100% Free Exams (No login or credit card required)

Section 5.1

Demonstrate your acquired knowledge about elements of effective security governance. This will demonstrate your proficiency for section 5.1 of the Security+ SY0-701 objectives.

1 / 25

What ensures global security frameworks align with local regulations?

2 / 25

How do policies contribute to security governance?

3 / 25

What is the main function of a playbook in governance?

4 / 25

Which tool is typically used during response simulations to improve readiness?

5 / 25

Which type of external governance driver includes GDPR or HIPAA?

6 / 25

A data custodian is responsible for which of the following tasks?

7 / 25

Which term defines the legal party responsible for data decisions?

8 / 25

Why is encryption standardization important in policy development?

9 / 25

Which security document outlines exact response steps during a breach?

10 / 25

Which process ensures outdated policies are corrected over time?

11 / 25

Which type of governance structure may lead to inconsistent control enforcement?

12 / 25

What is one purpose of a governance committee in cybersecurity?

13 / 25

Which external driver requires compliance with industry-specific rules?

14 / 25

Which policy would address user rights during system onboarding?

15 / 25

What does a password standard typically enforce?

16 / 25

Which of the following best describes a standard in security governance?

17 / 25

Which governance structure may involve cross-functional executive participation?

18 / 25

Which policy outlines business priorities following a crisis?

19 / 25

What is a common outcome of poor change management procedures?

20 / 25

Why is the SDLC policy vital for secure software delivery?

21 / 25

What is a disaster recovery plan primarily designed to support?

22 / 25

Which role is accountable for day-to-day handling of secure datasets?

23 / 25

Who is primarily responsible for defining data sensitivity levels?

24 / 25

What is the purpose of an information security policy?

25 / 25

Which document defines employee responsibilities for proper system access and usage?

Your score is

The average score is 0%

0%