Security+ Match Device Controls
The Security+ exam expects you to understand controls and you should be able to match device controls with specific devices. For example, can you match device controls used with mobile devices such as tablets and smartphones? Can you match device controls used on servers?
Performance Based Questions
Topics such as security controls for devices are ideally suited for the new performance based questions on the CompTIA Security+ exam. Instead of answering a multiple choice question, you might need to drag and drop different controls to the devices that they protect. If you’re unfamiliar with the new performance based questions, you might like to check out these blogs too:
- CompTIA Performance Based Testing
- Security+ and Performance Based Questions
- Security+ WAP Performance Based Questions
- Security+ Forensic Performance Based Question
- CompTIA Testing Changes
Match Device Controls Practice Question
The following list of controls includes some that are used with mobile devices such as smartphones, tablets, and laptops. It also includes some controls that are used with servers but not mobile devices. Do you know which ones are which?
Click the image for a larger view.
Some of these are used only on mobile devices, some are only used on servers, and some can be used on both.
Which security controls are for mobile devices? | Â ![]() |
Which security controls are for servers? | Â ![]() |
CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide
Match Device Controls for Mobile Devices
Here are the common security controls used for mobile devices:
- Screen lock. Uses a passcode or password to lock the device. This prevents a thief from using a stolen device.
- Strong password. Any time a password is used to protect a mobile device (or any device or system), it should be strong. This means they are at least eight characters and include multiple character types, such as upper case, lower case, numbers, and symbols. Laptops support strong passwords but smartphones and tablets typically only support simple passwords such as personal identification numbers (PINs) but since the question included laptops in the listing of mobile devices, strong passwords can be used. Two other blogs that cover password topics for the Security+ exam are Understanding Password History, and Three Factors of Authentication and Multifactor Authentication.
- Data encryption. Encryption protects the confidentiality of data and smartphone security includes device encryption to protect the data against loss of confidentiality. It’s possible to selectively encrypt some data on a system, an entire drive, or an entire device.
- Remote wipe/sanitation. Remote wipe capabilities are useful if the phone is lost. The owner can send a remote wipe signal to the phone to delete all the data on the phone. This also deletes any cached data, such as cached online banking passwords, and provides a complete sanitization of the device, ensuring that all valuable data is removed.
- Voice encryption. It’s possible to use voice encryption with some phones to help prevent the interception of conversations
- Global positioning system (GPS) tracking. A GPS pinpoints the location of the phone. Many phones include GPS applications that you can run on another computer. If you lose your phone, GPS can help you find it. Who knows? You may find that it just fell through the cushions in your couch. This is useful to know before you send a remote wipe signal.
- TPM. Trusted platform modules (TPMs) are hardware encryption devices. You can read more about them in the TPM and HSM Hardware Encryption Devices blog.
- Cable locks. The number of laptops stolen during lunches at conferences is astronomical. Many people don’t seem to know how common thefts are and often leave their laptops unprotected. Cable locks can secure a mobile computer. They often look about the same as a cable lock used to secure bicycles.
- Locked cabinet or safe. Small devices can be secured within a locked cabinet or safe. When they aren’t in use, a locked cabinet helps prevent their theft.
Note about TPMs
This is a great example of how technology has changed since the original Security+ objectives were released. Back then, you would typically only find TPMs on laptops and some systems that needed full disk encryption, but not other mobile devices such as smartphones and tablets. Today, some smartphones and tablets include TPMs to encrypt data. If the Security+ exam questions are keeping up with the current technology, you could include TPMs with mobile devices.
You can read more about them in the TPM and HSM Hardware Encryption Devices blog.
If you were to match the controls to the Mobile devices, it might look like this. The idea is that you drag and drop individual controls from the area on the right to the area under Mobile Devices.
Click the image for a larger view.
Match Device Controls for Servers
If you were to match the controls to servers, it might look like this:
Click the image for a larger view.
Some of these items are the same as the mobile devices, and some of the items are unique for servers:
- Strong password. Any time a password is used to protect a mobile device (or any device or system), it should be strong. This means they are at least eight characters and include multiple character types, such as upper case, lower case, numbers, and symbols. Two other blogs that cover password topics for the Security+ exam are Understanding Password History, and Three Factors of Authentication and Multifactor Authentication.
- Least privilege. Least privilege is a technical control. It specifies that individuals or processes are granted only those rights and permissions needed to perform their assigned tasks or functions. Rights and permissions are commonly assigned on servers, but rarely on mobile devices such as tablets and smartphones.
- Data encryption. Encryption protects the confidentiality of data on servers just as it can protect the confidentiality of data on mobile devices. It’s possible to selectively encrypt individual files or entire disk volumes.
- Mantrap, cipher lock, and proximity lock. This are examples of physical security and they can be used to restrict access to a server room.
- Firewall. Software-based firewalls are commonly used on servers but are extremely rare on mobile devices.
- HSM. Hardware security modules (HSMs) are hardware encryption devices. You can read more about them in the TPM and HSM Hardware Encryption Devices blog.
Security+ Match Device Controls Summary
You can expect to see some performance based questions on the Security+ exam and you might even see one requiring you to match device controls to specific devices. While these are different from a typical multiple choice question, you can still answer them correctly as long as you know the content. The information from this blog was derived from the CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide, and it covers all of the security controls in the Security+ exam.
Hi John,
The Learnzapp app is awesome but it doesn’t include performance-based question samples. This site does include simulated performance-based questions.
If the “copy of the book” is the CompTIA Security+: Get Certified Get Ahead: SY0-401 Study Guide, I hear from people almost every day telling me that they passed the exam the first time they took it using that study guide. It has several examples of performance-based questions.
Hope this helps.
Darril
Hi Darril,
I’m contemplating on buying your learnZapp CompTIA Security+ and Network+ bundled app on App store.
Does the Security+ app include the performance based question samples?
I attended the Security+ bootcamp and got a copy of the book. I’m just brushing up before taking the exam.
Will the app be enough to prepare me?
Thanks Darril for the material. I am writing my security+ exam on 3/10/15
My questions is,
If the laptop is considered a mobile device, should n’t we move the firewall to both mobile side as well as server side since we have windows firewall which we can set up on our laptops?
Thanks
James
Hi James,
I was away from home so didn’t see this right away.
Short answer: Possibly. But if I was taking the exam today, I would stick with firewalls on servers only in this context. .
Mobile devices make some of the topics fuzzy unless you’re clear about what devices CompTIA is talking about. Also, I am getting the perception that CompTIA is moving away from laptops as mobile devices though it isn’t alwayss easy to know what they’re thinking.
One of my goals is to get people to really think about the topics so that the actual questions are much easier. Hopefully that was the case for you today. Clearly, you were digging into why the correct answers were correct, and why the incorrect answers are incorrect.
Forget the question for a minute. Should you enable a firewall on a laptop. Yes, whenever posssible.
However, I’m unaware of any firewalls for tablets and smartphones. They might be trickling in, but I haven’t seen them.
Compare this to passwords. Even though you can’t create a very strong password on mobile devices, you can use PINs and configure the device to lock after x number of incorrect PINs. It’s not a perfect correlation, but there is a connection.
Hope the exam was a breeze for you.
Best regards,
Darril
Great material which really helped me prepare and pass the Security+ exam. Thanks Darril!
Congratulations Chuck. Great to hear that you passed and I appreciate the kind words. Good luck with your next adventure.
Thanks Darril for the material
If the laptop is considered a mobile device, should n’t we move the firewall to both mobile side as well as server side since we have windows firewall which we can set up on our laptops?
Thanks
James
I passed my exam yesterday with an 858/900. I had 74 questions, 5 sims all from this site (ACL,volitile mem,password types,map of rooms to drag/drop security items,port number/protocol matching). this site and book were pivotal to my success and will definitely be using it again when time to prepare for the 401. Thanks so much!!
Congratulations CJ. Great to hear that you passed and good to know that the site and the book helped. Good luck with your next adventure.
Yes. I keep people updated via the newsletter. The Kindle version is coming out this week and will be sale for only $2.99 one day. I’ll let newsletter subscribers know what day in advance.
Wondering if there will be new study guides for SYO-401? Since 301 is retiring in a few months.
I believe you can secure servers in cabinets, what about rack mounted servers in specialized enclosures that can be locked, would those not be considered a “cabinet”?
In the real world, yes, though they are typically called locking server cabinets or locking server rack cabinets. However, in the context of the Security+ exam, they are looking at a cabinet as a file cabinet.
Hope this helps.
Yes that did, tremendously, thanks!
Thanks Darril. I passed by specifically reading your book and taking the questions at the end. I took the test on Friday the 13th, not such an unlucky day after all. Your simulation questions are spot on. I find that taking the tests at the end of the chapter helped tremendously in memorizing the concepts. Thanks again Darril and have a happy Holidays.
Congratulations Chris. That’s great news and glad to hear that the book and other resources helped you.
Happy Holidays to you too.
It wouldn’t. At least not that I”ve seen. However, it would be used for a laptop and both laptops and cellphones are mobile devices.
In contrast, it is extremely rare to ever use a cable lock with a server. Server rooms have other physical security so cable locks aren’t needed. I hesitate to say they are NEVER used with a server but for the exam they aren’t.
Im just confused why there would be a cable lock for a cell phone. I bought your book and its helping. Taking the test on Friday 13th. I know what a wonderful day to take a test :-).
So is a Mobile device considered a laptop or are they strictly referring to cellphones/ipads?
It’s not either/or. Mobile devices that can easily be transported includes laptop, smartphones, and tablets.
Thank you Mr. Darril for the questions site, I well study the Q&A from your book Get Certified Get Ahead Gibson, Darril, and well study all the performance based questions in this blog 🙂
Good luck, Hisham.
TPM. A Trusted Platform Module (TPM) can be used to assist with hash key generation. TPM is the name assigned to a chip that can store cryptographic keys, passwords, or certificates. TPM can be used to protect cell phones and devices other than PCs as well.
So it should be in the mobile side to right?
thanks for the great example hope it comes in the exam 🙂
Thanks for the feedback.
This is a great example of how technology has changed since the original Security+ objectives were released. Back then, you would typically only find TPMs on laptops and some systems that needed full disk encryption, but not other mobile devices such as smartphones and tablets.
With that in mind, I originally put TPMs in with the HSMs.
After receiving your comment, I see that some smartphones and tablets include TPMs to encrypt data. If the Security+ exam questions are keeping up with the current technology, you could include TPMs with mobile devices so I modified the blog.
Good luck on the exam.
I well take my exam at the end of this month, I would like to point out that these performance based questions mentioned in this blog are to the point and are very helpful to those who seek real examples of performance based questions that come in the exam.
Thanks for the comment Hisham. Good luck with the exam. If you’re looking for some reasonably priced online practice test questions questions, check out this page: http://gcgapremium.com/security/ptqs/. You can get 30 days access to 468 practice test questions for only $14.99.
Good luck.
Dear Mr. Darril my exam is in than one week and I feel my self weak in performance based questions, well the 468 practice questions include performance based questions and well they be different from the ones that are mentioned in this blog?
Regards
Hi Hisham,
I understand. These new performance based questions are concerning many people and there aren’t many people that have the extra money to take the exam more than once.
The full bank of 468 practice test questions mentioned above (http://gcgapremium.com/security/ptqs/) now includes ten additional simulated performance based questions. While I can’t think of the specific pages where this content is directly covered in a blog, I wouldn’t be surprised if the content was here somewhere. The objectives haven’t changed. CompTIA only changed the way they are testing them and one of the goals of the new site is to allow you to see the questions from a different perspective so that these questions don’t surprise you.
At the moment, I have three sets of performance based questions on that site:
– Performance Based Question – Set 1
You’ll see a graphic explaining what you might be required to do on the actual exam to match different types of security to mobile devices and servers in a data center. You’ll then have two questions that test your knowledge and ability to correctly answer the questions. This question also includes a link to a graphic showing the end solution for the overall performance based question simulation.
– Performance Based Question – Set 2
You’ll see a graphic explaining what you might be required to do on the actual exam to match different types of attacks with the name of the attack type. You’ll then have five questions that test your knowledge and ability to correctly answer the questions. This question also includes a link to a graphic showing the end solution for the overall performance based question simulation.
– Performance Based Question – Set 3
You’ll see a graphic showing a network with computers and servers separated by a firewall. The firewall is used to control traffic between the computers and users using rules within an access control list (ACL). You’ll have three questions that test your knowledge and ability to correctly identify the relevant components of the rule. The incorrect answers and explanation provide you with insight into how to correctly answer this type of question on the actual exam..
When anyone purchases the full bank of 468 practice test questions from here (http://gcgapremium.com/security/ptqs/) or as one of the value packages from here (http://gcgapremium.com/security/pass-the-security-exam-the-first-time-you-take-it/), they also have access to additional practice test questions that are simulated performance based questions.
Hope this helps.
This topic was on my test today (along with five other performance based questions!) Thank you for your great information on this type of question. Just looking over your examples helped me put the answers in the proper order. Reading over your helpful site helped me pass with a 804 today. Thanks!
Congratulations on the pass. Great to hear that the resources helped.
Good luck on your next adventure.
Hi Darril,
In the CompTIA Security+ Study Guide I am using it states that TPM can be used to protect cell phones and devices other than PCs. The TPM and HSM blog also states that many laptop computers include a TPM. So, should it be included with the mobile devices as well as the servers? Thanks for your insight, I’m taking Sec+ on Friday and want to make sure I know the device controls.
My intent in this blog was to differentiate between servers and highly mobile devices such as tablets and smartphones. After reading your query, I realized I didn’t define mobile devices as tablets and smartphones but only used graphics. I edited it some to spell out tablets and smartphones.
You’re correct that a TPM is commonly used on laptops and a laptop is a mobile device. If a test question included laptops and a TPM, it would be appropriate to match them.
However, a TPM is very rare on tablets and smartphones due to the processing overhead required. I searched for where the study guide says that a TPM can be used to protect cell phones, but I couldn’t find it. I’m not saying it’s not there, but I couldn’t find it. In contrast, a TPM is a perfect match for a laptop computer.
Good luck on Friday. Let us know how you did.
Are you planning to make a study guide or reference manual for COMPTIA CASP certification?
Hi Alex,
It’s a possibility, but probably not until CompTIA updates it to the next version. I currently have other books in the pipeline. I will say that with the knowledge I had from the Security+ certification and real world experience, I was able to study topics from the objectives through self-study and pass the exam. That was back when it was in Beta stage. Good luck if you go for it.