Set4 CompTIA Security+ Certification Quiz! Exam

Approved & Edited by ProProfs Editorial Team
The editorial team at ProProfs Quizzes consists of a select group of subject experts, trivia writers, and quiz masters who have authored over 10,000 quizzes taken by more than 100 million users. This team includes our in-house seasoned quiz moderators and subject matter experts. Our editorial experts, spread across the world, are rigorously trained using our comprehensive guidelines to ensure that you receive the highest quality quizzes.
Learn about Our Editorial Process
| By Vaibhav Agarwal
V
Vaibhav Agarwal
Community Contributor
Quizzes Created: 58 | Total Attempts: 602,073
Questions: 23 | Attempts: 4,410

SettingsSettingsSettings
Security Plus Quizzes & Trivia

This is Set 4 of 4 of 23 practice questions for the CompTIA Security+ Certification exam. This set covers the exam objective Organizational Security. You can take these for practice or take it as a topic wise practice exam. Read the questions carefully and answer. Take your time. Wish you luck with the Security+ Certification quiz!


Questions and Answers
  • 1. 

    Why do you need to classify data?

    • A.

      To decide which of it can be discarded

    • B.

      To decide upon the security level required by the classified data

    • C.

      To secure only the critical data and leave the rest unsecured

    • D.

      None of the above

    Correct Answer
    B. To decide upon the security level required by the classified data
    Explanation
    It is important to have a classification of data to ensure correct levels of security to the relevant type of data.

    Rate this question:

  • 2. 

    Which of the following can be referred to as confidential data?

    • A.

      Intranet web site

    • B.

      Customer information

    • C.

      Budget related information

    • D.

      None of the above

    Correct Answer
    C. Budget related information
    Explanation
    Budget related information is classified as confidential information.

    Rate this question:

  • 3. 

    Monitoring is the best way of identifying sensitive data in the organization?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Auditing is the best process of taking stock of sensitive data in the network.

    Rate this question:

  • 4. 

    How would you secure the organization premises?

    • A.

      Calling bells

    • B.

      Bullet proof jackets

    • C.

      Surveillance systems

    • D.

      Public address systems

    Correct Answer
    C. Surveillance systems
    Explanation
    Surveillance systems are an integral part of tracking intruders and attackers.

    Rate this question:

  • 5. 

    Cipher locks can be used for punch system locks. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Cipher locks can be used in punch lock systems.

    Rate this question:

  • 6. 

    Which of the following is needed for 24/7 surveillance?

    • A.

      Power backup systems

    • B.

      Network backup systems

    • C.

      Mirror servers

    • D.

      None of the above

    Correct Answer
    A. Power backup systems
    Explanation
    Burglar alarms are connected to the electric supply. Hence it is important to backup power lines for emergency situation of power outages.

    Rate this question:

  • 7. 

    Surge protectors are meant to protect electronic devices. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Surge protectors provide electronic devices protection against power surge.

    Rate this question:

  • 8. 

    Which of the following can increase damage due to fire?

    • A.

      Electric supply

    • B.

      Air conditioner

    • C.

      Electronic doors

    • D.

      None of the above

    Correct Answer
    A. Electric supply
    Explanation
    Leaving the electric supply on during fire can have disastrous effect on the site. It can lead to electrical fire as well.

    Rate this question:

  • 9. 

    Backup is required to provide fault tolerance to electronic data. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    It is mandatory that data be given maximum online and offline fault tolerance.

    Rate this question:

  • 10. 

    Which of the following enhances is an availability service?

    • A.

      Server mirroring

    • B.

      Server clustering

    • C.

      PDC

    • D.

      None of the above

    Correct Answer
    B. Server clustering
    Explanation
    Server clustering is considered as an availability service because it provides fault tolerance against server failure with no downtime and keeps the user transparent to the process.

    Rate this question:

  • 11. 

    Data backup must be stored offsite always. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Explanation: Any off site location within the vicinity of the site will ensure that data backup is safe in case of fire and is also available at short notice when required to restore.

    Rate this question:

  • 12. 

    Which of the following requires maximum restore time?

    • A.

      Differential backup

    • B.

      Incremental backup

    • C.

      Master backup

    • D.

      None of the above

    Correct Answer
    C. Master backup
    Explanation
    Master back up or Full backup is a copy of all the files that are available on the storage media and hence requires maximum restore time.

    Rate this question:

  • 13. 

    Which of the following ensures quick return to business?

    • A.

      Hot site

    • B.

      Cold site

    • C.

      Luke warm site

    • D.

      None of the above

    Correct Answer
    A. Hot site
    Explanation
    A Hot site provides all resources required for a business to shift in case of emergency and be online within negligible time. It is also very expensive

    Rate this question:

  • 14. 

    Which part of a security policy must be a mandatory part of policy briefing?

    • A.

      The effect caused by security breach

    • B.

      The duration required to make policies

    • C.

      The total number of policies that are there.

    • D.

      None of the above

    Correct Answer
    A. The effect caused by security breach
    Explanation
    It is very essential for every employee/user to know the relevant security policies and the effect of security breach.

    Rate this question:

  • 15. 

    Security policy briefing must be a part of which of the following?

    • A.

      Security training

    • B.

      Induction program

    • C.

      Exit interview

    • D.

      None of the above

    Correct Answer
    B. Induction program
    Explanation
    The security policy briefing is nothing but the security program in short. It needs to be a part of induction program.

    Rate this question:

  • 16. 

    Which of the following processes will verify policy implementation?

    • A.

      Auditing

    • B.

      Monitoring

    • C.

      Troubleshooting

    • D.

      None of the above

    Correct Answer
    B. Monitoring
    Explanation
    Monitoring for implementation is very essential to ascertain that all policies that were created are in place.

    Rate this question:

  • 17. 

    Which of the following is a common error in a network?

    • A.

      Incorrect driver versions

    • B.

      Incorrect patches

    • C.

      Incorrect virus database updation

    • D.

      None of the above

    Correct Answer
    C. Incorrect virus database updation
    Explanation
    Virus database not being updated as per schedule could be a common but serious error on the network that leaves it open to inadvertent attacks.

    Rate this question:

  • 18. 

    Risk management is an essential part of threat analysis. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Threat analysis is not complete without performing risk management.

    Rate this question:

  • 19. 

    Network resource being unavailable is not in the way of the productivity of an organization. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Network resources not being available means the user has to manage with available resources and hence use more time than required to complete a task. This does affect productivity in a big way.

    Rate this question:

  • 20. 

    Which of the following must an administrator ensure as far as user accounts are concerned.

    • A.

      Account lock out status on the administrator

    • B.

      Disable unnecessary users

    • C.

      Rename all critical user accounts

    • D.

      None of the above

    Correct Answer
    B. Disable unnecessary users
    Explanation
    Disabling unnecessary users will ensure that unused accounts do not get misused by attackers.

    Rate this question:

  • 21. 

    Which of the following must get a dedicated scanning as far as electronic data is concerned?

    • A.

      User data

    • B.

      System data

    • C.

      Email

    • D.

      None of the above

    Correct Answer
    C. Email
    Explanation
    Emails must get dedicated scanning as they are the ones that carry the latest virus into the network. User data and System data will get scanned as per schedule.

    Rate this question:

  • 22. 

    Supporting multiple encryption standards will make a network platform insecure. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
    Explanation
    Supporting multiple encryption standards will make a network platform flexible.

    Rate this question:

  • 23. 

    An organization has to classify all existing data before deciding on an encryption system. T/F?

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
    Explanation
    Unless data has been classified, an organization cannot arrive at factual information and hence will not be able to correctly analyze which type of data needs what type of encryption system.

    Rate this question:

Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.