Information Technology /CompTIA Sec+ SY0-701: Domain 5, Quiz 2

CompTIA Sec+ SY0-701: Domain 5, Quiz 2

Information Technology15 CardsCreated about 2 months ago

These flashcards cover key concepts like security compliance regulations, data protection rights, and roles such as data controllers and processors in data management.

Which of the following is a potential consequence of failing to meet security compliance regulations?

a. Enhanced operational efficiency
b. Reputational damage
c. Increase in customer trust
d. Increase in stock prices

Reputational damage

Failing to comply with security standards can harm an organization’s public image and trustworthiness.

Tap or swipe ↕ to flip
Swipe ←→Navigate
SSpeak
FFocus
1/15

Key Terms

Term
Definition

Which of the following is a potential consequence of failing to meet security compliance regulations?

a. Enhanced operational efficiency
b. Reputational damage
c. Increase in customer trust
d. Increase in stock prices

Reputational damage

Failing to comply with security standards can harm an organization’s public image and trustworth...

The right for an individual to have their personal data erased by an entity that is storing it, especially online, is referred to as:

a. Data retention
b. Data accountability
c. Right to be forgotten
d. Data integrity

Right to be forgotten

A principle that gives individuals the power to request their personal information be removed....

What primarily differentiates a data controller from a data processor?

a. Data processors have the final say in data retention policies.
b. Data controllers are solely responsible for data breaches.
c. Data processors create the data while controllers analyze it.
d. A data controller determines the purpose and means of processing, while a processor processes data on behalf of the controller.

A data controller determines the purpose and means of processing, while a processor processes data on behalf of the controller.

An organization is looking for an assessment where a third party verifies its adherence to certain regulations. Which of the following best describes this?

a. Penetration testing
b. Self-assessment
c. Independent third-party audit
d. Internal compliance

Independent third-party audit

Involves an external entity evaluating the organization’s compliance.

During a penetration test, an attacker has no prior knowledge of the network infrastructure. Which type of testing environment does this represent?

a. Unknown environment
b. Integrated environment
c. Partially known environment
d. Known environment

Unknown environment

The attacker has no prior information about the infrastructure.

What kind of reconnaissance involves using openly available sources without directly interacting with the target system?

a. Defensive
b. Passive
c. Active
d. Integrated

Passive

Uses open sources and does not interact directly with the target.

Related Flashcard Decks

Study Tips

  • Press F to enter focus mode for distraction-free studying
  • Review cards regularly to improve retention
  • Try to recall the answer before flipping the card
  • Share this deck with friends to study together
TermDefinition

Which of the following is a potential consequence of failing to meet security compliance regulations?

a. Enhanced operational efficiency
b. Reputational damage
c. Increase in customer trust
d. Increase in stock prices

Reputational damage

Failing to comply with security standards can harm an organization’s public image and trustworthiness.

The right for an individual to have their personal data erased by an entity that is storing it, especially online, is referred to as:

a. Data retention
b. Data accountability
c. Right to be forgotten
d. Data integrity

Right to be forgotten

A principle that gives individuals the power to request their personal information be removed.

What primarily differentiates a data controller from a data processor?

a. Data processors have the final say in data retention policies.
b. Data controllers are solely responsible for data breaches.
c. Data processors create the data while controllers analyze it.
d. A data controller determines the purpose and means of processing, while a processor processes data on behalf of the controller.

A data controller determines the purpose and means of processing, while a processor processes data on behalf of the controller.

The controller is responsible for why and how personal data is processed, and the processor does the actual processing.

An organization is looking for an assessment where a third party verifies its adherence to certain regulations. Which of the following best describes this?

a. Penetration testing
b. Self-assessment
c. Independent third-party audit
d. Internal compliance

Independent third-party audit

Involves an external entity evaluating the organization’s compliance.

During a penetration test, an attacker has no prior knowledge of the network infrastructure. Which type of testing environment does this represent?

a. Unknown environment
b. Integrated environment
c. Partially known environment
d. Known environment

Unknown environment

The attacker has no prior information about the infrastructure.

What kind of reconnaissance involves using openly available sources without directly interacting with the target system?

a. Defensive
b. Passive
c. Active
d. Integrated

Passive

Uses open sources and does not interact directly with the target.

A company regularly sends out simulated phishing emails to test employee awareness. What is this practice called?

a. Campaigns
b. Attestation
c. User guidance
d. Phishing prevention

Campaigns

Organized efforts to test and increase security awareness among employees.

What is the primary goal of security awareness training for employees?

a. To ensure they are aware of the company’s security policy.
b. To enable them to recognize and respond appropriately to security threats.
c. To ensure they know the IT department’s contact information.
d. To inform them of the latest industry news.

To enable them to recognize and respond appropriately to security threats.

Security awareness training aims to equip employees with the knowledge and skills to detect and deal with security threats.

Which of the following best explains the role of a regulatory external audit for a company?

a. To verify the company’s adherence to industry-specific laws and regulations.
b. To evaluate the company’s internal communication effectiveness.
c. To ensure the company’s marketing strategy aligns with industry trends.
d. To check if the company’s financial statements are accurate.

To verify the company’s adherence to industry-specific laws and regulations.

Regulatory audits ensure compliance with specific industry laws and standards.

In the context of privacy, who is responsible for determining the purpose, conditions, and means of processing personal data?

a. Controller
b. Data subject
c. Processor
d. Data inventory manager

Controller

Decides the purpose and means of processing personal data.

If an organization conducts a test by hiring ethical hackers to simulate an attack on its premises to identify vulnerabilities in its physical security measures, it is conducting which type of penetration test?

a. Active reconnaissance
b. Physical
c. Defensive
d. Offensive

Physical

Refers to testing vulnerabilities in physical security measures.

When an employee is trained to be cautious about sharing office details over casual conversations outside work, this training is primarily against which type of threat?

a. Insider threats
b. Password attacks
c. Phishing
d. Social engineering

Social engineering

Involves manipulating individuals into divulging confidential information.

An employee was given a USB stick at a conference, which they want to use at work. Before using it, what is the best security measure they should take?

a. Copy the USB contents to the cloud.
b. Have the IT department scan it for malware.
c. Format the USB stick.
d. Use it on a personal computer first.

Have the IT department scan it for malware.

Ensures the device is safe before potential threats can harm the company’s network.

For which reason might an organization want its employees to undergo regular training on recognizing a phishing attempt?

a. To replace the need for email filtering systems.
b. To shift all responsibility for phishing attacks to employees.
c. To reduce the need for advanced firewall systems.
d. To minimize the risk of successful phishing attacks.

To minimize the risk of successful phishing attacks.

Well-trained employees can be the first line of defense against phishing attempts.

An organization requires all employees to acknowledge they have read and understood the security policy every year. What best describes this practice?

a. Regulatory audit
b. Attestation
c. Data inventory
d. Due diligence/care

Attestation

Refers to a formal declaration or verification, in this case, that employees have understood the security policy.