Back to AI Flashcard MakerInformation Technology /CompTIA Security+ 701 Practice Test 1

CompTIA Security+ 701 Practice Test 1

Information Technology72 CardsCreated 8 months ago

These flashcards focus on Zero Trust policy engines, directive controls, physical security controls, the AAA model, and the goal of authentication in security contexts.

In the context of Zero Trust, what is the role of the Policy Engine?

A. To enforce the security policies
B. To manage policies
C. To create implicit trust zones
D. To define the security policies

To define the security policies

The Policy Engine in Zero Trust focuses on defining the security policies.

Rate to track your progress ✦

Tap or swipe ↕ to flip
Swipe ←→Navigate
1/72

Key Terms

Term
Definition

In the context of Zero Trust, what is the role of the Policy Engine?

A. To enforce the security policies
B. To manage policies
C. To create implicit trust zones
D. To define the security policies

To define the security policies

The Policy Engine in Zero Trust focuses on defining the...

Which of the following is an example of a directive control?

A. Access control vestibule
B. Incident response plan
C. Security policy
D. Firewall

Security policy

A directive control as it guides actions and processes.

Which of the following is a physical security control?

A. Security policy
B. Incident response plan
C. Access badge
D. Firewall

Access badge

A physical control used to regulate access to a facility.

Which of the following best describes the ‘A’ in the AAA model?

A. Authorization
B. Adaptive identity
C. Accounting
D. Authentication

Authorization

Refers to granting or denying access to resources.

What type of security control is a security guard?

A. Deterrent
B. Operational
C. Technical
D. Managerial

Deterrent

A deterrent control as their presence can discourage potential attackers.

What is the main goal of authentication in the context of security?

A. To grant or deny access to resources
B. To discourage potential attackers
C. To provide proof of the origin of data
D. To verify the identity of a user or system

To verify the identity of a user or system

Authentication is the process of verifying t...