IT Certification Exam Questions
29 Questions
1 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the MOST cost-effective method to provide a reactive control for protecting personnel in public areas?

  • Supply a duress alarm for personnel exposed to the public
  • Hire a guard to protect the public area (correct)
  • Enclose the personnel entry area with polycarbonate plastic
  • Install mantraps at the building entrances

Which of the following is a PRIMARY element in achieving information security according to the principle of defense in depth?

  • People, technology, and operations (correct)
  • Certification, accreditation, and monitoring
  • Prevention, detection, and remediation
  • Development, testing, and deployment

What poses the GREATEST risk to data confidentiality?

  • Network redundancies are not implemented
  • Backup tapes are generated unencrypted (correct)
  • Security awareness training is not completed
  • Users have administrative privileges

From a data security perspective, what is the MOST important consideration when an organization plans to relocate?

<p>Ensure fire prevention and detection systems are sufficient to protect personnel (A)</p> Signup and view all the answers

What is an essential measure to enhance personnel safety in public areas?

<p>Establishing emergency response protocols (A)</p> Signup and view all the answers

Which factor contributes most significantly to preventing unauthorized access to sensitive information?

<p>Implementing role-based access control measures (A)</p> Signup and view all the answers

Which destruction method provides the BEST assurance that data has been removed?

<p>Shredding (C)</p> Signup and view all the answers

Aside from potential records viewed, what should be the PRIMARY concern regarding unauthorized access to a database with financial information?

<p>Unauthorized database changes (A)</p> Signup and view all the answers

Which of the following is a detective access control mechanism?

<p>Log review (B)</p> Signup and view all the answers

In the context of data destruction, what method is NOT typically used for ensuring data removal?

<p>Knurling (C)</p> Signup and view all the answers

When considering student access to university resources from home, what approach would require the most effort from students but still enable access?

<p>Purchasing VPN-capable routers (D)</p> Signup and view all the answers

What is the main purpose of ensuring that unauthorized persons cannot access the computers?

<p>To ensure management knows what users are logged on (C)</p> Signup and view all the answers

Which method is effective for avoiding magnetic media data remanence?

<p>Degaussing (D)</p> Signup and view all the answers

What is the MOST important purpose of testing the Disaster Recovery Plan (DRP)?

<p>Validating the effectiveness of the plan (D)</p> Signup and view all the answers

Including a Trusted Platform Module (TPM) in a computer system design is a technique for achieving what?

<p>Establish a secure initial state (D)</p> Signup and view all the answers

After completing a Business Impact Analysis (BIA), what should a security professional do next following BCP/DRP best practices?

<p>Identify and select recovery strategies (B)</p> Signup and view all the answers

What is the PRIMARY purpose of a security awareness program?

<p>Ensure that everyone understands the organization's policies and procedures. (D)</p> Signup and view all the answers

What is the primary goal of having a Disaster Recovery Plan (DRP) in place?

<p>To enable the organization to recover from disasters efficiently (B)</p> Signup and view all the answers

What should Passive Infrared Sensors (PIR) used in a non-climate controlled environment do?

<p>Automatically compensate for variance in background temperature. (C)</p> Signup and view all the answers

Why is documenting business processes important in Business Continuity Planning (BCP)?

<p>Provides an understanding of the organization's interdependencies. (B)</p> Signup and view all the answers

What should individuals with access to the system do according to the text?

<p>Sign Non-Disclosure Agreements (NDA). (D)</p> Signup and view all the answers

Why is it important to communicate that access to information will be granted on a need-to-know basis?

<p>To restrict unnecessary access and protect sensitive information. (B)</p> Signup and view all the answers

What do Passive Infrared Sensors (PIR) detect in a non-climate controlled environment?

<p>Objects of a specific temperature independent of the background temperature. (D)</p> Signup and view all the answers

What is the most likely cause of the inconsistent application of server security controls resulting in vulnerabilities on critical systems?

<p>A lack of baseline standards (B)</p> Signup and view all the answers

What is the best first step for determining if the appropriate security controls are in place for protecting data at rest?

<p>Conduct a risk assessment (B)</p> Signup and view all the answers

What should an organization ensure when outsourcing a portion of their IT organization to a third-party provider's facility?

<p>The third party's physical security controls are in place and as rigorous as the original controls (C)</p> Signup and view all the answers

Which step should be taken first when classifying information?

<p>Ensure information is labeled with appropriate sensitivity levels (B)</p> Signup and view all the answers

What is a common issue that can arise due to improper documentation of security guidelines?

<p>Difficulty in enforcing security policies (B)</p> Signup and view all the answers

Why might host-based Intrusion Prevention System (HIPS) policies be ineffective in ensuring server security?

<p>They lack integration with other security controls (D)</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser