What is a System on a Chip (SoC) in the context of CompTIA Security+?

Last updated