Chapter 10: Risk Assessment and Risk Mitigation

1. You are the security officer of a company and you have been asked to implement an employee security program. Where would you start?

A. Security scan

B. Security policy

C. Security audit

D. Lock down access for everyone

Correct Answer and Explanation: The answer is B. Answer B is correct, because your first step must be a security policy. The remaining steps (excluding locking down access to everyone) will be follow-up steps after you write your policy. Your security policy is your starting point.

2. IDS stands for

A. Intrusion directive system

B. Implosion detection system

C. Intrusion detection system

D. Intuitive detection system

Correct Answer: The correct answer is C.

3. A con of a signature-based ...

Get CompTIA Security+ Certification Study Guide, 3rd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.