31. Fill in the blank: The security measure _____ requires a user to verify their identity in two or more ways to access a system or network.

  • baseline configuration
  • network log analysis
  • multifactor authentication (MFA)
  • password policy

32. Which of the following statements accurately describes port filtering?

  • A process performed by a VPN service that protects data by wrapping it in other data packets
  • A security technique that divides a network into segments
  • A security protocol that provides an encrypted tunnel for issuing commands from a remote server
  • A firewall function that blocks or allows certain port numbers in order to limit unwanted network traffic

33. A security team works to ensure that an issue in one area of the business does not spread to others and create more problems. They design subnets for each department, such as one for research and another for finance. What does this scenario describe?

  • Patch updating
  • Cloud hardening
  • Penetration testing
  • Network segmentation

34. How can a security professional confirm that no unverified changes have occurred within a cloud server?

  • Use port filtering to block or allow certain updates
  • Compare the server baseline image to the data in cloud servers 
  • Establish multifactor authentication (MFA)
  • Perform a penetration test

35. What are the purposes of performing a patch update for security hardening? Select all that apply.

  • Requiring a user to verify their identity to access a system or network.
  • Fixing known security vulnerabilities in a network or services.
  • Upgrading an operating system to the latest software version.
  • Preventing malicious actors from flooding a network.

36. Fill in the blank: Requiring employees to turn off their personal devices while in secure areas is an example of a _____ security hardening practice.

  • network-focused
  • virtual
  • cloud-based
  • physical

37. Fill in the blank: The security measure multi-factor authentication (MFA) requires a user to verify their identity _____ before accessing a system or network.

  • in two or more ways
  • within 60 seconds
  • at least once
  • every day

Leave a Reply