Testout 2.8
57 Questions
0 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

Which of the following best describes a policy in the context of documentation for PC technicians?

  • A policy identifies password requirements on company-owned systems.
  • A policy outlines step-by-step instructions for achieving a desired outcome.
  • A policy sets rules to address a specific problem or concern. (correct)
  • A policy provides information about overall network security.

What are standard operating procedures (SOPs) commonly used for?

  • Defining a desired outcome and assigning tasks to specific individuals.
  • Outlining step-by-step instructions for achieving a desired outcome.
  • Providing detailed information for performing complex business activities. (correct)
  • Identifying password requirements on company-owned systems.

Why should end users and PC technicians be familiar with relevant regulations?

  • To address specific problems or concerns.
  • To understand overall network security.
  • To ensure compliance with city, state, and industry regulations. (correct)
  • To achieve desired outcomes.

Which type of policy outlines how often backups should be run, where they should be saved to, and how long they should be maintained?

<p>Backup Policy (C)</p> Signup and view all the answers

Which type of policy identifies who’s permitted access to restricted areas and how that access is granted?

<p>Physical Security Policy (A)</p> Signup and view all the answers

Which type of policy defines who has access to company resources and any restrictions that’ve been placed on the use of the internet or email?

<p>Acceptable Use Policy (C)</p> Signup and view all the answers

Which type of policy outlines rules for employees wishing to use their personal devices for work-related tasks?

<p>Bring Your Own Device (BYOD) Policy (C)</p> Signup and view all the answers

Which of the following is NOT recommended for a strong password?

<p>Favorite sports teams (A)</p> Signup and view all the answers

Which of the following is included in a BYOD policy?

<p>All of the above (D)</p> Signup and view all the answers

What does a backup policy include?

<p>All of the above (D)</p> Signup and view all the answers

What does a physical security policy indicate?

<p>All of the above (D)</p> Signup and view all the answers

Which department is primarily responsible for ensuring the completion of documentation for new employees?

<p>Human resources department (A)</p> Signup and view all the answers

What is the purpose of an Acceptable Use Policy (AUP)?

<p>To outline how company resources can be used (A)</p> Signup and view all the answers

What is the principle of least privilege?

<p>Providing an employee with the least amount of access while still permitting them to do their job effectively (D)</p> Signup and view all the answers

What should be done when an employee resigns, retires, or is terminated?

<p>Complete all items on the organization's end-user termination checklist (B)</p> Signup and view all the answers

Which department is primarily responsible for ensuring the completion of documentation during the onboarding process?

<p>Human Resources department (D)</p> Signup and view all the answers

What should be done when an employee leaves the organization?

<p>All of the above. (D)</p> Signup and view all the answers

Which of the following should be included in an onboarding checklist?

<p>All of the above. (D)</p> Signup and view all the answers

What should employees be trained to NOT do during the onboarding process?

<p>All of the above. (D)</p> Signup and view all the answers

Which of the following is the purpose of a Security Policy?

<p>To provide information about overall network security (D)</p> Signup and view all the answers

What is the purpose of a Password Policy?

<p>To identify password requirements on company-owned systems (B)</p> Signup and view all the answers

What are standard operating procedures (SOPs) commonly used for?

<p>To outline step-by-step instructions for performing complex business activities (C)</p> Signup and view all the answers

Which of the following should NOT be included in a strong password?

<p>A combination of uppercase and lowercase letters (A)</p> Signup and view all the answers

Which of the following is NOT typically included in a BYOD policy?

<p>The backup policy for personal devices (C)</p> Signup and view all the answers

What does a user education and awareness policy aim to do?

<p>Familiarize employees with the organization's security policy (B)</p> Signup and view all the answers

What does a physical security policy indicate?

<p>Restricted areas within an organization (B)</p> Signup and view all the answers

Which of the following is NOT included in a new user setup checklist?

<p>Employee performance evaluation (B)</p> Signup and view all the answers

What is the purpose of the principle of least privilege?

<p>To restrict employees' access to only the resources they need to do their job effectively (D)</p> Signup and view all the answers

What should employees be trained to do during the onboarding process?

<p>Recognize security breaches and exploits (C)</p> Signup and view all the answers

What should be done when an employee leaves the organization?

<p>Disable all user accounts and back up any valuable data (B)</p> Signup and view all the answers

Which of the following is NOT a step in the onboarding process for a new employee?

<p>Collecting physical access items (D)</p> Signup and view all the answers

Which of the following should be included in an offboarding checklist when an employee leaves the organization?

<p>Collecting physical access items (A)</p> Signup and view all the answers

Which of the following is NOT a security documentation that may need to be reviewed and signed during the onboarding process?

<p>Backup policy (C)</p> Signup and view all the answers

What is the purpose of offboarding in the employee lifecycle?

<p>To collect physical access items (B)</p> Signup and view all the answers

Which of the following is NOT included in a security policy?

<p>Instructions for performing business activities (B)</p> Signup and view all the answers

What is the purpose of a knowledge base?

<p>To troubleshoot common issues and provide solutions (D)</p> Signup and view all the answers

What does a floor plan provide?

<p>The layout of all electrical, plumbing, HVAC, and wiring (A)</p> Signup and view all the answers

Why should end users and PC technicians be familiar with policies and procedures?

<p>To maintain compliance with city, state, and industry regulations (C)</p> Signup and view all the answers

Which of the following is NOT typically included in a Security Policy?

<p>Regulatory compliance policies (D)</p> Signup and view all the answers

What is the purpose of an Acceptable Use Policy (AUP)?

<p>To establish rules for using company-owned systems and resources (B)</p> Signup and view all the answers

What does a physical security policy indicate?

<p>Measures to protect physical assets and prevent unauthorized access (D)</p> Signup and view all the answers

Which of the following is NOT a recommended practice for creating a strong password?

<p>Using words found in the dictionary (D)</p> Signup and view all the answers

Which of the following is included in a backup policy?

<p>The types of backups to be completed (A)</p> Signup and view all the answers

What does a physical security policy indicate?

<p>Restricted areas within an organization (C)</p> Signup and view all the answers

Which of the following is NOT included in an acceptable use policy (AUP)?

<p>How and when users can use their devices (A)</p> Signup and view all the answers

Which of the following is NOT a type of documentation discussed in the text?

<p>Knowledge base (A)</p> Signup and view all the answers

What does a knowledge base typically contain?

<p>Articles related to frequently asked questions (A)</p> Signup and view all the answers

Which of the following is NOT included in a security policy?

<p>Backup policy (C)</p> Signup and view all the answers

What is the purpose of a standard operating procedure (SOP)?

<p>To provide detailed instructions for performing a complex or multi-faceted business activity (D)</p> Signup and view all the answers

Which of the following is NOT included in a new user setup checklist?

<p>Verifying security documentation (A)</p> Signup and view all the answers

What should employees be trained to NOT do during the onboarding process?

<p>Respond to social engineering attempts (A)</p> Signup and view all the answers

What is the purpose of an Acceptable Use Policy (AUP)?

<p>To outline how company resources can be used (C)</p> Signup and view all the answers

Which type of policy defines who has access to company resources and any restrictions that've been placed on the use of the internet or email?

<p>Security policy (A)</p> Signup and view all the answers

Which of the following is NOT typically included in an offboarding checklist when an employee leaves the organization?

<p>Collect physical access items such as keys and key fobs (A)</p> Signup and view all the answers

Which of the following is NOT a step in the onboarding process for a new employee?

<p>Collect physical access items (A)</p> Signup and view all the answers

What is the purpose of the principle of least privilege?

<p>To limit employees' access to only the resources and privileges necessary to perform their job functions (C)</p> Signup and view all the answers

Why should end users and PC technicians be familiar with relevant regulations?

<p>To avoid any legal consequences (B)</p> Signup and view all the answers

More Like This

TestOut CompTIA A+ Flashcards
95 questions
11.2.1 TCP and UDP Testout
18 questions
Use Quizgecko on...
Browser
Browser