CompTIA Certmaster CE Security+ Domain 5.0
Exam Study Questions with 100% Correct Answers
A technology company implements a backup strategy to mitigate data loss in case of a system
crash. The strategy focuses on defining the maximum acceptable age of data that the
organization can tolerate losing if the system crashes. Which principle should the company
apply to meet their needs? - ✔✔C. RPO
A. RTO (incorrect)
B. SLE (incorrect)
An organization's IT security team has noticed increased suspicious email activity targeting its
employees. The IT team plans to create different campaigns to address this issue as part of its
response strategy. What should be the team's initial focus to enhance awareness and
protection against these email threats? - ✔✔B. Launching a phishing awareness campaign
In a tech company, the IT department is selecting a new vendor to upgrade its network
infrastructure. To ensure a smooth and well-defined procurement process, the IT team creates
a detailed work order (WO) or statement of work (SOW). After a rigorous selection process, the
company chooses the vendor that best aligns with its needs. What is the purpose of the WO or
SOW in the vendor selection process for the technology company? - ✔✔C. To define specific
requirements and project deliverables expected from the vendor
A company has noticed increasing attacks on its employees via phishing emails and
impersonation calls. These attacks have led to unauthorized access to sensitive data and a loss
of customer trust. What method should the company implement to counteract these malicious
efforts? (Select the two best options.) - ✔✔A. Conduct social engineering awareness training
B. Strengthen password policies
A large organization protects sensitive data and prevents unauthorized access. The
management is implementing a robust security framework to ensure compliance with industry
regulations and safeguard critical assets. As part of this initiative, the IT department is drafting a
comprehensive set of guidelines and rules that outline the acceptable use of company
, resources, including networks, computers, and data. These guidelines will create a secure
environment by defining the responsibilities and expected behaviors of all employees regarding
information security. What is the IT department creating to define the acceptable use of
company resources, outline employee responsibilities, and maintain a secure environment? -
✔✔C. Information security policies
A multinational corporation operates in several countries with diverse regulations regarding
data privacy and security. What is the primary responsibility of the security team concerning
the multitude of governmental and regulatory entities influencing the corporation's
operations? - ✔✔A. Shaping internal policies independently from external regulations
(incorrect)
A cyber team evaluates areas that pose more risk of becoming noncompliant. What is the
ramification of indemnification? - ✔✔A. Exceeding permitted installations (incorrect)
A global finance company seeks to demonstrate to its stakeholders the effectiveness and
compliance of its cybersecurity protocols and practices. The company is contemplating various
measures to ensure its security posture. What would be the MOST effective method to achieve
this? - ✔✔A. Forming an internal audit committee (incorrect)
B. Performing an internal compliance review (incorrect)
After reading an article online, a concerned business stakeholder wishes to discuss the risk
associated with denial of service (DoS) attacks. The stakeholder requests information about the
possibilities of an attacker learning about the countermeasures in place. Where would the
security analyst look to find this information? - ✔✔A. Risk register
What describes the impacts associated with contractual noncompliance? - ✔✔C. The
agreement can be breached or terminated, and indemnification might be sought
A. It can include financial penalties, legal liabilities, and loss of customer trust. (incorrect)
B. It can grant certain individuals to challenge credit data on their personal reports. (incorrect)
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller Examsplug. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $12.79. You're not tied to anything after your purchase.