Sec+ 701 Domain 5 Quiz

Sec+ 701 Domain 5 Quiz

Professional Development

18 Qs

quiz-placeholder

Similar activities

Cybersecurity and IT Infrastructure Quiz

Cybersecurity and IT Infrastructure Quiz

Professional Development

20 Qs

ISC2 - Domain 1- Security Principles

ISC2 - Domain 1- Security Principles

Professional Development

17 Qs

Chapter 3: Malicious Activity

Chapter 3: Malicious Activity

Professional Development

20 Qs

Interns'25 quiz Infosec

Interns'25 quiz Infosec

Professional Development

20 Qs

Chapter 5: Reconnaissance and Intelligence Gathering

Chapter 5: Reconnaissance and Intelligence Gathering

Professional Development

20 Qs

SwiftUI Test

SwiftUI Test

Professional Development

20 Qs

 End of the Year Tech Procedure 24-25

End of the Year Tech Procedure 24-25

Professional Development

13 Qs

Networking and VLANs Quiz

Networking and VLANs Quiz

Professional Development

20 Qs

Sec+ 701 Domain 5 Quiz

Sec+ 701 Domain 5 Quiz

Assessment

Quiz

Information Technology (IT)

Professional Development

Easy

Created by

Prem Jadhwani

Used 8+ times

FREE Resource

18 questions

Show all answers

1.

MATCH QUESTION

2 mins • 1 pt

Match the policies/documents with the correct definition.

BCP

Plan we use to respond to natural disasters.

IRP

Plan we use to respond to someone attacking us.

Playbook

A step-by-step guide that shows us how to respond to specific incidents.

DRP

Plan we use to ensure we maintain operational availability.

AUP

Document that an employee signs before touching any IT asset at our company.

2.

MATCH QUESTION

2 mins • 1 pt

Match the following terms.

Change Management

An organization that provides standards for basic security hygiene.

Job Rotation

A policy that ensures we train employees across multiple positions - helping us detect fraud.

NIST

A policy that ensures all employees only get the accesses and permissions they need to do their job.

Least Privilege

A process that we use in our organization to implement modifications to processes and procedures.

Separation of Duties

A policy that detects and prevents fraud by splitting up duties in sensitive processes.

3.

MATCH QUESTION

2 mins • 1 pt

Match the development terms.

Static

Analysis performed on code while a program is running.

Dynamic

Software model that can go forward and backward.

Waterfall

Analysis performed on code at a stand-still.

SDLC

Process we use to properly create software.

Agile

Software model that can only go forward.

4.

MATCH QUESTION

2 mins • 1 pt

Match the following

Fuzzing

A software tool that will track changes and revisions in a software version.

CI/CD

A process that allows us to integrate and deploy code faster.

Version Control System

A tool we use to inject random input into a program for testing.

Dead Code

A place where we can store different versions of our code.

Code Repository

Code in a program that does not execute when the program runs.

5.

MATCH QUESTION

2 mins • 1 pt

Match the following laws.

ISO 27701

Standard that requires a company to handle PII data in a private manner.

ISO 27002

The "Right to be forgotten" law that observes the privacy of a persons right to be removed from the internet.

ISO 27001

Requires a company to set up an ISMS if they deal with infosec.

GDPR

Law that requires a company to handle credit card/debit card data in secure way.

PCI DSS

Supporting document that provides security controls to help set up an ISMS.

6.

MATCH QUESTION

2 mins • 1 pt

Match the following compliance terms.

Fines

The biggest concern of noncompliance.

Data Retention

The requirement for a company to conduct their own research on applicable laws and regulations.

Data Sovereignty

A term that defines a length of time in which a government entity has directed we must keep data for.

Due Diligence

The most common result of noncompliance.

Reputation Damage

Term that tells a company they must adhere to laws int he geographical area in which it operates.

7.

MATCH QUESTION

2 mins • 1 pt

Match the following data governance terms.

Data Protection Officer

Person in company who directly handles the data and enforces data policy.

Data Processor

Department in company that maintains the infrastructure that houses any data.

Data Owner

Person in company who keeps a complete inventory of all data.

Data Custodian

Person in a company responsible for creating policies about how we handle data.

Data Controller

Person in company responsible for making sure our data policies meet regulatory law.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?