CompTIA Security+ SY0-701 Practice Question

A corporation needs to secure its data while it is sent from the main office to a distant branch. To achieve confidentiality and effective management of cryptographic keys, which technology should be adopted?

  • A deprecated wireless security protocol initially designed for wireless network protection

  • Technology using Internet Protocol Security for data encryption and key management

  • A protocol commonly used for secure file transfers but not suitable for all types of data transmissions

  • An older tunneling protocol known for a fundamental lack of robust security features

  • An encrypted web protocol intended for secure online transactions

CompTIA Security+ SY0-701
Threats, Vulnerabilities, and Mitigations
Your Score:
Settings & Objectives
Random Mixed
Questions are selected randomly from all chosen topics, with a preference for those you haven’t seen before. You may see several questions from the same objective or domain in a row.
Rotate by Objective
Questions cycle through each objective or domain in turn, helping you avoid long streaks of questions from the same area. You may see some repeat questions, but the distribution will be more balanced across topics.

Check or uncheck an objective to set which questions you will receive.

Bash, the Crucial Exams Chat Bot
AI Bot