Domain 5: Security Operations

Domain 5: Security Operations

Professional Development

30 Qs

quiz-placeholder

Similar activities

TallyPrime Quiz

TallyPrime Quiz

Professional Development

30 Qs

Cyber Security

Cyber Security

1st Grade - Professional Development

25 Qs

Basic GIS, RS, Photogrammetry

Basic GIS, RS, Photogrammetry

University - Professional Development

25 Qs

Threat Intelligence Quiz

Threat Intelligence Quiz

Professional Development

25 Qs

Teknologi-Informasi-Egoverment

Teknologi-Informasi-Egoverment

Professional Development

25 Qs

Quiz on Internet of Things (IoT)

Quiz on Internet of Things (IoT)

Professional Development

31 Qs

AWS Cloud Practitioner - Practice Questions

AWS Cloud Practitioner - Practice Questions

Professional Development

30 Qs

Classification Review

Classification Review

Professional Development

26 Qs

Domain 5: Security Operations

Domain 5: Security Operations

Assessment

Quiz

Other

Professional Development

Medium

Created by

Ezinne Kalu

Used 2+ times

FREE Resource

30 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Scenario: A marketing team develops a new advertising strategy. They create various documents, presentations, and spreadsheets to outline their plan. How should the marketing team handle the newly created documents to ensure they are secure?

Store the documents on their personal laptops

Share the documents via unsecured email

Save the documents on a secure company server, apply appropriate access controls, and classify the data according to its sensitivity

Upload the documents to a public file-sharing service

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Scenario: A company stores sensitive customer information in a cloud storage service. What measures should be taken to secure the stored customer information?

Store the information in plaintext

Use encrypted storage, implement strong access controls, and ensure regular backups of the data

Allow all employees to access the information

Disable all backup processes

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

How can the organization ensure data integrity while employees are using customer data?

Allow unrestricted access to customer data

Use secure access methods, log all access activities, and implement data integrity checks

Share customer data with external parties without verification

Keep no record of data access activities

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Scenario: The marketing team shares the new advertising strategy with an external consultant. What precautions should the team take when sharing the strategy?

Share the strategy via public social media platforms

Send the strategy via unencrypted email

Allow anyone to download the strategy from the internet

Ensure the consultant has proper authorization, use encrypted communication methods, and apply data loss prevention techniques

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Scenario: A company needs to dispose of old financial records stored on hard drives. How should the company securely destroy these records?

Delete the files and throw the hard drives away

Use a certified data destruction method such as degaussing to render the hard drives unreadable, followed by physical destruction of the drives

Sell the hard drives without wiping them

Store the hard drives indefinitely

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Scenario: A company classifies its strategic plans as 'Top Secret.' How should the company handle data classified as 'Top Secret'?

Allow all employees to access the data

Send the data via regular postal mail

Store the data on public servers

Restrict access to a limited number of authorized personnel, use strong encryption for storage and transmission, and implement stringent access controls and monitoring

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Scenario: An organization labels customer data as "Confidential." Question: Why is labeling important for data security?

It allows data to be shared freely

It ensures that everyone who handles the data is aware of its sensitivity and the required security measures, reducing the risk of accidental exposure or mishandling

It permits unrestricted access to the data

It has no impact on data security

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?