Set4 CompTIA Security+ Certification Quiz! Exam

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Vaibhav Agarwal
V
Vaibhav Agarwal
Community Contributor
Quizzes Created: 58 | Total Attempts: 624,400
| Attempts: 4,411 | Questions: 23
Please wait...
Question 1 / 23
0 %
0/100
Score 0/100
1. How would you secure the organization premises?

Explanation

Surveillance systems are an integral part of tracking intruders and attackers.

Submit
Please wait...
About This Quiz
Security Plus Quizzes & Trivia

This is Set 4 of 4 of 23 practice questions for the CompTIA Security+ Certification exam. This set covers the exam objective Organizational Security. You can take these... see morefor practice or take it as a topic wise practice exam. Read the questions carefully and answer. Take your time. Wish you luck with the Security+ Certification quiz! see less

2. Which of the following ensures quick return to business?

Explanation

A Hot site provides all resources required for a business to shift in case of emergency and be online within negligible time. It is also very expensive

Submit
3. Surge protectors are meant to protect electronic devices. T/F?

Explanation

Surge protectors provide electronic devices protection against power surge.

Submit
4. Why do you need to classify data?

Explanation

It is important to have a classification of data to ensure correct levels of security to the relevant type of data.

Submit
5. Risk management is an essential part of threat analysis. T/F?

Explanation

Threat analysis is not complete without performing risk management.

Submit
6. Supporting multiple encryption standards will make a network platform insecure. T/F?

Explanation

Supporting multiple encryption standards will make a network platform flexible.

Submit
7. Which part of a security policy must be a mandatory part of policy briefing?

Explanation

It is very essential for every employee/user to know the relevant security policies and the effect of security breach.

Submit
8. Network resource being unavailable is not in the way of the productivity of an organization. T/F?

Explanation

Network resources not being available means the user has to manage with available resources and hence use more time than required to complete a task. This does affect productivity in a big way.

Submit
9. Which of the following must an administrator ensure as far as user accounts are concerned.

Explanation

Disabling unnecessary users will ensure that unused accounts do not get misused by attackers.

Submit
10. Which of the following is needed for 24/7 surveillance?

Explanation

Burglar alarms are connected to the electric supply. Hence it is important to backup power lines for emergency situation of power outages.

Submit
11. Backup is required to provide fault tolerance to electronic data. T/F?

Explanation

It is mandatory that data be given maximum online and offline fault tolerance.

Submit
12. Which of the following can increase damage due to fire?

Explanation

Leaving the electric supply on during fire can have disastrous effect on the site. It can lead to electrical fire as well.

Submit
13. Which of the following must get a dedicated scanning as far as electronic data is concerned?

Explanation

Emails must get dedicated scanning as they are the ones that carry the latest virus into the network. User data and System data will get scanned as per schedule.

Submit
14. Which of the following enhances is an availability service?

Explanation

Server clustering is considered as an availability service because it provides fault tolerance against server failure with no downtime and keeps the user transparent to the process.

Submit
15. Monitoring is the best way of identifying sensitive data in the organization?

Explanation

Auditing is the best process of taking stock of sensitive data in the network.

Submit
16. Cipher locks can be used for punch system locks. T/F?

Explanation

Cipher locks can be used in punch lock systems.

Submit
17. An organization has to classify all existing data before deciding on an encryption system. T/F?

Explanation

Unless data has been classified, an organization cannot arrive at factual information and hence will not be able to correctly analyze which type of data needs what type of encryption system.

Submit
18. Data backup must be stored offsite always. T/F?

Explanation

Explanation: Any off site location within the vicinity of the site will ensure that data backup is safe in case of fire and is also available at short notice when required to restore.

Submit
19. Security policy briefing must be a part of which of the following?

Explanation

The security policy briefing is nothing but the security program in short. It needs to be a part of induction program.

Submit
20. Which of the following is a common error in a network?

Explanation

Virus database not being updated as per schedule could be a common but serious error on the network that leaves it open to inadvertent attacks.

Submit
21. Which of the following requires maximum restore time?

Explanation

Master back up or Full backup is a copy of all the files that are available on the storage media and hence requires maximum restore time.

Submit
22. Which of the following can be referred to as confidential data?

Explanation

Budget related information is classified as confidential information.

Submit
23. Which of the following processes will verify policy implementation?

Explanation

Monitoring for implementation is very essential to ascertain that all policies that were created are in place.

Submit
View My Results

Quiz Review Timeline (Updated): Mar 21, 2022 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 21, 2022
    Quiz Edited by
    ProProfs Editorial Team
  • Nov 18, 2006
    Quiz Created by
    Vaibhav Agarwal
Cancel
  • All
    All (23)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
How would you secure the organization premises?
Which of the following ensures quick return to business?
Surge protectors are meant to protect electronic devices. T/F?
Why do you need to classify data?
Risk management is an essential part of threat analysis. T/F?
Supporting multiple encryption standards will make a network platform...
Which part of a security policy must be a mandatory part of policy...
Network resource being unavailable is not in the way of the...
Which of the following must an administrator ensure as far as user...
Which of the following is needed for 24/7 surveillance?
Backup is required to provide fault tolerance to electronic data. T/F?
Which of the following can increase damage due to fire?
Which of the following must get a dedicated scanning as far as...
Which of the following enhances is an availability service?
Monitoring is the best way of identifying sensitive data in the...
Cipher locks can be used for punch system locks. T/F?
An organization has to classify all existing data before deciding on...
Data backup must be stored offsite always. T/F?
Security policy briefing must be a part of which of the following?
Which of the following is a common error in a network?
Which of the following requires maximum restore time?
Which of the following can be referred to as confidential data?
Which of the following processes will verify policy implementation?
Alert!

Advertisement