Which of the following technologies can store multi-tenant data with different security requirements?
A. Data loss prevention
B. Trusted platform module
C. Hard drive encryption
D. Cloud computing
CompTIA exam questions
Which of the following technologies can store multi-tenant data with different security requirements?
A. Data loss prevention
B. Trusted platform module
C. Hard drive encryption
D. Cloud computing
Which of the following has a storage root key?
A. HSM
B. EFS
C. TPM
D. TKIP
Which of the following hardware based encryption devices is used as a part of multi-factor authentication to access a secured computing system?
A. Database encryption
B. USB encryption
C. Whole disk encryption
D. TPM
Which of the following tools will allow a technician to detect security-related TCP connection anomalies?
A. Logical token
B. Performance monitor
C. Public key infrastructure
D. Trusted platform module
A Security administrator wants to implement strong security on the company smart phones and terminal servers located in the data center. Drag and Drop the applicable controls to each asset type.
Instructions: Controls can be used multiple times and not all placeholders needs to be filled. When you have completed the simulation, Please select Done to submit.
Data on full disk encrypted drives using BitLocker is MOST secure from loss when combined with which of the following technologies?
A. USB authentication token
B. Filesystem access controls
C. Trusted platform module
D. Fingerprint reader
Which of the following BIOS level settings allow an administrator to view warnings on possible hardware level changes?
A. Drive lock
B. Intrusion detection
C. BIOS password
D. Trusted platform module
Which of the following is required in order for BitLocker to be enabled?
A. Drive encryption
B. Group Policy
C. Trusted platform module
D. Power-on Password