CompTIA Sec+ SY0-701: Domain 3, Quiz 1
These flashcards cover key concepts such as Infrastructure as Code (IaC), serverless architecture, software-defined networking (SDN), and IoT device management in enterprise networks, focusing on efficiency, scalability, and security.
What is the primary advantage of Infrastructure as Code (IaC)?
a.Ease of deployment and scalability.
b.It reduces the cost of physical infrastructure.
c. It replaces the need for cloud solutions.
d.It provides a real-time operating system.
Ease of deployment and scalability.
IaC (Infrastructure as Code) allows for automated, consistent, and repeatable deployments, making scaling and deploying infrastructure easier.
Key Terms
What is the primary advantage of Infrastructure as Code (IaC)?
a.Ease of deployment and scalability.
b.It reduces the cost of physical infrastructure.
c. It replaces the need for cloud solutions.
d.It provides a real-time operating system.
Ease of deployment and scalability.
IaC (Infrastructure as Code) allows for automated, consistent, and repeatable de...
An organization is looking to reduce its physical infrastructure footprint. Which model should they consider?
a.Centralized network infrastructure.
b.Embedded systems.
c.Air-gapped systems.
d.Serverless architecture.
Serverless architecture.
Serverless computing allows developers to build and run applications without considering se...
What is the primary goal of software-defined networking (SDN)?
a. Reduce power consumption.
b. Provide real-time operating capabilities.
c. Ensure high availability.
d. Logical segmentation and management of network resources.
Logical segmentation and management of network resources.
SDN allows dynamic, programmatically created network confi...
What is the primary concern when dealing with IoT (Internet of Things) devices in an enterprise network?
a. Ease of deployment.
b. Patch availability and inability to patch.
c. Cost.
d. Scalability.
Patch availability and inability to patch.
IoT (Internet of Things) devices often have limited or no options for pat...
In the context of a network’s attack surface, what does device placement primarily influence?
a.Responsiveness of microservices.
b.Scalability of the network.
c. Device power consumption.
d.Exposure to potential threats.
Exposure to potential threats.
Proper device placement can minimize exposure to threats by ensuring devices are not ...
A company wants to ensure that if its intrusion detection system (IDS) fails, it does not prevent the flow of traffic. Which mode should they configure it in?
a. Fail-closed.
b. Tap/Monitor.
c. Inline.
d. Fail-open.
Fail-open.
Fail-open ensures that if the IDS fails, it will not stop the flow of traffic.
Related Flashcard Decks
Study Tips
- Press F to enter focus mode for distraction-free studying
- Review cards regularly to improve retention
- Try to recall the answer before flipping the card
- Share this deck with friends to study together
Term | Definition |
---|---|
What is the primary advantage of Infrastructure as Code (IaC)? a.Ease of deployment and scalability. | Ease of deployment and scalability. IaC (Infrastructure as Code) allows for automated, consistent, and repeatable deployments, making scaling and deploying infrastructure easier. |
An organization is looking to reduce its physical infrastructure footprint. Which model should they consider? a.Centralized network infrastructure. | Serverless architecture. Serverless computing allows developers to build and run applications without considering servers. It reduces the need for a large physical infrastructure footprint. |
What is the primary goal of software-defined networking (SDN)? a. Reduce power consumption. | Logical segmentation and management of network resources. SDN allows dynamic, programmatically created network configurations, enabling logical segmentation and efficient resource management. |
What is the primary concern when dealing with IoT (Internet of Things) devices in an enterprise network? a. Ease of deployment. | Patch availability and inability to patch. IoT (Internet of Things) devices often have limited or no options for patching, leading to potential vulnerabilities. |
In the context of a network’s attack surface, what does device placement primarily influence? a.Responsiveness of microservices. | Exposure to potential threats. Proper device placement can minimize exposure to threats by ensuring devices are not exposed to public networks unnecessarily. |
A company wants to ensure that if its intrusion detection system (IDS) fails, it does not prevent the flow of traffic. Which mode should they configure it in? a. Fail-closed. | Fail-open. Fail-open ensures that if the IDS fails, it will not stop the flow of traffic. |
What is the primary purpose of a Web Application Firewall (WAF)? a. Provide VPN connectivity. | Protect web applications by filtering and monitoring HTTP traffic. WAFs specifically protect web apps from various attacks by inspecting web traffic. |
Which protocol is predominantly used to secure VPN connections by providing encrypted transport mode capabilities? a.802.1X. | Internet protocol security (IPSec). IPSec can be used to secure Internet Protocol communication by authenticating and encrypting each IP packet. |
Which of the following describes a responsibility matrix in cloud security? a. A definition of organizational roles and responsibilities in cloud environments. | A definition of organizational roles and responsibilities in cloud environments. A responsibility matrix clarifies what the organization and the cloud provider are responsible for regarding security and management. |
What security consideration is paramount for air-gapped systems? a.Cost. | Physical isolation. Air-gapped systems are physically isolated from other networks to prevent unauthorized access and data breaches. |
Which of the following best describes containerization in security architecture? a. A method to physically isolate a network. | Packaging an application with its dependencies, libraries, and binaries in a single unit. Containerization ensures that the application will run uniformly across different environments by bundling it with all its requirements. |
In terms of enterprise infrastructure security, why is the placement of a jump server crucial? a.To balance network loads. | To manage secure administrative access and act as an intermediary. Jump servers provide a controlled means of accessing another network segment, often used for administrative tasks. |
Which of the following security zones is most likely to house publicly accessible services like a web server? a. Demilitarized zone (DMZ). | Demilitarized zone (DMZ). DMZ is a perimeter network segment that sits between an internal network and an external network, designed to house publicly accessible services. |
Why are Layer 7 firewalls considered more advanced than Layer 4 firewalls? a. They operate at the hardware level. | They inspect the actual content of data packets. Layer 7 firewalls operate at the application layer, allowing them to inspect, recognize, and act upon actual data payload. |
Why is a unified threat management (UTM) system advantageous for a small business? a.It acts as an intermediary system for administrators. | It combines multiple security features and services in one solution. UTMs are all-in-one security solutions combining firewall, anti-virus, and other security technologies, providing cost-effective security for small businesses. |