Chapter 5 - Security Operations Quiz
Chapter 5 - Security Operations Quiz
Attempt Score 70 %
Overall Grade (Highest Attempt) 70 %
Question 1 0 / 1 point
A) Encryption
B) Hashing
C) Hard copy
Incorrect. Encryption is one type of control that can be used to protect data.
https://learn.isc2.org/d2l/le/enhancedSequenceViewer/9541?url=https%3A%2F%2Fsiteproxy.ruqli.workers.dev%3A443%2Fhttps%2Fbabe4806-440f-4af0-91ac-9d7c60651b42.sequences.api.brig… 1/6
9/24/23, 8:47 PM Chapter 5: Security Operations Quiz
Question 2 1 / 1 point
Correct. The inventory records which assets the organization has, which gives
the organization the opportunity to protect those assets.
Question 3 1 / 1 point
B) Human Resources
C) Senior management
https://learn.isc2.org/d2l/le/enhancedSequenceViewer/9541?url=https%3A%2F%2Fsiteproxy.ruqli.workers.dev%3A443%2Fhttps%2Fbabe4806-440f-4af0-91ac-9d7c60651b42.sequences.api.brig… 2/6
9/24/23, 8:47 PM Chapter 5: Security Operations Quiz
Question 4 1 / 1 point
Correct. It is important to store log data somewhere other than on the machine
where the data is gathered.
Question 5 0 / 1 point
A) Asymmetric
B) Symmetric
C) Hashing
D) Covert
https://learn.isc2.org/d2l/le/enhancedSequenceViewer/9541?url=https%3A%2F%2Fsiteproxy.ruqli.workers.dev%3A443%2Fhttps%2Fbabe4806-440f-4af0-91ac-9d7c60651b42.sequences.api.brig… 3/6
9/24/23, 8:47 PM Chapter 5: Security Operations Quiz
Question 6 1 / 1 point
A ready visual cue to let anyone in contact with the data know what
the classification is. (D5.1, L5.1.1)
A) Encryption
B) Label
C) Graphics
D) Photos
Question 7 0 / 1 point
A) Patches
B) Inventory
C) Baseline
D) Policy
https://learn.isc2.org/d2l/le/enhancedSequenceViewer/9541?url=https%3A%2F%2Fsiteproxy.ruqli.workers.dev%3A443%2Fhttps%2Fbabe4806-440f-4af0-91ac-9d7c60651b42.sequences.api.brig… 4/6
9/24/23, 8:47 PM Chapter 5: Security Operations Quiz
Question 8 1 / 1 point
A) Protecting assets
Correct. There is nothing more important than health and human safety.
Question 9 1 / 1 point
C) Regulators
https://learn.isc2.org/d2l/le/enhancedSequenceViewer/9541?url=https%3A%2F%2Fsiteproxy.ruqli.workers.dev%3A443%2Fhttps%2Fbabe4806-440f-4af0-91ac-9d7c60651b42.sequences.api.brig… 5/6
9/24/23, 8:47 PM Chapter 5: Security Operations Quiz
Correct. While the policy is dictated by senior management, the security office
is often tasked with monitoring/enforcing it.
Question 10 1 / 1 point
Correct. The BYOD policy typically describes which devices can be used to
process data and access networks belonging to the organization.
You've achieved an overall grade of 70% or higher and completed this activity.
https://learn.isc2.org/d2l/le/enhancedSequenceViewer/9541?url=https%3A%2F%2Fsiteproxy.ruqli.workers.dev%3A443%2Fhttps%2Fbabe4806-440f-4af0-91ac-9d7c60651b42.sequences.api.brig… 6/6