Security+ - Domain 5 - Compliance and Operational Security (Test)

Card Set Information

Author:
mpskeeter
ID:
310953
Filename:
Security+ - Domain 5 - Compliance and Operational Security (Test)
Updated:
2015-11-05 06:35:48
Tags:
Security Compliance Operational Test
Folders:
Security+
Description:
Security+ Domain 5 - Compliance and Operational Security (Test)
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user mpskeeter on FreezingBlue Flashcards. What would you like to do?


  1. Which of the following answers list an example order of volatility for a typical system?

    A) Memory dump, disk files, temporary files, archival media
    B) Memory dump, temporary files, disk files, archival media
    C) Temporary files, memory dump, archival media, disk files
    D) Archival media, disk files, temporary files, memory dump
    B) Memory dump, temporary files, disk files, archival media
    (this multiple choice question has been scrambled)
  2. An exact copy of the entire state of the computer system is called:

    A) System image
    B) Restore point
    C) Hard copy
    D) Digital signature
    A) System image
    (this multiple choice question has been scrambled)
  3. In forensic analysis, taking hashes ensures that the collected evidence retains:

    A) Availability
    B) Order of volatility
    C) Confidentiality
    D) Integrity
    D) Integrity
    (this multiple choice question has been scrambled)
  4. Log analysis should not take into account the difference between the reading of the system clock and standard time as this impedes the reconstruction of the sequence of events during an attack or security breach?

    A) True
    B) False
    B) False
  5. Which of the following acronyms refers to any type of information pertaining to an individual that can be used to uniquely identify that person?

    A) PIN
    B) ID
    C) PII
    D) PKI
    C) PII
    (this multiple choice question has been scrambled)
  6. A sticky note with a password kept on sight in user's cubicle would be a violation of which of the following policies?

    A) User account policy
    B) Data labeling policy
    C) Clean desk policy
    D) Password complexity
    C) Clean desk policy
    (this multiple choice question has been scrambled)
  7. Which of the following security controls is used to prevent tailgating?

    A) Mantraps
    B) EMI Sheidling
    C) Hardware locks
    D) Video surveillance
    A) Mantraps
    (this multiple choice question has been scrambled)
  8. Zero-day attack exploits:

    A) Vulnerability that is present in already released software buy unknown to the software developer
    B) New accounts
    C) Patched software
    D) Well known vulnerability
    A) Vulnerability that is present in already released software buy unknown to the software developer
    (this multiple choice question has been scrambled)
  9. A system combining heating, ventilation, and air conditioning controls i known as:

    A) VTC
    B) HMAC
    C) HVAC
    D) RADIUS
    C) HVAC
    (this multiple choice question has been scrambled)
  10. EMI shielding protects the data from: (Select all that apply)

    A) Outside interference
    B) Phishing
    C) Eavesdropping
    D) Decryption
    E) Bluesnarfing
    • A) Outside interference
    • C) Eavesdropping
  11. Setting up hot and cold aisles in a server room allows for more efficient management of:

    A) Humidity
    B) Data handling
    C) Air flow
    D) EMI
    C) Air flow
    (this multiple choice question has been scrambled)
  12. Which of the following answers list examples of physical security control types? (Select all that apply)

    A) Fire suppression
    B) Environmental Monitoring
    C) Biometrics
    D) Motion Detection
    E) Video Surveillance
    • C) Biometrics
    • D) Motion Detection
    • E) Video Surveillance
  13. Which of the following examples falls into the category of deterrent security control type?

    A) Motion detection
    B) Alarms
    C) Access list
    D) Lighting
    D) Lighting
    (this multiple choice question has been scrambled)
  14. Which of the following solutions add(s) redundancy in areas identified as single points of failure?

    A) Virtualization
    B) RAID
    C) Hot site
    D) UPS
    E) Backup generator
    • B) RAID
    • C) Hot site
    • D) UPS
    • E) Backup generator
  15. What is the goal of tabletop exercises?

    A) Passive test of security controls
    B) Active test of security controls
    C) User rights and permission reviews
    D) Disaster recovery planning
    E) Log analysis
    D) Disaster recovery planning
    (this multiple choice question has been scrambled)
  16. Hardware-based RAID Level 0: (Select 2 answers)

    A) Offers redundancy
    B) Requires at least three drivers to implement
    C) Doesn't offer fault tolerance
    D) Requires at least two drivers to implement
    E) Offers fault tolerance
    • C) Doesn't offer fault tolerance
    • D) Requires at least two drivers to implement
  17. Which of the following solutions does not offer fault tolerance?

    A) RAID 1
    B) RAID 0
    C) Disk duplexing
    D) Disk mirroring
    E) RAID 5
    B) RAID 0
    (this multiple choice question has been scrambled)
  18. Which of the following answers lists an example method for passive test of security controls?

    A) Pentest
    B) War chalking
    C) Tabletop exercises
    D) Vulnerability scan
    D) Vulnerability scan
    (this multiple choice question has been scrambled)
  19. Hardware-based RAID Level 1: (Select 3 answers)

    A) Requires at least 2 drives to implement
    B) Is also known as disk striping
    C) Offers improved performance in comparison to RAID 0
    D) Offers improved reliability by creating identical data sets on each driver (failure of one drive does not destroy the array as each driver contains identical copy of the data)
    E) Is also referred to as disk mirroring
    • A) Requires at least 2 drives to implement
    • D) Offers improved reliability by creating identical data sets on each driver (failure of one drive does not destroy the array as each driver contains identical copy of the data)
    • E) Is also referred to as disk mirroring
  20. Hardware-based RAID Level 5: (Select 2 answers)

    A) Continues to operate in case of failure of more than 1 drive
    B) Requires at least 3 drivers to implement
    C) Offers increased performance and fault tolerance (single drive failure does not destroy the array and lost data can be re-created from the remaining drives)
    D) Requires at least 5 drivers to implement
    E) Is also referred to as disk duplexing
    • B) Requires at least 3 drivers to implement
    • C) Offers increased performance and fault tolerance (single drive failure does not destroy the array and lost data can be re-created from the remaining drives)
  21. What is the function of archive bit?

    A) Setting file attribute to read-only
    B) Creating an additional copy of a file
    C) Indicating whether a file has been modified since the last backup
    D) Search indexing
    C) Indicating whether a file has been modified since the last backup
    (this multiple choice question has been scrambled)
  22. Which of the following terms refers to a backup technique that allows for creating an exact copy of an entire hard drive and replicating the driver to a new computer or to another drive on the same computer in case of hard drive failure? (Select best answer)

    A) Differential backup
    B) Drive imaging
    C) Full backup
    D) Disk striping
    B) Drive imaging
    (this multiple choice question has been scrambled)
  23. In a differential backup strategy, restoring data from the backup required only a working copy of the last full backup?

    A) True
    B) False
    B) False
  24. Restoring data from an incremental backup required: (Select 2 answers)

    A) Copy of the last incremental backup
    B) All copies of differential backups made since last full backup
    C) Copy of the last differential backup
    D) All copies of incremental backups made since last full backup
    E) Copy of the last full backup
    • D) All copies of incremental backups made since last full backup
    • E) Copy of the last full backup
  25. A United States federal government initiative aimed at enabling agencies to continue their essential functions across a broad spectrum of emergencies is known as:

    A) OCSP
    B) TACACS
    C) COOP
    D) OVAL
    C) COOP
    (this multiple choice question has been scrambled)

What would you like to do?

Home > Flashcards > Print Preview