Set4 CompTIA Security+ Certification: Organizational Security

23 Questions
Security Plus Quizzes & Trivia

This is Set 4 of 4 of practice questions for Comptia Security+ Certification exam. This set covers the exam objective Organizational Security. You can take these for practice or take it as a topic wise practice exam. Wish you luck for the Security+ Certification Exam!

Please wait...
Questions and Answers
  • 1. 
    Why do you need to classify data?
    • A. 

      To decide which of it can be discarded

    • B. 

      To decide upon the security level required by the classified data

    • C. 

      To secure only the critical data and leave the rest unsecured

    • D. 

      None of the above

  • 2. 
    Which of the following can be referred to as confidential data?
    • A. 

      Intranet web site

    • B. 

      Customer information

    • C. 

      Budget related information

    • D. 

      None of the above

  • 3. 
    Monitoring is a best way of identifying sensitive data in the organization?
    • A. 

      True

    • B. 

      False

  • 4. 
    How would you secure the organization premises?
    • A. 

      Calling bells

    • B. 

      Bullet proof jackets

    • C. 

      Surveillance systems

    • D. 

      Public address systems

  • 5. 
    Cipher locks can be used for punch system locks. T/F?
    • A. 

      True

    • B. 

      False

  • 6. 
    Which of the following is needed for 24/7 surveillance?
    • A. 

      Power backup systems

    • B. 

      Network backup systems

    • C. 

      Mirror servers

    • D. 

      None of the above

  • 7. 
    Surge protectors are meant to protect electronic devices. T/F?
    • A. 

      True

    • B. 

      False

  • 8. 
    Which of the following can increase damage due to fire?
    • A. 

      Electric supply

    • B. 

      Air conditioner

    • C. 

      Electronic doors

    • D. 

      None of the above

  • 9. 
    Backup is required to provide fault tolerance to electronic data. T/F?
    • A. 

      True

    • B. 

      False

  • 10. 
    Which of the following enhances is an availability service?
    • A. 

      Server mirroring

    • B. 

      Server clustering

    • C. 

      PDC

    • D. 

      None of the above

  • 11. 
    Data backup must be stored offsite always. T/F?
    • A. 

      True

    • B. 

      False

  • 12. 
    Which of the following requires maximum restore time?
    • A. 

      Differential backup

    • B. 

      Incremental backup

    • C. 

      Master backup

    • D. 

      None of the above

  • 13. 
    Which of the following ensures quick return to business?
    • A. 

      Hot site

    • B. 

      Cold site

    • C. 

      Luke warm site

    • D. 

      None of the above

  • 14. 
    Which part of a security policy must be a mandatory part of policy briefing?
    • A. 

      The effect caused by security breach

    • B. 

      The duration required to make policies

    • C. 

      The total number of policies that are there.

    • D. 

      None of the above

  • 15. 
    Security policy briefing must be a part of which of the following?
    • A. 

      Security training

    • B. 

      Induction program

    • C. 

      Exit interview

    • D. 

      None of the above

  • 16. 
    Which of the following processes will verify policy implementation?
    • A. 

      Auditing

    • B. 

      Monitoring

    • C. 

      Troubleshooting

    • D. 

      None of the above

  • 17. 
    Which of the following is a common error in a network?
    • A. 

      Incorrect driver versions

    • B. 

      Incorrect patches

    • C. 

      Incorrect virus database updation

    • D. 

      None of the above

  • 18. 
    Risk management is an essential part of threat analysis. T/F?
    • A. 

      True

    • B. 

      False

  • 19. 
    Network resource being unavailable is not in the way of productivity of an organization. T/F?
    • A. 

      True

    • B. 

      False

  • 20. 
    Which of the following must an administrator ensure as far as user accounts are concerned.
    • A. 

      Account lock out status on the administrator

    • B. 

      Disable unnecessary users

    • C. 

      Rename all critical user accounts

    • D. 

      None of the above

  • 21. 
    Which of the following must get a dedicated scanning as far as electronic data is concerned?
    • A. 

      User data

    • B. 

      System data

    • C. 

      Email

    • D. 

      None of the above

  • 22. 
    Supporting multiple encryption standards will make a network platform insecure. T/F?
    • A. 

      True

    • B. 

      False

  • 23. 
    An organization has to classify all existing data before deciding on an encryption system. T/F?
    • A. 

      True

    • B. 

      False