CompTIA Security+ Book Practice Test 5

CompTIA Security+ Book Practice Test 5

12th Grade

36 Qs

quiz-placeholder

Similar activities

Quiz on Mouse Functionality

Quiz on Mouse Functionality

12th Grade - University

32 Qs

CompTIA Security + (Part 1)

CompTIA Security + (Part 1)

12th Grade

34 Qs

Chapter 6

Chapter 6

12th Grade

40 Qs

Entrepreneurship/Business Plan/College Practice Test

Entrepreneurship/Business Plan/College Practice Test

9th - 12th Grade

40 Qs

DCM2Brandonl

DCM2Brandonl

9th - 12th Grade

34 Qs

IBT Final Exam Review

IBT Final Exam Review

9th - 12th Grade

35 Qs

Security+ Chapter 1

Security+ Chapter 1

12th Grade

35 Qs

DCM Brandon l

DCM Brandon l

9th - 12th Grade

33 Qs

CompTIA Security+ Book Practice Test 5

CompTIA Security+ Book Practice Test 5

Assessment

Quiz

Computers

12th Grade

Easy

Created by

blackpanther300 blackpanther300

Used 1+ times

FREE Resource

36 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security administrator is reviewing the company's continuity plan, and it specifies an RTO of four hours and an RPO of one day. Which of the following is the plan describing?

Systems should be restored within one day and should remain operational for at least four hours.

Systems should be restored within four hours and no later than one day after the incident.

Systems should be restored within one day and lose, at most, four hours' worth of data.

Systems should be restored within four hours with a loss of one day's worth of data at most.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following statements is true regarding a data retention policy?

Regulations require financial transactions to be stored for seven years.

Employees must remove and lock up all sensitive and confidential documents when not in use.

It describe a formal process of managing configuration changes made to a network.

It is a legal document that describes a mutual agreement between parties.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of information does a control risk apply to?

Health information

Personally identifiable information (PII)

Financial information

Intellectual property

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You are the IT manager and one of your employees asks who assigns data labels. Which of the following assigns data labels?

Owner

Custodian

Privacy officer

System administrator

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

As part of the response to a credit card breach, Sally discovers evidence that individuals in her organization were actively working to steal credit card information and personally identifiable information (PII). She calls the police to engage them for the investigation. What has she done?

Escalated the investigation

Public notification

Outsourced the investigation

Tokenized the data

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is not a common security policy type?

Acceptable use policy

Social media policy

Password policy

Parking policy

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What law or regulation requires a DPO in organizations?

FISMA

COPPA

PCI-DSS

GDPR

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?