CompTIA Core 2 Objective 4.6 – Operational Procedures – Policy Concepts

Posted by:

|

On:

|

Policy Concepts

1 / 12

You discover that a company laptop containing sensitive information has been stolen. What is the first step in maintaining the chain of custody for the incident?

2 / 12

A critical server has been compromised by malware. What is the best practice to ensure data integrity and preservation before beginning the cleanup process?

3 / 12

Your team is considering using an open-source software for a new project. What should you verify about the open-source license before proceeding?

4 / 12

Your company handles healthcare data. Which regulation should you comply with to ensure the protection of this data?

5 / 12

You are auditing the software licenses for your company and find several installations of software with expired licenses. What should be your course of action?

6 / 12

During an incident response, why is it important to document every action taken?

7 / 12

You are installing new software for your company. Why is it important to review and comply with the End-User License Agreement (EULA)?

8 / 12

Your company needs to retain certain types of data for a specified period. What is a best practice for managing this data?

9 / 12

Your company uses software that includes DRM. What is the purpose of DRM in this context?

10 / 12

Your company collects and stores PII. What measures should be taken to ensure compliance with data protection regulations?

11 / 12

Your company processes credit card transactions. What security measure must you implement to protect this regulated data?

12 / 12

After discovering a breach in the company’s network, what should you do immediately after securing the system to prevent further unauthorized access?

Your score is

Exit