Comptia Security +: Domain2 Compliance And Organization Security MCQs

Comptia Security +: Domain2 Compliance And Organization Security MCQs

Our team has conducted extensive research to compile a set of Comptia Security +: Domain2 Compliance And Organization Security MCQs. We encourage you to test your Comptia Security +: Domain2 Compliance And Organization Security knowledge by answering these 30 multiple-choice questions provided below.
Simply scroll down to begin!

1: System security scans should be performed by in-house staff...

A.   An agreement between two companies to store each others data

B.   Eradicate any causes of the incident

C.   As well as security consultants

D.   Physical surveillance methods

2: With respect to the volatility of evidence - represents the most volatile area of the system?

A.   One

B.   Memory

C.   Hard drive

D.   Due care

3: Educating users about the ___________ should be part of any user security training package.

A.   Device lock

B.   Chain of custody

C.   Cold site

D.   Legitimate use of system accounts

4: Locks that use a physical lock and key

A.   RBAC

B.   Preset lock

C.   Loss of power - Tornado - Terrorism - Hijacking

D.   Not to duplicate

5: Ventilation can be considered a category of...

A.   Technical access control

B.   Computer forensics

C.   High in cost - and hard to implement

D.   An agreement between two companies to store each others data

6: The process of identifying assets - determining their value - and then determining possible threats to those assets is referred to as...

A.   Acceptable use policy

B.   Risk management

C.   Memory

D.   Shutting down the affected system

7: The forensic investigators should avoid _____________ where potential evidence is concerned.

A.   Chain of custody

B.   Security policy

C.   Running programs that modify files

D.   Physical surveillance methods

8: Biometric security systems are...

A.   High in cost - and hard to implement

B.   Not to duplicate

C.   Due care

D.   Shutting down the affected system

9: Which door lock type is considered most secure?

A.   Chain of custody

B.   High in cost - and hard to implement

C.   Biometric lock

D.   RBAC

10: Addresses the use of computer equipment and network resources for use that is non-beneficial to the company

A.   Validate the authenticity of their evidence

B.   Chain of custody

C.   Physical surveillance methods

D.   Acceptable use policy

11: Which process is responsible for recovery of data - and the preservation of digital evidence?

A.   An agreement between two companies to store each others data

B.   The data and memory on the system

C.   Computer forensics

D.   A regular backup strategy

12: The process of writing information to the security log is known as...

A.   Not to duplicate

B.   Security policy

C.   Memory

D.   Logging

13: A lock that covers the expansion slots on computer devices

A.   Biometric lock

B.   Preset lock

C.   Slot lock

D.   Cable trap

14: It is extremely important to have your disaster recovery plan including __________ stored in a safe place.

A.   Chain of custody

B.   Well documented paper records

C.   Device lock

D.   Security policy

15: This identifies a device lock that prevents unauthorized removal of cables from computer devices?

A.   Piggybacking

B.   Shutting down the affected system

C.   Natural - External - Human induced accidents - Armed conflict

D.   Cable trap

16: This identifies a policy that addresses how to deal with a security incident after that incident has happened?

A.   Slot lock

B.   Incident response policy

C.   Well documented paper records

D.   High in cost - and hard to implement

17: Which choice represents the most expensive solution for an alternative backup site?

A.   Security policy

B.   Hot site

C.   Physical surveillance methods

D.   Warm site

18: The least expensive solution for an alternative backup site?

A.   Loss of power - Tornado - Terrorism - Hijacking

B.   Security policy

C.   RBAC

D.   Cold site

A.   One

B.   Well documented paper records

C.   Shutting down the affected system

D.   Loss of power - Tornado - Terrorism - Hijacking

20: Important principles governing the collection - preservation - and access of digital data.

A.   RBAC

B.   The process of seizing - accessing - storing - or transferring digital evidence should be fully documented and made available for review - Only copies of evidence should be manipulated or analyzed whenever possible - Any investigation and analysis p

C.   Eradicate any causes of the incident

D.   Argon

A.   The data and memory on the system

B.   Water - Soda acid

C.   Running programs that modify files

D.   Argon

22: This represents a backup site that is partially configured with some equipment

A.   Cable trap

B.   Delegating

C.   Argon

D.   Warm site

23: Once an incident has been contained it will be necessary to...

A.   Eradicate any causes of the incident

B.   Hot site

C.   Not to duplicate

D.   As well as security consultants

24: When any incident is detected - _____________ is not onsidered a best practice in order to maintain security.

A.   Shutting down the affected system

B.   Running programs that modify files

C.   Memory

D.   RBAC

25: Disasters can be broadly classified into these categories...

A.   Natural - External - Human induced accidents - Armed conflict

B.   An agreement between two companies to store each others data

C.   Incident response policy

D.   Delegating

26: A backup site that contains only basic computing environments such as wiring - ventilation - and flooring.

A.   As well as security consultants

B.   Cold site

C.   Piggybacking

D.   Shutting down the affected system

27: A characteristic of Digital evidence

A.   Running programs that modify files

B.   Volatility - Susceptible to tampering

C.   Cold site

D.   As well as security consultants

28: Example of the concept of a reciprocal backup agreement?

A.   Not to duplicate

B.   An agreement between two companies to store each others data

C.   Chain of custody

D.   It must be handled properly

29: An effective disaster recovery plan for a small company could be as simple as...

A.   Device lock

B.   A regular backup strategy

C.   An agreement between two companies to store each others data

D.   Computer forensics

30: A lock that secures computer hardware and network devices?

A.   Lightning rods

B.   Risk management

C.   Device lock

D.   The data and memory on the system