100% tevredenheidsgarantie Direct beschikbaar na je betaling Lees online óf als PDF Geen vaste maandelijkse kosten
logo-home
WGA C178 CompTIA Security+ Pre course Study Guide Exam Questions and Verified Answers 2024/2025 €11,27
In winkelwagen

Tentamen (uitwerkingen)

WGA C178 CompTIA Security+ Pre course Study Guide Exam Questions and Verified Answers 2024/2025

 0 keer verkocht
  • Vak
  • WGU 178 CompTIA Security
  • Instelling
  • WGU 178 CompTIA Security

WGA C178 CompTIA Security+ Pre course Study Guide Exam Questions and Verified Answers 2024/2025 ISO 27002 - correct answer ISO 27002 is an international standard for implementing and maintaining information security systems. ISO 27017 - correct answer ISO 27017 is an international standard fo...

[Meer zien]

Voorbeeld 3 van de 27  pagina's

  • 29 augustus 2024
  • 27
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • WGU 178 CompTIA Security
  • WGU 178 CompTIA Security
avatar-seller
WGA C178 CompTIA Security+ Pre course
Study Guide Exam Questions and Verified
Answers 2024/2025

ISO 27002 - correct answer ISO 27002 is an international standard for implementing
and maintaining information security systems.


ISO 27017 - correct answer ISO 27017 is an international standard for cloud security.


Open Web Application Security Project (OWASP) - correct answer


Best firewall to stop SYN attacks - correct answer SPI Stateful Packet Inspection
firewall


Test server - correct answer A test server should be identical to the production server.
This can be used for functional testing as well as security testing, prior to deploying the
application.


Kernel integrity subsystems - correct answer Kernel integrity subsystems are a form of
integrity measurement used to detect whether files have been accidentally or
maliciously altered, both remotely and locally; to appraise a file's measurement against
a "good" value stored as an extended attribute; and to enforce local file integrity. These
goals are complementary to Mandatory Access Control (MAC) protections provided by
Linux Security Modules.


NIST 800-82 - correct answer NIST 800-82 Guide to Industrial Control System (ICS)
Security," is specific to industrial control systems


Hardware security module (HSM) - correct answer A hardware security module (HSM)
is the most secure way to store private keys for the e-commerce server. An HSM is a
physical device that safeguards and manages digital keys.

,Staging server - correct answer implement a staging server so that code can be
deployed to an intermediate staging environment. This will allow testing of security
features, as well as checking to see that the code integrates with the entire system.


RTOS - correct answer A real-time operating system is a secure system used for
embedded devices.


Normalization - correct answer Normalization is the process of removing duplication or
redundant data from a database.


Stored procedures - correct answer Stored procedures are the best way to have
standardized SQL. Rather than programmers writing their own SQL commands, they
simply call the stored procedures that the database administrator creates.


Proper error handling - correct answer Proper error handling is the most fundamental
item to address in application development. Robust and thorough error handling will
mitigate many security risks.


Session tokens - correct answer Session tokens are used to authenticate sessions.
These can be effective against replay attacks and session hijacking.


Immutable server - correct answer An immutable server's configuration cannot be
changed.


Infrastructure as Code (iac) - correct answer Infrastructure as Code (iac) is the process
of managing and provisioning computer datacenters through machine-readable
definition files, rather than physical hardware configuration or interactive configuration
tools. Whether the data center(s) use physical machines or virtual machines, this is an
effective way to manage the data centers.


Waterfall method steps - correct answer requirements gathering, design,
implementation (also called coding), testing (also called verification), deployment, and
maintenance.

, What type of testing finds memory leaks? - correct answer static code analysis


Integration testing - correct answer When two or more components are tested
together, this is referred to as integration testing.


Regression testing - correct answer Regression testing is testing a system after a
change to ensure that the change did not cause any other problems


Soc - correct answer (soc) System on a Chip devices are complete self-contained
systems on a single chip. Therefore, having their own unique cryptographic keys is the
best way to implement authentication and security.


Vs Runtime Code - correct answer Compiled code runs faster and Runtime code can
be platform independent, as with Java. Compiled code is compiled for a specific
operating system


CASB - correct answer A cloud access security broker (CASB) is a software tool or
service that sits between an organization's on-premises network and a cloud provider's
infrastructure. A CASB acts as a gatekeeper, allowing the organization to extend the
reach of their security policies into the cloud.


Continuous monitoring - correct answer There are technologies that perform
continuous monitoring of a network. These systems can identify any issue as it is
occurring, or very soon thereafter.


Authentication headers - correct answer Authentication headers provide complete
packet integrity, authenticating the packet and the header. Authentication headers do
not provide any encryption at all


Network Tap - correct answer Network taps are analogous to phone taps. They are
completely passive methods of getting network traffic to a central location.

Dit zijn jouw voordelen als je samenvattingen koopt bij Stuvia:

Bewezen kwaliteit door reviews

Bewezen kwaliteit door reviews

Studenten hebben al meer dan 850.000 samenvattingen beoordeeld. Zo weet jij zeker dat je de beste keuze maakt!

In een paar klikken geregeld

In een paar klikken geregeld

Geen gedoe — betaal gewoon eenmalig met iDeal, creditcard of je Stuvia-tegoed en je bent klaar. Geen abonnement nodig.

Direct to-the-point

Direct to-the-point

Studenten maken samenvattingen voor studenten. Dat betekent: actuele inhoud waar jij écht wat aan hebt. Geen overbodige details!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper KieranKent55. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €11,27. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 68175 samenvattingen verkocht

Opgericht in 2010, al 15 jaar dé plek om samenvattingen te kopen

Begin nu gratis
€11,27
  • (0)
In winkelwagen
Toegevoegd