1. Hot sites are more cost-effective than cold sites for disaster recovery.
True
False
2. Which type of backup site is typically the most costly but offers immediate operation after a
disaster?
a.Cold site
b.Frozen site
c.Hot site
d.Temporary site
3. Disaster recovery (DR) plans are only necessary for large-scale events like natural disasters.
True
False
4. Secure off-site storage of vital materials is recommended to protect against internal fraud.
True
False
5. Business impact analysis (BIA) is critical for determining which business functions are essential
for recovery.
True
False
6. System malfunctions should be considered a deliberate threat in information assurance?
True
False
7. Custody Officer for Evidence preserving the chain of evidence by making sure that the
documentation is clear.
True
False
8. A _______________ action is routinely used to ensure that there is no malware installed on your
PC.
a.preventative
b.detective
c.proactive
d.reactive
9. When evaluating the impact of a risk in businesses, loss of availability, confidentiality, and
integrity are taken into account?
True
False
10. Disabling access for a disgruntled employee is a reactive control.
True
False
11. Testing and installing fixes promptly after they are released to reducing the risk of malware.
True
False
12. A business continuity plan (BCP) focuses on maintaining normal business operations despite
disruptions.
True
False
13. Symmetric encryption uses _____________ key(s) for both the encryption and decryption.
a.same
b.different
c.two
d.four
14. Which policy helps prevent unauthorized viewing of sensitive information on unattended
screens?
a.Password policy
b.Clear desk policy
c.Clear screen policy
d.Backup policy
15. Testing a disaster recovery plan ensures it will work effectively during an actual incident.
True
False
16. Which of the following is a type of security control?
a.Marketing
b.Financial
c.Legal
d.Physical
17. Which of the following is a procedural security measure?
a.Data encryption
b.Anti-virus software
c.Non-disclosure agreements
d.Fingerprint locks
18. _____________________ is the protection of information from unauthorized access, use,
disclosure, disruption, modification, and/or destruction.
a.Integrity
b.Availability
c.Confidentiality
d.Accountability
19. What is a clear desk policy primarily designed to prevent?
a.Unauthorized access to sensitive information
b.Physical theft of computers
c.Loss of power supply
d.Cyber-attacks
20. Reviews and audits are crucial to ensuring adherence to current security guidelines, norms, and
regulations.
True
False
21. A non-disclosure agreement is a technical control used to prevent data breaches.
True
False
22. What is the first step in developing a disaster recovery plan (DR)?
a.Testing the plan
b.Implementing security controls
c.Securing off-site storage
d.Conducting a business impact analysis (BIA)
23. What is the main purpose of business continuity planning (BCP)?
a.To restore normal operations after a disaster
b.To prevent cyber-attacks
c.To maintain the continuity of business operations
d.To provide data backup for systems
24. Organizations use risk assessments and business impact analyses to strike a balance between
security precautions and financial concerns.
True
False