CompTIA Security+ Book Practice Test 5

CompTIA Security+ Book Practice Test 5

12th Grade

36 Qs

quiz-placeholder

Similar activities

MTA - Windows Operating System

MTA - Windows Operating System

9th - 12th Grade

37 Qs

Cybersecurity Formative Assessment

Cybersecurity Formative Assessment

12th Grade - University

34 Qs

Cryptography and Cybersecurity Quiz

Cryptography and Cybersecurity Quiz

12th Grade

35 Qs

City and Guilds Award in Cloud Services

City and Guilds Award in Cloud Services

12th Grade

40 Qs

J277 Networks

J277 Networks

12th Grade

34 Qs

Final Revision G12_2T

Final Revision G12_2T

12th Grade

37 Qs

Network Security - Modules 8-10

Network Security - Modules 8-10

12th Grade

35 Qs

FBLA Exploring Computer Science

FBLA Exploring Computer Science

6th - 12th Grade

40 Qs

CompTIA Security+ Book Practice Test 5

CompTIA Security+ Book Practice Test 5

Assessment

Quiz

Computers

12th Grade

Easy

Created by

blackpanther300 blackpanther300

Used 1+ times

FREE Resource

36 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

A security administrator is reviewing the company's continuity plan, and it specifies an RTO of four hours and an RPO of one day. Which of the following is the plan describing?

Systems should be restored within one day and should remain operational for at least four hours.

Systems should be restored within four hours and no later than one day after the incident.

Systems should be restored within one day and lose, at most, four hours' worth of data.

Systems should be restored within four hours with a loss of one day's worth of data at most.

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following statements is true regarding a data retention policy?

Regulations require financial transactions to be stored for seven years.

Employees must remove and lock up all sensitive and confidential documents when not in use.

It describe a formal process of managing configuration changes made to a network.

It is a legal document that describes a mutual agreement between parties.

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What type of information does a control risk apply to?

Health information

Personally identifiable information (PII)

Financial information

Intellectual property

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

You are the IT manager and one of your employees asks who assigns data labels. Which of the following assigns data labels?

Owner

Custodian

Privacy officer

System administrator

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

As part of the response to a credit card breach, Sally discovers evidence that individuals in her organization were actively working to steal credit card information and personally identifiable information (PII). She calls the police to engage them for the investigation. What has she done?

Escalated the investigation

Public notification

Outsourced the investigation

Tokenized the data

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Which of the following is not a common security policy type?

Acceptable use policy

Social media policy

Password policy

Parking policy

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What law or regulation requires a DPO in organizations?

FISMA

COPPA

PCI-DSS

GDPR

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?