Our team has conducted extensive research to compile a set of Comptia Security +: Domain2 Compliance And Organization Security MCQs. We encourage you to test your Comptia Security +: Domain2 Compliance And Organization Security knowledge by answering these 30 multiple-choice questions provided below.
Simply scroll down to begin!
A. An agreement between two companies to store each others data
B. Eradicate any causes of the incident
C. As well as security consultants
D. Physical surveillance methods
A. One
B. Memory
C. Hard drive
D. Due care
A. Device lock
B. Chain of custody
C. Cold site
D. Legitimate use of system accounts
A. RBAC
B. Preset lock
C. Loss of power - Tornado - Terrorism - Hijacking
D. Not to duplicate
A. Technical access control
B. Computer forensics
C. High in cost - and hard to implement
D. An agreement between two companies to store each others data
A. Acceptable use policy
B. Risk management
C. Memory
D. Shutting down the affected system
A. Chain of custody
B. Security policy
C. Running programs that modify files
D. Physical surveillance methods
A. High in cost - and hard to implement
B. Not to duplicate
C. Due care
D. Shutting down the affected system
A. Chain of custody
B. High in cost - and hard to implement
C. Biometric lock
D. RBAC
A. Validate the authenticity of their evidence
B. Chain of custody
C. Physical surveillance methods
D. Acceptable use policy
A. An agreement between two companies to store each others data
B. The data and memory on the system
C. Computer forensics
D. A regular backup strategy
A. Not to duplicate
B. Security policy
C. Memory
D. Logging
A. Biometric lock
B. Preset lock
C. Slot lock
D. Cable trap
A. Chain of custody
B. Well documented paper records
C. Device lock
D. Security policy
A. Piggybacking
B. Shutting down the affected system
C. Natural - External - Human induced accidents - Armed conflict
D. Cable trap
A. Slot lock
B. Incident response policy
C. Well documented paper records
D. High in cost - and hard to implement
A. Security policy
B. Hot site
C. Physical surveillance methods
D. Warm site
A. Loss of power - Tornado - Terrorism - Hijacking
B. Security policy
C. RBAC
D. Cold site
A. One
B. Well documented paper records
C. Shutting down the affected system
D. Loss of power - Tornado - Terrorism - Hijacking
A. RBAC
B. The process of seizing - accessing - storing - or transferring digital evidence should be fully documented and made available for review - Only copies of evidence should be manipulated or analyzed whenever possible - Any investigation and analysis p
C. Eradicate any causes of the incident
D. Argon
A. The data and memory on the system
B. Water - Soda acid
C. Running programs that modify files
D. Argon
A. Cable trap
B. Delegating
C. Argon
D. Warm site
A. Eradicate any causes of the incident
B. Hot site
C. Not to duplicate
D. As well as security consultants
A. Shutting down the affected system
B. Running programs that modify files
C. Memory
D. RBAC
A. Natural - External - Human induced accidents - Armed conflict
B. An agreement between two companies to store each others data
C. Incident response policy
D. Delegating
A. As well as security consultants
B. Cold site
C. Piggybacking
D. Shutting down the affected system
A. Running programs that modify files
B. Volatility - Susceptible to tampering
C. Cold site
D. As well as security consultants
A. Not to duplicate
B. An agreement between two companies to store each others data
C. Chain of custody
D. It must be handled properly
A. Device lock
B. A regular backup strategy
C. An agreement between two companies to store each others data
D. Computer forensics
A. Lightning rods
B. Risk management
C. Device lock
D. The data and memory on the system