100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached
logo-home
WGA C178 CompTIA Security+ Pre course Study Guide Exam Questions and Verified Answers 2024/2025 $11.49   Add to cart

Exam (elaborations)

WGA C178 CompTIA Security+ Pre course Study Guide Exam Questions and Verified Answers 2024/2025

 3 views  0 purchase
  • Course
  • WGU 178 CompTIA Security
  • Institution
  • WGU 178 CompTIA Security

WGA C178 CompTIA Security+ Pre course Study Guide Exam Questions and Verified Answers 2024/2025 ISO 27002 - correct answer ISO 27002 is an international standard for implementing and maintaining information security systems. ISO 27017 - correct answer ISO 27017 is an international standard fo...

[Show more]

Preview 3 out of 27  pages

  • August 29, 2024
  • 27
  • 2024/2025
  • Exam (elaborations)
  • Questions & answers
  • iso 27002
  • iso 27017
  • WGU 178 CompTIA Security
  • WGU 178 CompTIA Security
avatar-seller
KieranKent55
WGA C178 CompTIA Security+ Pre course
Study Guide Exam Questions and Verified
Answers 2024/2025

ISO 27002 - correct answer ISO 27002 is an international standard for implementing
and maintaining information security systems.


ISO 27017 - correct answer ISO 27017 is an international standard for cloud security.


Open Web Application Security Project (OWASP) - correct answer


Best firewall to stop SYN attacks - correct answer SPI Stateful Packet Inspection
firewall


Test server - correct answer A test server should be identical to the production server.
This can be used for functional testing as well as security testing, prior to deploying the
application.


Kernel integrity subsystems - correct answer Kernel integrity subsystems are a form of
integrity measurement used to detect whether files have been accidentally or
maliciously altered, both remotely and locally; to appraise a file's measurement against
a "good" value stored as an extended attribute; and to enforce local file integrity. These
goals are complementary to Mandatory Access Control (MAC) protections provided by
Linux Security Modules.


NIST 800-82 - correct answer NIST 800-82 Guide to Industrial Control System (ICS)
Security," is specific to industrial control systems


Hardware security module (HSM) - correct answer A hardware security module (HSM)
is the most secure way to store private keys for the e-commerce server. An HSM is a
physical device that safeguards and manages digital keys.

,Staging server - correct answer implement a staging server so that code can be
deployed to an intermediate staging environment. This will allow testing of security
features, as well as checking to see that the code integrates with the entire system.


RTOS - correct answer A real-time operating system is a secure system used for
embedded devices.


Normalization - correct answer Normalization is the process of removing duplication or
redundant data from a database.


Stored procedures - correct answer Stored procedures are the best way to have
standardized SQL. Rather than programmers writing their own SQL commands, they
simply call the stored procedures that the database administrator creates.


Proper error handling - correct answer Proper error handling is the most fundamental
item to address in application development. Robust and thorough error handling will
mitigate many security risks.


Session tokens - correct answer Session tokens are used to authenticate sessions.
These can be effective against replay attacks and session hijacking.


Immutable server - correct answer An immutable server's configuration cannot be
changed.


Infrastructure as Code (iac) - correct answer Infrastructure as Code (iac) is the process
of managing and provisioning computer datacenters through machine-readable
definition files, rather than physical hardware configuration or interactive configuration
tools. Whether the data center(s) use physical machines or virtual machines, this is an
effective way to manage the data centers.


Waterfall method steps - correct answer requirements gathering, design,
implementation (also called coding), testing (also called verification), deployment, and
maintenance.

, What type of testing finds memory leaks? - correct answer static code analysis


Integration testing - correct answer When two or more components are tested
together, this is referred to as integration testing.


Regression testing - correct answer Regression testing is testing a system after a
change to ensure that the change did not cause any other problems


Soc - correct answer (soc) System on a Chip devices are complete self-contained
systems on a single chip. Therefore, having their own unique cryptographic keys is the
best way to implement authentication and security.


Vs Runtime Code - correct answer Compiled code runs faster and Runtime code can
be platform independent, as with Java. Compiled code is compiled for a specific
operating system


CASB - correct answer A cloud access security broker (CASB) is a software tool or
service that sits between an organization's on-premises network and a cloud provider's
infrastructure. A CASB acts as a gatekeeper, allowing the organization to extend the
reach of their security policies into the cloud.


Continuous monitoring - correct answer There are technologies that perform
continuous monitoring of a network. These systems can identify any issue as it is
occurring, or very soon thereafter.


Authentication headers - correct answer Authentication headers provide complete
packet integrity, authenticating the packet and the header. Authentication headers do
not provide any encryption at all


Network Tap - correct answer Network taps are analogous to phone taps. They are
completely passive methods of getting network traffic to a central location.

The benefits of buying summaries with Stuvia:

Guaranteed quality through customer reviews

Guaranteed quality through customer reviews

Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.

Quick and easy check-out

Quick and easy check-out

You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.

Focus on what matters

Focus on what matters

Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!

Frequently asked questions

What do I get when I buy this document?

You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.

Satisfaction guarantee: how does it work?

Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.

Who am I buying these notes from?

Stuvia is a marketplace, so you are not buying this document from us, but from seller KieranKent55. Stuvia facilitates payment to the seller.

Will I be stuck with a subscription?

No, you only buy these notes for $11.49. You're not tied to anything after your purchase.

Can Stuvia be trusted?

4.6 stars on Google & Trustpilot (+1000 reviews)

75323 documents were sold in the last 30 days

Founded in 2010, the go-to place to buy study notes for 14 years now

Start selling
$11.49
  • (0)
  Add to cart