Security + Certification In Organizational Security

23 Questions | Total Attempts: 147

SettingsSettingsSettings
Security Plus Quizzes & Trivia

Organizational Security


Questions and Answers
  • 1. 
    Which type of policy defines the configuration of systems and networks, including the installation of software, hardware, and network connections?
    • A. 

      Administrative

    • B. 

      Usage

    • C. 

      User management

    • D. 

      Security

  • 2. 
    Which type of policy lays out guidelines and expectations for upgrades, monitoring, backups, and audits?
    • A. 

      Administrative

    • B. 

      Usage

    • C. 

      User management

    • D. 

      Security

  • 3. 
    Which of the following access attacks amounts to listening in on or overhearing parts of a conversation?
    • A. 

      Snooping

    • B. 

      Passive interception

    • C. 

      Eavesdropping

    • D. 

      Active interception

  • 4. 
    Which type of policy covers how information and resources are used?
    • A. 

      Administrative

    • B. 

      Usage

    • C. 

      User management

    • D. 

      Security

  • 5. 
    Which type of policy identifies the various actions that must occur in the normal course of employee activities?
    • A. 

      Administrative

    • B. 

      Usage

    • C. 

      User management

    • D. 

      Security

  • 6. 
    Which of the following is not a common level within an information policy?
    • A. 

      Confidential

    • B. 

      External

    • C. 

      Private

    • D. 

      Public

  • 7. 
    Which of the following is the term used to represent availability of 99.999 percent?
    • A. 

      Five nines

    • B. 

      Real time

    • C. 

      Fail over

    • D. 

      Surge time

  • 8. 
    What is the minimum number of disks necessary to implement RAID 0?
    • A. 

      1

    • B. 

      2

    • C. 

      3

    • D. 

      4

  • 9. 
    You have the server configured to automatically perform backups. A full backup is done every Sunday morning at 2 a.m. Differential backups are run every day at 7 a.m. You arrive at work Thursday morning to find the system crashed at 6 p.m. Wednesday night. How many backup sets must you restore to recover as much of the data as possible?
    • A. 

      1

    • B. 

      2

    • C. 

      3

    • D. 

      5

  • 10. 
    If a file system contains a log file of all changes and transactions that have occurred within a set period of time, what type of file system is it said to be?
    • A. 

      Journaling

    • B. 

      Highly available

    • C. 

      Shadowed

    • D. 

      Secure

  • 11. 
    Which type of backup storage is stored in the same location as the computer center?
    • A. 

      Working

    • B. 

      Warm

    • C. 

      Onsite

    • D. 

      Obtainable

  • 12. 
    During which of the following types of backups is the archive bit on individual files turned off? (Choose all that apply.)
    • A. 

      Full

    • B. 

      Incremental

    • C. 

      Differential

    • D. 

      Daily

  • 13. 
    In the "grandfather, father, son" backup plan, which refers to the most recent backup?
    • A. 

      Grandfather

    • B. 

      Father

    • C. 

      Son

    • D. 

      None of the above

  • 14. 
    Your manager has asked that you investigate the costs of renting a location that can provide operations within hours of a failure. What type of location is this known as?
    • A. 

      Hot

    • B. 

      Warm

    • C. 

      Cold

    • D. 

      Round

  • 15. 
    Which of the following is an agreement between your company and a service provider stipulating the performance you can expect or demand from the vendor?
    • A. 

      SND

    • B. 

      RSA

    • C. 

      SLA

    • D. 

      ATP

  • 16. 
    You have been told to collect the key metrics outlines in every SLA and document them. Which of the following is a measure of the anticipated incidence of failure for a system or component?
    • A. 

      MRA

    • B. 

      MTTR

    • C. 

      MBAC

    • D. 

      MTBF

  • 17. 
    What type of policy identifies the level of care used to maintain the confidentiality of private information?
    • A. 

      Separation of duties

    • B. 

      Due care

    • C. 

      Document disposal and destruction

    • D. 

      Incident response

  • 18. 
    What is the minimum number of disks necessary to implement RAID 1?
    • A. 

      1

    • B. 

      2

    • C. 

      3

    • D. 

      4

  • 19. 
    During which process must a forensics investigator be able to prove that the data being presented as evidence is the same data that was collected on the scene?
    • A. 

      Evidentiary

    • B. 

      Analytic

    • C. 

      Custody

    • D. 

      Confirmation

  • 20. 
    Which type of policy should exist that defines the requirements, responsible parties, and procedures to follow after the collection of evidence?
    • A. 

      Preservation of evidence

    • B. 

      Information retention

    • C. 

      Chain-of-custody

    • D. 

      Storage

  • 21. 
    Which of the following is a collection of data that is removed from the system because it's no longer needed on a regular basis?
    • A. 

      Backup

    • B. 

      Inventory

    • C. 

      Array

    • D. 

      Archive

  • 22. 
    Which of the following is a regulation that mandates national standards and procedures for the storage, use, and transmission of personal medical information?
    • A. 

      FERPA

    • B. 

      HIPAA

    • C. 

      CESA

    • D. 

      Gramm-Leach-Bliley Act

  • 23. 
    Which of the following is not one of the three key steps of the forensics process?
    • A. 

      Analyzing the evidence

    • B. 

      Acquiring the evidence

    • C. 

      Copying the evidence

    • D. 

      Authenticating the evidence

Back to Top Back to top