Search Header Logo

CompTIA Security+ Book Practice Test 5

Authored by blackpanther300 blackpanther300

Computers

12th Grade

Used 1+ times

CompTIA Security+ Book Practice Test 5
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

36 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security administrator is reviewing the company's continuity plan, and it specifies an RTO of four hours and an RPO of one day. Which of the following is the plan describing?

Systems should be restored within one day and should remain operational for at least four hours.

Systems should be restored within four hours and no later than one day after the incident.

Systems should be restored within one day and lose, at most, four hours' worth of data.

Systems should be restored within four hours with a loss of one day's worth of data at most.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following statements is true regarding a data retention policy?

Regulations require financial transactions to be stored for seven years.

Employees must remove and lock up all sensitive and confidential documents when not in use.

It describe a formal process of managing configuration changes made to a network.

It is a legal document that describes a mutual agreement between parties.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of information does a control risk apply to?

Health information

Personally identifiable information (PII)

Financial information

Intellectual property

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You are the IT manager and one of your employees asks who assigns data labels. Which of the following assigns data labels?

Owner

Custodian

Privacy officer

System administrator

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

As part of the response to a credit card breach, Sally discovers evidence that individuals in her organization were actively working to steal credit card information and personally identifiable information (PII). She calls the police to engage them for the investigation. What has she done?

Escalated the investigation

Public notification

Outsourced the investigation

Tokenized the data

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is not a common security policy type?

Acceptable use policy

Social media policy

Password policy

Parking policy

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What law or regulation requires a DPO in organizations?

FISMA

COPPA

PCI-DSS

GDPR

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?