
CompTIA Security+ Book Practice Test 5
Authored by blackpanther300 blackpanther300
Computers
12th Grade
Used 1+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
36 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
1 min âą 1 pt
A security administrator is reviewing the company's continuity plan, and it specifies an RTO of four hours and an RPO of one day. Which of the following is the plan describing?
Systems should be restored within one day and should remain operational for at least four hours.
Systems should be restored within four hours and no later than one day after the incident.
Systems should be restored within one day and lose, at most, four hours' worth of data.
Systems should be restored within four hours with a loss of one day's worth of data at most.
2.
MULTIPLE CHOICE QUESTION
1 min âą 1 pt
Which of the following statements is true regarding a data retention policy?
Regulations require financial transactions to be stored for seven years.
Employees must remove and lock up all sensitive and confidential documents when not in use.
It describe a formal process of managing configuration changes made to a network.
It is a legal document that describes a mutual agreement between parties.
3.
MULTIPLE CHOICE QUESTION
1 min âą 1 pt
What type of information does a control risk apply to?
Health information
Personally identifiable information (PII)
Financial information
Intellectual property
4.
MULTIPLE CHOICE QUESTION
1 min âą 1 pt
You are the IT manager and one of your employees asks who assigns data labels. Which of the following assigns data labels?
Owner
Custodian
Privacy officer
System administrator
5.
MULTIPLE CHOICE QUESTION
1 min âą 1 pt
As part of the response to a credit card breach, Sally discovers evidence that individuals in her organization were actively working to steal credit card information and personally identifiable information (PII). She calls the police to engage them for the investigation. What has she done?
Escalated the investigation
Public notification
Outsourced the investigation
Tokenized the data
6.
MULTIPLE CHOICE QUESTION
1 min âą 1 pt
Which of the following is not a common security policy type?
Acceptable use policy
Social media policy
Password policy
Parking policy
7.
MULTIPLE CHOICE QUESTION
1 min âą 1 pt
What law or regulation requires a DPO in organizations?
FISMA
COPPA
PCI-DSS
GDPR
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?
Similar Resources on Wayground
35 questions
Code.org Unit 2 Web Development
Quiz
âą
6th - 12th Grade
40 questions
MS office 2016
Quiz
âą
1st Grade - Professio...
33 questions
Fortnite
Quiz
âą
1st Grade - Professio...
40 questions
Computer Network
Quiz
âą
12th Grade - University
40 questions
SOALAN PERCUBAAN TEORI (SET 1)
Quiz
âą
12th Grade
40 questions
SCRATCH TEST 2
Quiz
âą
9th - 12th Grade
37 questions
Computer Terms
Quiz
âą
6th - 12th Grade
31 questions
Computer System
Quiz
âą
12th Grade - University
Popular Resources on Wayground
15 questions
Fractions on a Number Line
Quiz
âą
3rd Grade
10 questions
Probability Practice
Quiz
âą
4th Grade
15 questions
Probability on Number LIne
Quiz
âą
4th Grade
20 questions
Equivalent Fractions
Quiz
âą
3rd Grade
25 questions
Multiplication Facts
Quiz
âą
5th Grade
22 questions
fractions
Quiz
âą
3rd Grade
6 questions
Appropriate Chromebook Usage
Lesson
âą
7th Grade
10 questions
Greek Bases tele and phon
Quiz
âą
6th - 8th Grade