SUBJECTS
|
BROWSE
|
CAREER CENTER
|
POPULAR
|
JOIN
|
LOGIN
Business Skills
|
Soft Skills
|
Basic Literacy
|
Certifications
About
|
Help
|
Privacy
|
Terms
|
Email
Search
Test your basic knowledge |
Comptia Security +: Domain2 Compliance And Organization Security
Start Test
Study First
Subjects
:
certifications
,
comptia-security-+
,
it-skills
Instructions:
Answer 47 questions in 15 minutes.
If you are not ready to take this test, you can
study here
.
Match each statement with the correct term.
Don't refresh. All questions and answers are randomly picked and ordered every time you load a test.
This is a study tool. The 3 wrong answers for each question are randomly chosen from answers to other questions. So, you might find at times the answers obvious, but you will see it re-enforces your understanding as you take the test each time.
1. The forensic investigators should avoid _____________ where potential evidence is concerned.
running programs that modify files
Logging
lightning rods
as well as security consultants
2. Locks that use a physical lock and key
Loss of power - Tornado - Terrorism - Hijacking
Risk management
Preset lock
validate the authenticity of their evidence
3. Examples of events that could be classified as potential threats to your network
Water - Soda acid
Cold site
Loss of power - Tornado - Terrorism - Hijacking
a regular backup strategy
4. Digital signatures enable forensic specialists to...
lightning rods
delegating
Slot lock
validate the authenticity of their evidence
5. It is extremely important to have your disaster recovery plan including __________ stored in a safe place.
the data and memory on the system
running programs that modify files
delegating
well documented paper records
6. When choosing a site that will be used for storage it is important ________ the environment found at the site used for your daily operations.
not to duplicate
Acceptable use policy
due care
Piggybacking
7. Which process is responsible for recovery of data - and the preservation of digital evidence?
Loss of power - Tornado - Terrorism - Hijacking
high in cost - and hard to implement
Natural - External - Human induced accidents - Armed conflict
Computer forensics
8. This identifies a policy that addresses how to deal with a security incident after that incident has happened?
Incident response policy
shutting down the affected system
well documented paper records
Device lock
9. When collecting evidence - the 'state' of a crime scene should not be modified. This includes both...
the data and memory on the system
technical access control
Cold site
Security policy
10. The practice of an unauthorized individual gaining access to a facility by following closely behind an authorized employee is known as...
Piggybacking
physical surveillance methods
Water - Soda acid
It must be handled properly
11. With respect to the volatility of evidence - represents the most volatile area of the system?
Warm site
validate the authenticity of their evidence
as well as security consultants
Memory
12. Represents that an organization is responsibly managing it's data and security
due care
shutting down the affected system
Risk management
Cable trap
13. Biometric security systems are...
eradicate any causes of the incident
high in cost - and hard to implement
a regular backup strategy
shutting down the affected system
14. Ventilation can be considered a category of...
Piggybacking
technical access control
Hard drive
a regular backup strategy
15. Addresses the use of computer equipment and network resources for use that is non-beneficial to the company
accuracy of the information maintained by the security department
as well as security consultants
Acceptable use policy
Water - Soda acid
16. This represents a backup site that is partially configured with some equipment
Cable trap
RBAC
legitimate use of system accounts
Warm site
17. The process of keeping track of all individuals that have accessed the evidence is referred to as...
lightning rods
Biometric lock
Chain of custody
not to duplicate
18. The process of identifying assets - determining their value - and then determining possible threats to those assets is referred to as...
Risk management
Piggybacking
Hard drive
Incident response policy
19. An effective disaster recovery plan for a small company could be as simple as...
Hard drive
well documented paper records
a regular backup strategy
Cold site
20. Which choice represents the most expensive solution for an alternative backup site?
Hard drive
Hot site
delegating
Natural - External - Human induced accidents - Armed conflict
21. Which door lock type is considered most secure?
Biometric lock
incident response policy
Memory
shutting down the affected system
22. When any incident is detected - _____________ is not onsidered a best practice in order to maintain security.
RBAC
shutting down the affected system
Cold site
not to duplicate
23. A backup site that contains only basic computing environments such as wiring - ventilation - and flooring.
Hard drive
Water - Soda acid
Cold site
One
24. A general statement produced by senior management and the technology department to dictate what security means to the organization?
Security policy
Loss of power - Tornado - Terrorism - Hijacking
Acceptable use policy
as well as security consultants
25. The process of distributing tasks among a number of individuals in order to minimize the effect of employee attrition while also creating a manageable learning curve for new employees is known as...
shutting down the affected system
Preset lock
delegating
The process of seizing - accessing - storing - or transferring digital evidence should be fully documented and made available for review - Only copies of evidence should be manipulated or analyzed whenever possible - Any investigation and analysis p
26. The process of writing information to the security log is known as...
Memory
Hard drive
Logging
Natural - External - Human induced accidents - Armed conflict
27. When access to services or resources are organized by using rules - which access control model is being used?
lightning rods
RBAC
not to duplicate
Cold site
28. Example of the concept of a reciprocal backup agreement?
validate the authenticity of their evidence
legitimate use of system accounts
accuracy of the information maintained by the security department
An agreement between two companies to store each others data
29. An ideal facility would have a secure perimeter and secure access points. What is the recommended number of access points?
Preset lock
incident response policy
One
Computer forensics
30. A security guard is instrumental in deploying...
Cold site
physical surveillance methods
shutting down the affected system
Piggybacking
31. Disasters can be broadly classified into these categories...
Warm site
Natural - External - Human induced accidents - Armed conflict
Biometric lock
running programs that modify files
32. A characteristic of Digital evidence
shutting down the affected system
Acceptable use policy
lightning rods
Volatility - Susceptible to tampering
33. Necessary when handling digital evidence in order for it to be admissible in court?
Security policy
It must be handled properly
accuracy of the information maintained by the security department
Warm site
34. This identifies a device lock that prevents unauthorized removal of cables from computer devices?
Piggybacking
Cable trap
eradicate any causes of the incident
Computer forensics
35. With respect to the volatility of evidence - the least volatile area of the system.
Hard drive
Computer forensics
a regular backup strategy
Slot lock
36. The recommended fire suppression method for an electrical fire
Cold site
Water - Soda acid
lightning rods
Argon
37. An intrusion detection system is considered an integral part of an...
incident response policy
Warm site
physical surveillance methods
validate the authenticity of their evidence
38. The least expensive solution for an alternative backup site?
legitimate use of system accounts
Incident response policy
Cold site
Logging
39. Once an incident has been contained it will be necessary to...
Warm site
lightning rods
Hard drive
eradicate any causes of the incident
40. The accuracy of biometric security systems is dependent in large part on the...
The process of seizing - accessing - storing - or transferring digital evidence should be fully documented and made available for review - Only copies of evidence should be manipulated or analyzed whenever possible - Any investigation and analysis p
Computer forensics
accuracy of the information maintained by the security department
Memory
41. System security scans should be performed by in-house staff...
Memory
as well as security consultants
Slot lock
Preset lock
42. Educating users about the ___________ should be part of any user security training package.
RBAC
Device lock
accuracy of the information maintained by the security department
legitimate use of system accounts
43. A lock that secures computer hardware and network devices?
It must be handled properly
incident response policy
the data and memory on the system
Device lock
44. Important principles governing the collection - preservation - and access of digital data.
Hot site
The process of seizing - accessing - storing - or transferring digital evidence should be fully documented and made available for review - Only copies of evidence should be manipulated or analyzed whenever possible - Any investigation and analysis p
Water - Soda acid
the data and memory on the system
45. Recommended fire suppression methods for common combustibles
Slot lock
eradicate any causes of the incident
One
Water - Soda acid
46. The use of __________ should be evaluated when considering natural disaster safeguards.
Security policy
Hard drive
Cable trap
lightning rods
47. A lock that covers the expansion slots on computer devices
Slot lock
Biometric lock
a regular backup strategy
high in cost - and hard to implement