SEC+ Ch.11 Review Test

SEC+ Ch.11 Review Test

Professional Development

15 Qs

quiz-placeholder

Similar activities

Sec+ Quiz - 2

Sec+ Quiz - 2

Professional Development

15 Qs

CySa+ PT 4: 2/3

CySa+ PT 4: 2/3

9th Grade - Professional Development

20 Qs

Privacy in the Modern Era

Privacy in the Modern Era

Professional Development

20 Qs

Cybersecurity Quiz 1

Cybersecurity Quiz 1

Professional Development

10 Qs

SOF Day 1 Review

SOF Day 1 Review

Professional Development

12 Qs

Cloud Computing

Cloud Computing

University - Professional Development

10 Qs

CompTIA Sec+

CompTIA Sec+

University - Professional Development

20 Qs

SOF Day 2 Review

SOF Day 2 Review

Professional Development

11 Qs

SEC+ Ch.11 Review Test

SEC+ Ch.11 Review Test

Assessment

Quiz

Computers

Professional Development

Hard

Created by

Prem Jadhwani

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Management within your organization wants to ensure that users understand the rules of behavior when they access the organization’s computer systems and networks. Which of the following BEST describes what they would implement to meet this requirement?

AUP

NDA

SLA

MSA

Answer explanation

A is correct. An acceptable use policy (AUP) informs users of company expectations when they use computer systems and networks, and it defines acceptable rules of behavior. A non-disclosure agreement (NDA) ensures that individuals do not share proprietary data with others. A service level agreement (SLA) is an agreement between a company and a vendor that stipulates performance expectations, such as minimum uptime and maximum downtime levels. A measurement systems analysis (MSA) evaluates the processes and tools used to make measurements.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Management recently decided to upgrade the organization’s security policy. Among other items, they want to implement a policy that will reduce the risk of personnel within the organization colluding to embezzle company funds. Which of the following is the BEST choice to meet this need?

AUP

Training

Mandatory vacations

Background check

Answer explanation

C is correct. Mandatory vacations help to reduce the possibility of fraud and embezzlement. An acceptable use policy informs users of company policies, and even though users sign them, they don’t deter someone considering theft by embezzling funds. Training can help reduce incidents by ensuring personnel are aware of appropriate policies. A background check is useful before hiring employees, but it doesn’t directly reduce risks related to employees colluding to embezzle funds.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Lisa is a training instructor, and she maintains a training lab with 16 computers. She has enough rights and permissions on these machines to configure them as needed for classes. However, she does not have the rights to add them to the organization’s domain. Which of the following choices BEST describes the reasoning for this?

Least privilege

MSA

Diversity of training

Offboarding

Answer explanation

A is correct. When following the principle of least privilege, individuals have only enough rights and permissions to perform their job. Lisa needs to maintain the training lab, but there is no indication she needs to join the training lab computers to the domain. A measurement systems analysis (MSA) uses various methods to identify variations within a measurement process and is completely unrelated to this question. Diversity of training techniques refers to using different training techniques for end users. Offboarding is the process of removing employees’ access when they leave the company but has nothing to do with the privileges of a training instructor.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization includes a software development division within the IT department. One developer writes and maintains applications for the Sales and Marketing departments. A second developer writes and maintains applications for the Payroll department. Once a year, they switch roles for at least a month. What is the purpose of this practice?

To enforce a separation of duties policy

To enforce a mandatory vacation policy

To enforce a job rotation policy

To enforce an acceptable use policy

Answer explanation

C is correct. This practice enforces a job rotation policy where employees rotate into different jobs, and it is designed to reduce potential incidents. A separation of duties policy prevents any single person from performing multiple job functions to help prevent fraud, but it doesn’t force users to switch roles. A mandatory vacation policy requires employees to take time away from their job. An acceptable use policy informs users of their responsibilities when using an organization’s equipment.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Your organization recently suffered a costly malware attack. Management wants to take steps to prevent damage from malware in the future. Which of the following phases of common incident response procedures is the BEST phase to address this?

Preparation

Identification

Containment

Eradication

Answer explanation

A is correct. The preparation phase is the first phase of common incident response procedures and attempts to prevent security incidents. Incident identification occurs after a potential incident occurs and verifies it is an incident. Containment attempts to limit the damage by preventing an incident from spreading, but it doesn’t prevent the original incident. Eradication attempts to remove all malicious elements of an incident after it has been contained. All six steps in order are preparation, identification, containment, eradication, recovery, and lessons learned.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

An incident response team is following typical incident response procedures. Which of the following phases is the BEST choice for analyzing an incident to identify steps to prevent a reoccurrence of the incident?

Preparation

Identification

Eradication

Lessons learned

Answer explanation

D is correct. You should analyze an incident during the lessons learned phase of incident response to identify steps to prevent reoccurrence. Preparation is a planning step done before an incident, to prevent incidents and identify methods to respond to incidents. Identification is the first step after hearing about a potential incident to verify it is an incident. Eradication attempts to remove all malicious elements of an incident after containing it.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

After a recent cybersecurity incident resulting in a significant loss, your organization decided to create a security policy for incident response. Which of the following choices is the BEST choice to include in the policy when an incident requires confiscation of a physical asset?

Ensure hashes are taken first.

Maintain the order of volatility.

Keep a record of everyone who took possession of the physical asset.

Require interviews of all witnesses present when the asset is confiscated.

Answer explanation

1.             C is correct. It’s important to keep a chain of custody for any confiscated physical items, and the chain of custody is a record of everyone who took possession of the asset after it was first confiscated. Hashes should be taken before capturing an image of a disk, but hashes are not required before confiscating equipment. Security personnel should be aware of the order of volatility and protect volatile data, but there isn’t any way to maintain the order of volatility. It’s important to perform interviews of anyone who observed the incident, but it isn’t necessary to interview people who were present when the asset is confiscated.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?