CompTIA Security+ SY0-701 Practice Test 2
Exam Summary
0 of 10 Questions completed
Questions:
Information
You have already completed the exam before. Hence you can not start it again.
Exam is loading…
You must sign in or sign up to start the exam.
You must first complete the following:
Results
Results
0 of 10 Questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 point(s), (0)
Earned Point(s): 0 of 0, (0)
0 Essay(s) Pending (Possible Point(s): 0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
-
Need More Help?
PocketPrep is our recommended provider for CompTIA Security+ prep courses. Make sure you pass your exam the first time around.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Current
- Review
- Answered
- Correct
- Incorrect
-
Question 1 of 10
1. Question
In 2012, just 12% of Fortune 1000 companies had a Chief Data Officer (CDO). By 2018, 67.9% of surveyed firms reported having a CDO.
This is a corporate officer responsible for enterprise-wide governance and utilization of information as an asset, via data processing, analysis, data mining, information trading and other means.
Given the two sets of data 1-4 and a-d, match the personnel with their relevant roles:
1. Data owner
2. Data custodian
3. Data protection officer (DPO)
4. Data Creator
a. takes backups
b. dictate data requirements and decide who gets access to data
c. originated the reason for collecting the data
d. ensure data protection rules are followed
CorrectIncorrect -
Question 2 of 10
2. Question
Disaster recovery testing involves simulating an IT failure or any other type of business disruption to assess a DR plan. The following are methods of testing a DRP except?
CorrectIncorrect -
Question 3 of 10
3. Question
Otis is a known programmer and intelligent hacker. He intentionally inserted a code in an HR system. The code starts deleting HR salary database records that earn above a certain figure while at the same time it increases salaries of others.
All this happens on specific dates in the month. This is an example of.
CorrectIncorrect -
Question 4 of 10
4. Question
An MX record in DNS can help mitigate what type of Malware?
CorrectIncorrect -
Question 5 of 10
5. Question
A virtual machine monitor or VMM, is software that creates and runs virtual machines (VMs). VMware (owned by Dell) and Hyper-V (created by Microsoft) are made for cloud computing and virtualization.
These are examples of:
CorrectIncorrect -
Question 6 of 10
6. Question
Buffer Overflow is a common type of DoS attack. It relies on sending an amount of traffic to a network resource that exceeds the default processing capacity of the system.
Buffer Overflow can be detected and prevented through:
CorrectIncorrect -
Question 7 of 10
7. Question
Organizations has robust incidence response strategy. The following are steps one would normally take after a cybersecurity incident has occurred.
In what order would you apply them?
CorrectIncorrect -
Question 8 of 10
8. Question
Martin is the head of security in a large FMCG company in California. After experiencing huge data loss due to a contractor error, Martin implemented the following best practices.
- Conducting risk assessment regularly
- Applying strict account management policies
- Monitoring the employee behavior and systems used by them
- Documenting and establishing security controls and policies
- Implementing secure backups and disaster recovery plans
- Disabling employees from installing unauthorized software and visiting a malicious website through the enterprise’s network
These best practices will help the organization to:
CorrectIncorrect -
Question 9 of 10
9. Question
As a new IT Risk and Compliance officer, you discovered a company executive violating the company’s code of conduct. Which of the following would you NOT do?
CorrectIncorrect -
Question 10 of 10
10. Question
Basic Input/Output System (BIOS) is a computer program that is usually stored in EPROM and used by the CPU to perform start-up procedures when the computer is turned on.
Which of the following is/are functions of the BIOS?
CorrectIncorrect