Page : 1/10
1. Which of the following disaster recovery strategies requires the longest time to become operational after a disaster?
2. Which of the following security practices helps reduce collusion and insider threats?
3. Which of the following describes a warm site in disaster recovery planning?
4. Which of the following types of attacks can be detected using an Intrusion Detection System (IDS)?
5. Which of the following is an appropriate detective control to monitor employee behavior within an organization?
Page : 2/10
6. Which of the following is a primary function of a Security Information and Event Management (SIEM) system?
7. What is the purpose of the concept of least privilege in security operations?
8. Which of the following actions is an example of a preventive control in security operations?
9. Which of the following activities is typically part of the change management process in security operations?
10. Which of the following statements about a Business Continuity Plan (BCP) is correct?
Page : 3/10
11. What is the primary purpose of logging and monitoring in security operations?
12. What is the purpose of vulnerability management in security operations?
13. What is the primary role of a configuration management process in security operations?
14. What is the primary objective of implementing a Data Loss Prevention (DLP) solution in an organization?
15. What is the purpose of a business impact analysis (BIA) in the context of business continuity planning?
Page : 4/10
16. Which of the following best describes the purpose of conducting a root cause analysis after a security incident?
17. What is the primary purpose of a warm site in disaster recovery planning?
18. Which of the following is the best example of a preventive control?
19. Which of the following controls is most effective in reducing the risk of insider threats?
20. What is the primary goal of business continuity planning (BCP)?
Page : 5/10
21. What is the main advantage of using a Security Operations Center (SOC) in an organization?
22. Which of the following disaster recovery strategies provides the fastest recovery time but is also the most expensive to maintain?
23. What is the main objective of conducting regular security audits in an organization?
24. Which of the following describes a corrective control?
25. What is the purpose of a configuration baseline in security operations?
Page : 6/10
26. In the context of backups, what does a differential backup do?
27. What is the primary security benefit of implementing separation of duties within an organization?
28. What is the main difference between an Intrusion Detection System (IDS) and an Intrusion Prevention System (IPS)?
29. Which of the following is a primary purpose of implementing log retention policies in an organization?
30. Which of the following best describes job rotation as a security practice?
Page : 7/10
31. Which of the following is considered a corrective control in security operations?
32. Which of the following is the best example of a detective control in security operations?
33. What is the primary advantage of conducting tabletop exercises in an organization's incident response program?
34. What is the Recovery Time Objective (RTO) in disaster recovery planning?
35. Which of the following is an example of a detective control in security operations?
Page : 8/10
36. What is the primary purpose of mandatory vacation as a security control?
37. Which of the following backup types only backs up data that has changed since the last full backup, regardless of any other backups taken?
38. Which of the following types of plans focuses on the long-term recovery of business operations after a major disruption?
39. Which of the following is the best description of a honeypot in a network environment?
40. Which of the following activities is typically performed during the containment phase of an incident response?
Page : 9/10
41. Which of the following is the best example of a compensating control in security operations?
42. Which type of backup strategy only backs up data that has changed since the last backup of any type?
43. Which of the following security controls is most effective in detecting unauthorized access to systems?
44. Which of the following best describes log retention policies in security operations?
45. Which of the following is a characteristic of a cold site in disaster recovery planning?
Page : 10/10
46. What is the primary objective of forensics in the context of security operations?
47. Which of the following best describes the concept of "least privilege" in security operations?
48. What is the primary purpose of a Recovery Point Objective (RPO) in business continuity planning?
49. Which of the following best describes a hot site in disaster recovery planning?
50. Which of the following controls would best help prevent collusion between employees in a critical process?