CompTIA Security+ 4.2 Security Operations – Asset Management

Posted by:

|

On:

|

Asset Management

1 / 25

Which of the following asset management practices is MOST effective in supporting a company’s disaster recovery planning?

2 / 25

In the context of asset management, what does the term ‘asset baseline’ refer to?

3 / 25

Which of the following is a key responsibility of an asset owner in the context of information security?

4 / 25

Which of the following is the MOST effective way to ensure that retired IT assets do not lead to data breaches?

5 / 25

A company is implementing a new policy that requires all assets to be assigned an owner. What is the PRIMARY benefit of this practice?

6 / 25

Which of the following is the BEST method for tracking portable devices such as laptops and tablets in an organization?

7 / 25

In the context of asset management, what does the term ‘asset baseline’ refer to?

8 / 25

A security analyst is reviewing the organization’s asset management practices and notices that cloud-based assets are not consistently tracked. What is the MOST significant risk associated with this oversight?

9 / 25

A company is implementing a new asset tagging system. Which of the following is the MOST important information to include on an asset tag?

10 / 25

An organization is struggling to maintain accurate software license counts across its IT infrastructure. Which of the following asset management practices would BEST address this issue?

11 / 25

A security team is implementing a new process for handling assets that process sensitive data. Which of the following should be the FIRST step in this process?

12 / 25

Which of the following asset management practices is MOST effective in supporting a company’s disaster recovery planning?

13 / 25

Which of the following is the primary purpose of asset classification in an organization?

14 / 25

A company is implementing a new asset tagging system for their data center equipment. Which of the following should be included on the asset tag to BEST support both physical and logical asset management?

15 / 25

A company is implementing a new asset management system and wants to ensure it supports compliance with various regulatory requirements. Which of the following features is MOST crucial for this purpose?

16 / 25

An organization is implementing a new asset management system and wants to ensure it supports their DevSecOps practices. Which of the following features is MOST important for this purpose?

17 / 25

Which of the following asset management practices is MOST effective in preventing shadow IT?

18 / 25

A company is implementing a new policy that requires all assets to be assigned an owner. What is the PRIMARY benefit of this practice?

19 / 25

A company is implementing a new policy for disposing of old IT equipment. Which of the following should be the FIRST step in this process?

20 / 25

Which of the following is the MOST effective way to ensure that retired IT assets do not lead to data breaches?

21 / 25

A security analyst is reviewing the organization’s asset management practices and notices that cloud-based assets are not consistently tracked. What is the MOST significant risk associated with this oversight?

22 / 25

Which of the following is the MOST important consideration when integrating asset management with an organization’s incident response process?

23 / 25

An organization is implementing a new asset management system and wants to ensure it supports their DevSecOps practices. Which of the following features is MOST important for this purpose?

24 / 25

A company is implementing a new policy for disposing of old IT equipment. Which of the following should be the FIRST step in this process?

25 / 25

Which of the following is a key responsibility of an asset owner in the context of information security?

Your score is

Exit