Security + Certification In Organizational Security

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Joelcg
J
Joelcg
Community Contributor
Quizzes Created: 5 | Total Attempts: 5,427
| Attempts: 243 | Questions: 23
Please wait...
Question 1 / 23
0 %
0/100
Score 0/100
1. In the "grandfather, father, son" backup plan, which refers to the most recent backup?

Explanation

The most recent backup is the son. After another backup is done, the son becomes the father and then the grandfather.

Submit
Please wait...
About This Quiz
Security Plus Quizzes & Trivia

This SECURITY + Certification quiz assesses knowledge in organizational security, focusing on policies for system configurations, administrative guidelines, and access security. It prepares learners for roles requiring stringent... see moresecurity measures and adherence to industry standards. see less

2. Which of the following is a regulation that mandates national standards and procedures for the storage, use, and transmission of personal medical information?

Explanation

The Health Insurance Portability and Accountability Act (HIPAA) is a regulation that mandates national standards and procedures for the storage, use, and transmission of personal medical information. The Family Educational Rights and Privacy Act (FERPA) dictates that educational institutions may not release information to unauthorized parties without the express permission of the student or their parents. The Cyberspace Electronic Security Act (CESA) gives law enforcement the right to gain access to encryption keys and cryptography methods. The Gramm-Leach-Bliley Act requires financial institutions to develop privacy notices and notify customers that they are entitled to privacy.

Submit
3. Which type of policy identifies the various actions that must occur in the normal course of employee activities?

Explanation

A user management policy identifies the various actions that must occur in the normal course of employee activities. An administrative policy lays out guidelines and expectations for upgrades, monitoring, backups, and audits. A usage policy covers how information and resources are used. A security policy defines the configuration of systems and networks, including the installation of software, hardware, and network connections.

Submit
4. Which of the following is a collection of data that is removed from the system because it's no longer needed on a regular basis?

Explanation

An archive is a collection of data that is removed from the system because it's no longer needed on a regular basis. A backup is a restorable copy of any set of data that is needed on the system. The other two choices are not relevant.

Submit
5. Which of the following access attacks amounts to listening in on or overhearing parts of a conversation?

Explanation

All of the choices listed are various types of access attacks. In an eavesdropping attack, the attacker listens in on or overhears parts of a conversation. In a snooping attack, someone looks through your files in hopes of finding something interesting. In a passive interception attack, someone routinely monitors network traffic. In an active interception attack, a computer is placed between the sender and receiver to capture information while it's sent.

Submit
6. Which type of backup storage is stored in the same location as the computer center?

Explanation

Onsite storage refers to backup information stored locally; this is often the most recent set of backups.

Submit
7. What is the minimum number of disks necessary to implement RAID 1?

Explanation

RAID 1, mirroring, requires a minimum of two disks. RAID 0, disk striping, requires a minimum of two disks. RAID 3, disk striping with a dedicated parity disk, requires a minimum of three disks. RAID 5, disk striping with parity, requires a minimum of three disks.

Submit
8. Which type of policy covers how information and resources are used?

Explanation

A usage policy covers how information and resources are used. An administrative policy lays out guidelines and expectations for upgrades, monitoring, backups, and audits. A user management policy identifies the various actions that must occur in the normal course of employee activities. A security policy defines the configuration of systems and networks, including the installation of software, hardware, and network connections.

Submit
9. Which of the following is an agreement between your company and a service provider stipulating the performance you can expect or demand from the vendor?

Explanation

A service-level agreement (SLA) is an agreement between your company and a service provider stipulating the performance you can expect or demand from the vendor.

Submit
10. Which of the following is not a common level within an information policy?

Explanation

The common levels within an information policy are public (for all advertisements and information posted on the Web), internal (for all intranet-type information), private (for personnel records, client data, and so on), and confidential (PKI information and other restricted data).

Submit
11. Which type of policy should exist that defines the requirements, responsible parties, and procedures to follow after the collection of evidence?

Explanation

A chain-of-custody policy should exist that defines the requirements, responsible parties, and procedures to follow after the collection of evidence. Preservation of evidence needs to happen, but it is not a policy in and of itself. An information retention policy details how long data is retained. A storage policy defines how information is stored.

Submit
12. If a file system contains a log file of all changes and transactions that have occurred within a set period of time, what type of file system is it said to be?

Explanation

A journaling file system contains a log file of all changes and transactions that have occurred within a set period of time.

Submit
13. Which type of policy lays out guidelines and expectations for upgrades, monitoring, backups, and audits?

Explanation

An administrative policy lays out guidelines and expectations for upgrades, monitoring, backups, and audits. A usage policy covers how information and resources are used. A user management policy identifies the various actions that must occur in the normal course of employee activities. A security policy defines the configuration of systems and networks, including the installation of software, hardware, and network connections.

Submit
14. What is the minimum number of disks necessary to implement RAID 0?

Explanation

RAID 0, disk striping, requires a minimum of two disks. RAID 1, mirroring, requires a minimum of two disks. RAID 3, disk striping with a dedicated parity disk, requires a minimum of three disks. RAID 5, disk striping with parity, requires a minimum of three disks.

Submit
15. What type of policy identifies the level of care used to maintain the confidentiality of private information?

Explanation

A due care policy identifies the level of care used to maintain the confidentiality of private information. A separation of duties policy is intended to reduce the risk of fraud and prevent losses in an organization. A document disposal and destruction policy is used to define how information that is no longer needed is handled. An incident response policy defines how an organization will respond to an incident.

Submit
16. Which of the following is not one of the three key steps of the forensics process?

Explanation

The three key steps of the forensics process are acquiring the evidence, authenticating the evidence, and analyzing the evidence.

Submit
17. Which of the following is the term used to represent availability of 99.999 percent?

Explanation

Availability of 99.999 percent is known as five nines availability.

Submit
18. Which type of policy defines the configuration of systems and networks, including the installation of software, hardware, and network connections?

Explanation

A security policy defines the configuration of systems and networks, including the installation of software, hardware, and network connections. An administrative policy lays out guidelines and expectations for upgrades, monitoring, backups, and audits. A usage policy covers how information and resources are used. A user management policy identifies the various actions that must occur in the normal course of employee activities.

Submit
19. You have been told to collect the key metrics outlines in every SLA and document them. Which of the following is a measure of the anticipated incidence of failure for a system or component?

Explanation

Mean Time Before Failure (MTBF) is a measure of the anticipated incidence of failure for a system or component. Mean Time To Repair (MTTR) is a measurement of how long it takes to repair a system or component after a failure has occurred. The other two choices do not represent metrics.

Submit
20. Your manager has asked that you investigate the costs of renting a location that can provide operations within hours of a failure. What type of location is this known as?

Explanation

A hot site is a location that can provide operations within hours of a failure. A warm site provides some of the capabilities of a hot site but requires more work to become operational. A cold site is a facility that isn't immediately ready to use; you must bring along your own network and equipment. There is no such entity as a round site.

Submit
21. You have the server configured to automatically perform backups. A full backup is done every Sunday morning at 2 a.m. Differential backups are run every day at 7 a.m. You arrive at work Thursday morning to find the system crashed at 6 p.m. Wednesday night. How many backup sets must you restore to recover as much of the data as possible?

Explanation

After replacing the failed drive, you would restore the full backup from Sunday. Following that, you would restore the most recent differential backup, which was done at 7 a.m. Wednesday.

Submit
22. During which process must a forensics investigator be able to prove that the data being presented as evidence is the same data that was collected on the scene?

Explanation

During the evidentiary process, a forensics investigator must be able to prove that the data being presented as evidence is the same data that was collected on the scene.

Submit
23. During which of the following types of backups is the archive bit on individual files turned off? (Choose all that apply.)

Explanation

The archive bit is turned off after a full or incremental backup. The archive bit is left on after a differential or daily backup.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Dec 27, 2010
    Quiz Created by
    Joelcg
Cancel
  • All
    All (23)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
In the "grandfather, father, son" backup plan, which refers to the...
Which of the following is a regulation that mandates national...
Which type of policy identifies the various actions that must occur in...
Which of the following is a collection of data that is removed from...
Which of the following access attacks amounts to listening in on or...
Which type of backup storage is stored in the same location as the...
What is the minimum number of disks necessary to implement RAID 1?
Which type of policy covers how information and resources are used?
Which of the following is an agreement between your company and a ...
Which of the following is not a common level within an information...
Which type of policy should exist that defines the requirements, ...
If a file system contains a log file of all changes and transactions ...
Which type of policy lays out guidelines and expectations for...
What is the minimum number of disks necessary to implement RAID 0?
What type of policy identifies the level of care used to maintain the...
Which of the following is not one of the three key steps of the...
Which of the following is the term used to represent availability of...
Which type of policy defines the configuration of systems and...
You have been told to collect the key metrics outlines in every SLA...
Your manager has asked that you investigate the costs of renting a ...
You have the server configured to automatically perform backups. A...
During which process must a forensics investigator be able to prove...
During which of the following types of backups is the archive bit on...
Alert!

Advertisement