CompTIA Security+ Exam Prep - Question List

Select how would you like to study

426. What is the imaginary boundary that divides the trusted from the un-trusted components?
  1. Security Static
  2. Static Boundary
  3. Random Access Memory
  4. Security Perimeter
427. Jim’s company is paying Chris’s company to develop software and a third party keeps a copy of the source code. What should Jim have in place for protection?
  1. Financial Escrow
  2. Software Escrow
  3. Application Escrow
  4. Technical Escrow
428. If more than one task can be carried out by a module, what does this reflect?
  1. Cohesion
  2. Coupling
  3. Attributions
  4. External Processing
429. What indicates how much interaction one module requires in carrying out its tasks?
  1. Cohesion
  2. Coupling
  3. Attributions
  4. External Processing
430. What would dictate the degree of association between elements, methods of access, processing alternatives, and the organization of data elements?
  1. Cohesion
  2. Coupling
  3. Attributions
  4. Data Structure

Select how would you like to study