CompTIA Security+ Exam Prep - Question List

Select how would you like to study

266. Which of the following attacks can be prevented if you shred all confidential material before dumping it in the waste bins?
  1. Man-In-The-Middle
  2. Shoulder Surfing
  3. Phishing
  4. Dumpster Diving
267. What order should these steps be completed in when conducting a Business Impact Analysis (BIA)?
  1. Assess impact if crisis were to happen; Determine maximum allowable outage and recovery times; Identify critical processes
  2. Identify critical processes; Assess impact if crisis were to happen; Determine maximum allowable outage and recovery times
  3. Identify critical processes; Determine maximum allowable outage and recovery times; Assess impact if crisis were to happen
  4. None of the above
268. Mr. Indecisive is working on his company’s Business Continuity Plan and performing the Business Impact Analysis. One of the critical processes that he has identified is year-end tax documentation and preparation. However, because this is a seasonal process, he is unsure of how to handle it in his analysis. What advice should you give Mr. Indecisive?
  1. Determine the recovery time objective based on the shortest time required (when it is tax season)
  2. Determine the recovery time objective based on the non-tax season time period (since this is the majority of the year)
  3. Calculate optimal recovery time for both scenarios - tax season and non-tax season - and average the two together to get the overall optimal recovery time objective
  4. Create two different recovery time objectives - one based on tax season and one on non-tax season - and include both in the report.
269. Company XYZ just hired Richard and insists that to protect the company he sign:
  1. Employee Jurisdiction Form
  2. Nondisclosure Agreement
  3. Corporate Employee Analysis
  4. All of the above
270. Richard has accepted a job at company XYZ. The company will now perform a background check. What is normally checked during this procedure?
  1. Social Security trace
  2. Federal Criminal Check
  3. Immigration Check
  4. All of the above

Select how would you like to study