CompTIA SY0-501 Security+ Take Ten Challenge #1Step 1 of 1010%1-1: Which of the following would be the best way to segment two IP subnets that are physically located on the same switch? Firewall policies Static routing VLANs Air gaps OS virtualization 1-2: A company would like to build their own inventory management system, but they would prefer using a predefined set of application modules. Which cloud deployment model would facilitate this software development strategy? PaaS Hybrid IaaS Community SaaS 1-3: Which of these access control models is most associated with Windows Groups? File system security Rule-based access control Role-based access control Mandatory access control Attribute-based access control 1-4: Which of these best describes the Windows archive attribute? The attribute is set when a file is modified Any files with the attribute will have a secondary backup Users set the attribute when they create a new version of a file A system administrator defines the attribute for all files and folders to restore A snapshot is created each time the attribute is set 1-5: A developer has modified their source code to make it very difficult for anyone else to read and understand. Which of these would best describe this code? Hashed Collision Obfuscation Encryption Salted 1-6: Which of these activities would be categorized as passive reconnaissance? Reading online forums Running ping sweeps Performing OS fingerprinting Scanning for open ports Running DNS queries 1-7: Which of these security technologies can operate as a dissolvable agent? NAC Proxy SIEM Firewall Mail gateway 1-8: Which of these cloud computing characteristics is most associated with capturing the state of a cloud service or reverting to a previous state or configuration? Non-persistence Templates SaaS Orchestration Automation 1-9: A system administrator has been asked to install an application on a server that runs in the background with no user intervention. This server also supports many other applications at the same time. Which type of account would commonly be associated with this application? User Privileged Generic Shared Service 1-10: Which of the following would be most responsible for data accuracy, privacy, and security, associating sensitivity labels to data, and ensuring compliance with any applicable laws and standards? System administrator Data owner Privacy officer Data custodian Data steward Take Ten Challenge #1 companion video with detailed answers: