
Sec+ 701 Domain 5 Quiz
Authored by Prem Jadhwani
Information Technology (IT)
Professional Development
Used 8+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
18 questions
Show all answers
1.
MATCH QUESTION
2 mins • 1 pt
Match the policies/documents with the correct definition.
DRP
A step-by-step guide that shows us how to respond to specific incidents.
BCP
Plan we use to respond to natural disasters.
IRP
Plan we use to ensure we maintain operational availability.
AUP
Document that an employee signs before touching any IT asset at our company.
Playbook
Plan we use to respond to someone attacking us.
2.
MATCH QUESTION
2 mins • 1 pt
Match the following terms.
Least Privilege
A policy that detects and prevents fraud by splitting up duties in sensitive processes.
NIST
A policy that ensures we train employees across multiple positions - helping us detect fraud.
Change Management
A process that we use in our organization to implement modifications to processes and procedures.
Job Rotation
An organization that provides standards for basic security hygiene.
Separation of Duties
A policy that ensures all employees only get the accesses and permissions they need to do their job.
3.
MATCH QUESTION
2 mins • 1 pt
Match the development terms.
Dynamic
Software model that can go forward and backward.
Waterfall
Analysis performed on code while a program is running.
Static
Process we use to properly create software.
SDLC
Software model that can only go forward.
Agile
Analysis performed on code at a stand-still.
4.
MATCH QUESTION
2 mins • 1 pt
Match the following
Fuzzing
Code in a program that does not execute when the program runs.
Code Repository
A process that allows us to integrate and deploy code faster.
Dead Code
A software tool that will track changes and revisions in a software version.
CI/CD
A place where we can store different versions of our code.
Version Control System
A tool we use to inject random input into a program for testing.
5.
MATCH QUESTION
2 mins • 1 pt
Match the following laws.
ISO 27002
Requires a company to set up an ISMS if they deal with infosec.
PCI DSS
Standard that requires a company to handle PII data in a private manner.
GDPR
Law that requires a company to handle credit card/debit card data in secure way.
ISO 27701
The "Right to be forgotten" law that observes the privacy of a persons right to be removed from the internet.
ISO 27001
Supporting document that provides security controls to help set up an ISMS.
6.
MATCH QUESTION
2 mins • 1 pt
Match the following compliance terms.
Fines
The most common result of noncompliance.
Reputation Damage
The requirement for a company to conduct their own research on applicable laws and regulations.
Data Sovereignty
A term that defines a length of time in which a government entity has directed we must keep data for.
Due Diligence
The biggest concern of noncompliance.
Data Retention
Term that tells a company they must adhere to laws int he geographical area in which it operates.
7.
MATCH QUESTION
2 mins • 1 pt
Match the following data governance terms.
Data Owner
Person in company responsible for making sure our data policies meet regulatory law.
Data Controller
Person in company who directly handles the data and enforces data policy.
Data Custodian
Department in company that maintains the infrastructure that houses any data.
Data Processor
Person in company who keeps a complete inventory of all data.
Data Protection Officer
Person in a company responsible for creating policies about how we handle data.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?