SEC+ Revision Questions Security Policies and Standards Flashcards
- The primary purpose of security policies is to:
A. Establish legal grounds for prosecution
B. Improve IT service performance
C. Reduce the risk of security breaches
D. Ensure users are accountable for their actions
C. Reduce the risk of security breaches
- You have been tasked with creating a corporate security policy regarding smartphone usage for business purposes. What should you do first?
A. Issue smartphones to all employees.
B. Obtain support from management.
C. Get a legal opinion.
D. Create the first draft of the policy.
B. Obtain support from management.
- Christine is the server administrator for Contoso Corporation. Her manager provided step-by- step security policies outlining how servers should be configured to maximize security. Which type of security policy will Christine be implementing?
A. Mail server acceptable use policy
B. VPN server acceptable use policy
C. Procedural policy
D. File server acceptable use policy
C. Procedural policy
- Which of the following are examples of PII? (Choose two.)
A. Private IP address on an internal network
B. Mobile phone number
C. Digital certificate
D. Gender
B. Mobile phone number
C. Digital certificate
- After a lengthy interviewing process, your company hired a new payroll clerk named Stacey. Stacey will be using a web browser on a company computer at the office to access the payroll application on a public cloud provider web site over the Internet. Which type of document should Stacey read and sign?
A. Internet acceptable use policy
B. Password policy
C. Service level agreement
D. Remote access acceptable use policy
A. Internet acceptable use policy
- You are configuring a password policy for users in the Berlin office. Passwords must be changed every 60 days. You must ensure that user passwords cannot be changed more than once within the 60-day interval. What should you configure?
A. Minimum password age
B. Maximum password age
C. Password complexity
D. Password history
A. Minimum password age
- You have been hired as a consultant by a pharmaceutical company. The company is concerned that confidential drug research documents might be recovered from disposed hard disks. What should you recommend?
A. Format the hard drives.
B. Repartition the hard drives.
C. Freeze the hard drives.
D. Physically shred the hard drives.
Physically shred the hard drives.
- Acme Corporation is upgrading its network routers. The old routers will be sent to the head office before they are disposed of. What must be done to the routers prior to disposal to minimize security breaches?
A. Change the router privileged mode password.
B. Remove DNS server entries from the router configuration.
C. Set the router to factory default settings.
D. Format the router hard drive.
C. Set the router to factory default settings.
- Your company has decided to adopt a public cloud device management solution where all devices are centrally managed from a website hosted on servers in a data center. Management has instructed you to ensure that the solution is reliable and always available. Which type of document should you focus on?
A. Password policy
B. Service level agreement
C. Remote access acceptable use policy
D. Mobile device acceptable use policy
B. Service level agreement
- Which of the following best embodies the concept of least privilege?
A. Detecting inappropriate Internet use
B. Detecting malware running without elevated privileges
C. Assigning users full control permissions to network resources
D. Assigning needed permissions to enable users to complete a task
D. Assigning needed permissions to enable users to complete a task
- The creation of data security policies is most affected by which two factors? (Choose two.)
A. Industry regulations
B. IP addressing scheme being used
C. Operating system version being used
D. PII
PII
- As the network administrator for your company, you are creating a security policy such that devices connecting to the corporate VPN must have a trusted digital certificate installed. Which type of security policy are you creating?
A. Mobile device encryption policy
B. Accountability policy
C. Authentication policy
D. Remote access policy
Remote access policy
- You are reviewing surveillance camera footage after items have gone missing from your company’s office in the evenings. On the video you notice an unidentified person entering the building’s main entrance behind an employee who unlocked the door with their swipe card. What type of security breach is this?
A. Tailgating
B. Mantrapping
C. Horseback riding
D. Door jamming
Tailgating
- You receive the e-mail message shown here. What type of threat is this?
Dear valued Acme Bank customer,
Acme Bank will be updating web server banking software next week. To ensure continued access to your accounts, we ask that you go to http://www.acmebank.us./accounts and reset your password within the next 24 hours. We sincerely appreciate your business.
Acme Bank
A. Denial of service
B. Phishing attack
C. Zero-day exploit
D. Ping of death
Phishing attack
- You are testing your router configuration and discover a security vulnerability. After searching the Internet, you realize that this vulnerability is unknown. Which type of attack is your router vulnerable to?
A. Denial of service
B. Phishing attack
C. Zero-day exploit
D. Ping of death
C. Zero-day exploit