
Sec+ 701 Domain 5 Quiz
Authored by Prem Jadhwani
Information Technology (IT)
Professional Development
Used 8+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
18 questions
Show all answers
1.
MATCH QUESTION
2 mins • 1 pt
Match the policies/documents with the correct definition.
BCP
Plan we use to respond to someone attacking us.
AUP
Plan we use to ensure we maintain operational availability.
IRP
Document that an employee signs before touching any IT asset at our company.
Playbook
Plan we use to respond to natural disasters.
DRP
A step-by-step guide that shows us how to respond to specific incidents.
2.
MATCH QUESTION
2 mins • 1 pt
Match the following terms.
Separation of Duties
A policy that ensures all employees only get the accesses and permissions they need to do their job.
Least Privilege
A policy that detects and prevents fraud by splitting up duties in sensitive processes.
NIST
A process that we use in our organization to implement modifications to processes and procedures.
Change Management
An organization that provides standards for basic security hygiene.
Job Rotation
A policy that ensures we train employees across multiple positions - helping us detect fraud.
3.
MATCH QUESTION
2 mins • 1 pt
Match the development terms.
SDLC
Software model that can go forward and backward.
Waterfall
Software model that can only go forward.
Static
Analysis performed on code while a program is running.
Agile
Process we use to properly create software.
Dynamic
Analysis performed on code at a stand-still.
4.
MATCH QUESTION
2 mins • 1 pt
Match the following
CI/CD
Code in a program that does not execute when the program runs.
Fuzzing
A tool we use to inject random input into a program for testing.
Version Control System
A software tool that will track changes and revisions in a software version.
Dead Code
A place where we can store different versions of our code.
Code Repository
A process that allows us to integrate and deploy code faster.
5.
MATCH QUESTION
2 mins • 1 pt
Match the following laws.
GDPR
Requires a company to set up an ISMS if they deal with infosec.
ISO 27002
The "Right to be forgotten" law that observes the privacy of a persons right to be removed from the internet.
PCI DSS
Supporting document that provides security controls to help set up an ISMS.
ISO 27701
Standard that requires a company to handle PII data in a private manner.
ISO 27001
Law that requires a company to handle credit card/debit card data in secure way.
6.
MATCH QUESTION
2 mins • 1 pt
Match the following compliance terms.
Reputation Damage
The most common result of noncompliance.
Fines
Term that tells a company they must adhere to laws int he geographical area in which it operates.
Data Sovereignty
The biggest concern of noncompliance.
Data Retention
The requirement for a company to conduct their own research on applicable laws and regulations.
Due Diligence
A term that defines a length of time in which a government entity has directed we must keep data for.
7.
MATCH QUESTION
2 mins • 1 pt
Match the following data governance terms.
Data Controller
Person in a company responsible for creating policies about how we handle data.
Data Owner
Department in company that maintains the infrastructure that houses any data.
Data Processor
Person in company who directly handles the data and enforces data policy.
Data Protection Officer
Person in company responsible for making sure our data policies meet regulatory law.
Data Custodian
Person in company who keeps a complete inventory of all data.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?