PrepAway - Latest Free Exam Questions & Answers

Which of the following methods would BEST accomplish this goal?

An organization does not have adequate resources to administer its large infrastructure. A security
administrator wishes to combine the security controls of some of the network devices in the organization.
Which of the following methods would BEST accomplish this goal?

PrepAway - Latest Free Exam Questions & Answers

A.
Unified Threat Management

B.
Virtual Private Network

C.
Single sign on

D.
Role-based management

Explanation:
When you combine a firewall with other abilities (intrusion prevention, antivirus, content filtering, etc.),
what used to be called an all-in-one appliance is now known as a unified threat management (UTM)
system. The advantages of combining everything into one include a reduced learning curve (you only
have one product to learn), a single vendor to deal with, and—typically—reduced complexity.
Incorrect Answers:
B: A virtual private network (VPN) is a communication tunnel between two entities across an intermediary
network. In most cases, the intermediary network is an untrusted network, such as the Internet, and
therefore the communication tunnel is also encrypted.
C: Single sign-on means that once a user (or other subject) is authenticated into a realm, they need not
re-authenticate to access resources on any realm entity.
D: Role-based management is best suited for environments with a high rate of employee turnover
because access is defined against static job descriptions rather than transitive user accounts (DAC and
ACL) or assigned clearances (MAC

Dulaney, Emmett and Chuck Eastton, CompTIA Security+ Study Guide, 6th Edition, Sybex, Indianapolis,
2014, p. 119
Stewart, James Michael, CompTIA Security+ Review Guide, Sybex, Indianapolis, 2014, pp. 11, 280, 289


Leave a Reply