https://www.udemy.com/course/comptia-security-601-practice-exam-domain-1-5/learn/quiz/6105232
Domain 5 – Governance, Risk, and Compliance
Question 1
What is the purpose of a ==risk assessment== in an organization’s security strategy?
-
Identifying vulnerabilities
-
Determining compliance requirements
-
Assigning blame in case of a security incident
-
Evaluating the cost of security measures
Overall explanation
A) The primary purpose of a risk assessment is to identify potential threats, vulnerabilities, and their potential impact on an organization’s assets. It’s a fundamental step in developing effective security measures.
Incorrect answers:
B) Determining compliance requirements: While risk assessment contributes to understanding compliance needs, its primary aim is identifying risks, not determining specific compliance.
C) Assigning blame in case of a security incident: A risk assessment is not about assigning blame but rather about proactively identifying potential risks.
D) Evaluating the cost of security measures: Cost considerations might be part of risk assessment, but its primary purpose is identifying risks, not evaluating the cost of security measures.
Question 2
How does the principle of "==Clean Desk Space==" contribute to an organization’s security measures?
-
Reducing employee engagement by limiting personal desk items
-
Limiting access to certain work areas to specific employee roles
-
Ensuring employees regularly clean and organize their workstations
-
Preventing unauthorized access to sensitive documents left on desks
Overall explanation
D) The concept of a clean desk space involves ensuring sensitive information and documents are not left exposed, thus reducing the risk of unauthorized access to such materials.
Incorrect answers:
A) Unrelated to the security purpose of the clean desk policy.
B) More related to physical access controls rather than clean desk space policy.
C) While good practice, it’s not the primary objective of the clean desk policy.
Question 3
Why is "==Job Rotation==" considered a valuable security measure within organizations?
-
Preventing unauthorized access to company resources
-
Ensuring employees clean their desk spaces regularly
-
Limiting access to sensitive data through mandatory vacations
-
Mitigating risks by rotating employees through different job responsibilities
Overall explanation
D) Job Rotation helps reduce the risk of fraud, errors, and misuse by moving employees through various job roles, which provides cross-training and prevents potential abuse of access.
Incorrect answers:
A) Pertains more to access control measures than job rotation.
B) Relates to a clean desk policy, not specifically to job rotation.
C) Refers to a different security control (mandatory vacations) rather than job rotation.
Question 4
How does an "==Acceptable Use Policy==" contribute to an organization’s security framework?
-
Limiting access to specific work areas to certain employee roles
-
Outlining guidelines for appropriate use of company resources and systems
-
Implementing mandatory background checks for all employees
-
Rotating employees through different job roles periodically
Overall explanation
B) An Acceptable Use Policy defines acceptable behaviors regarding the use of company resources, systems, and information, reducing risks associated with improper use.
Incorrect answers:
A) Pertains more to physical security measures than to an Acceptable Use Policy.
C) Important but a different policy and procedure in security management.
D) Pertains to job rotation, not specifically related to an Acceptable Use Policy.
Question 5
In the context of security best practices, what does "==Separation of Duties==" aim to achieve?
-
Assigning multiple duties to a single individual to maximize productivity
-
Limiting an employee’s access to specific areas of the workplace
-
Restricting an employee’s access to sensitive data and systems
-
Dividing tasks among different individuals to prevent fraud and errors
Overall explanation
D) "Separation of Duties" ensures that critical functions are divided among multiple individuals to reduce the risk of fraud, errors, and misuse of power.
Incorrect answers:
A) Contradicts the principle of separation of duties, which aims to distribute tasks for checks and balances.
B) Pertains more to physical security measures than separation of duties.
C) Partially related to least privilege but not specific to separation of duties.
Question 6
What role do ==Preventive Controls== play in an organization’s security framework?
-
Correcting and mitigating the impact of security incidents
-
Identifying and alerting the presence of security incidents
-
Blocking potential security incidents from occurring
-
Establishing secure data backups and recovery plans
Overall explanation
C) Preventive Controls are measures or mechanisms put in place to avoid security incidents from happening or to reduce the likelihood of their occurrence.
Incorrect answers:
A) This aligns more with corrective controls, which focus on addressing incidents after they happen.
B) Falls under detective controls, which aim to identify security incidents rather than prevent them.
D) Primarily associated with recovery controls, ensuring systems can be restored after an incident.
Question 7
What is the primary purpose of ==Corrective Controls== in the realm of cybersecurity governance?
-
Preventing potential security incidents
-
Quickly responding to security incidents as they occur
-
Correcting and mitigating the impact of security incidents
-
Establishing robust access control measures
Overall explanation
C) Corrective Controls aim to correct and reduce the impact of security incidents after they’ve occurred, working to restore affected systems.
Incorrect answers:
A) More aligned with preventive controls rather than corrective measures.
B) Corrective Controls focus on correction and mitigation, not immediate response.
D) This aligns more with preventive controls than corrective measures.
Question 8
How do ==Deterrent Controls== contribute to an organization’s security strategy?
-
Providing immediate response to security incidents
-
Discouraging potential attackers from targeting the organization
-
Identifying and mitigating security vulnerabilities
-
Establishing secure data backups and recovery plans
Overall explanation
B) Deterrent Controls aim to dissuade potential attackers or threats from targeting the organization by creating visible deterrents.
Incorrect answers:
A) Deterrent Controls focus on discouraging attacks rather than responding to them.
C) This aligns more with preventive or corrective controls, not specifically deterrent measures.
D) Pertains more to recovery controls rather than the primary function of deterrent controls.
Question 9
In terms of risk management, what does the term "==Risk Appetite==" refer to?
-
The maximum risk level an organization is willing to accept
-
The likelihood of a security incident occurring
-
The overall risk exposure of the organization
-
The effectiveness of risk mitigation strategies
Overall explanation
A) Risk Appetite signifies the level of risk an organization is willing to accept or tolerate before taking action.
Incorrect answers:
B) Refers more to risk probability or likelihood rather than organizational tolerance.
C) Alludes to the total risk but doesn’t specifically address the maximum level an organization accepts.
D) Concentrates on the efficiency of risk reduction rather than the threshold of risk acceptance.
Question 10
What does the term "==Chain of Custody==" primarily refer to?
-
Documentation of evidence handling procedures
-
Tracking unauthorized access attempts
-
Cataloging software and hardware inventory
-
Maintaining system backups
Overall explanation
A) The "Chain of Custody" refers to a documented trail that records the chronological history of evidence handling, ensuring its integrity and admissibility in legal proceedings.
Incorrect answers:
B) More aligned with intrusion detection or monitoring rather than evidence handling procedures.
C) Not directly related to handling evidence, which is the primary focus of the Chain of Custody.
D) While essential, this isn’t the primary focus of the Chain of Custody, which relates to evidence documentation.
Question 11
Which term refers to a legal statement ensuring that two parties will keep specific information confidential?
-
Non-Disclosure Agreement (NDA)
-
Memorandum of Understanding (MOU)
-
Service Level Agreement (SLA)
-
Business Partnership Agreement
Overall explanation
A) An NDA is a legally binding contract between two or more parties, ensuring that specific information remains confidential and is not shared with others.
Incorrect answers:
B) Usually outlines broader terms of an agreement or understanding between parties but doesn’t primarily focus on confidentiality.
C) Concerns performance metrics and service commitments between service providers and customers rather than confidentiality.
D) Focuses on terms of a business relationship rather than confidentiality.
Question 12
What is the primary function of a ==Privacy Impact Assessment (PIA)==?
-
Assessing the financial impact of security breaches
-
Identifying potential risks to individual privacy
-
Evaluating the effectiveness of security controls
-
Analyzing the impact of data encryption methods
Overall explanation
B) A Privacy Impact Assessment primarily aims to identify and evaluate potential risks to individual privacy within a specific system or process.
Incorrect answers:
A) While crucial, this is not the main function of a PIA, which is focused on privacy risks.
C) PIAs are more concerned with privacy risks than the overall effectiveness of security controls.
D) Encryption is a security control; a PIA addresses broader privacy concerns beyond encryption impact.
Question 13
What is the purpose of a ==Security Risk Assessment==?
-
Identifying security controls
-
Evaluating the impact of a security breach
-
Measuring and managing potential risks
-
Testing the effectiveness of disaster recovery plans
Overall explanation
C) A Security Risk Assessment involves identifying, analyzing, and managing potential risks within an organization’s security landscape.
Incorrect answers:
A) While it could be a result of a risk assessment, the primary purpose is to assess risks, not identify controls.
B) Assessing the impact of a breach is different from a risk assessment.
D) Although important, this specifically deals with the effectiveness of disaster recovery, not the comprehensive risk assessment.
Question 14
Which term describes the process of ==quantifying the possible losses== from a particular risk?
-
Risk Analysis
-
Risk Mitigation
-
Risk Assessment
-
Risk Management
Overall explanation
A) Risk analysis involves the process of evaluating potential losses from a specific risk in terms of impact and likelihood.
Incorrect answers:
B) Risk Mitigation: Refers to the methods used to reduce, transfer, or avoid risks rather than quantifying the potential losses.
C) Risk Assessment: Involves evaluating risks, but it doesn’t directly quantify the potential losses associated with those risks.
D) Risk Management: Involves the overall process of identifying, assessing, and mitigating risks, rather than specifically quantifying potential losses.
Question 15
Which of the following is an essential component of a ==security policy framework== in an organization?
-
Conducting regular vulnerability assessments
-
Providing physical access controls
-
Establishing a business continuity plan
-
Configuring network firewalls
Overall explanation
C) A business continuity plan is vital for operations during and after a disaster or security breach.
Incorrect answers:
A) Important but not a policy framework component.
B) Pertains more to physical security than policy framework.
D) Important for security but a specific security control rather than a policy framework component.
Question 16
What is the primary ==goal of governance== in the context of information security?
-
Implementing technical controls
-
Establishing policies and procedures
-
Performing vulnerability assessments
-
Enforcing user training
Overall explanation
B) Governance in information security is primarily concerned with setting up a framework of policies, procedures, and controls to guide an organization’s security posture. These policies are designed to align with the organization’s objectives and ensure compliance.
Incorrect answers:
A) Implementing technical controls: Governance sets the rules and framework but doesn’t directly implement technical controls.
C) Performing vulnerability assessments: Vulnerability assessments are part of the risk management process, not governance.
D) Enforcing user training: Though training is a crucial aspect, governance focuses on establishing the guidelines rather than directly enforcing training.
Question 17
Which of the following is an example of a compliance standard relevant to the handling of payment card data?
HIPAA
Correct answer
PCI DSS
FERPA
ISO/IEC 27001
Overall explanation
B) PCI DSS (Payment Card Industry Data Security Standard). PCI DSS is specifically designed to ensure the secure handling of cardholder information. It applies to all organizations that handle credit card data.
Incorrect answers:
A) HIPAA: HIPAA deals with healthcare-related data privacy and security, not payment card data.
C) FERPA: FERPA relates to educational records’ privacy, not payment card data.
D) ISO/IEC 27001: While this is a general information security standard, it’s not specifically focused on payment card data but on information security management systems in general.
Question 18
What role does the CISO (Chief Information Security Officer) typically play in an organization’s security governance?
Developing software applications
Implementing firewalls and intrusion detection systems
Correct answer
Enforcing security policies and procedures
Managing HR operations
Overall explanation
C) The CISO is primarily responsible for establishing and enforcing security policies and procedures, aligning them with the organization’s objectives.
Incorrect answers:
A) Developing software applications: This responsibility typically belongs to software development teams, not the CISO.
B) Implementing firewalls and intrusion detection systems: Implementation is generally handled by security teams, not the CISO directly.
D) Managing HR operations: CISO focuses on security-related activities rather than HR functions.
Question 19
How does governance differ from compliance in the context of security management?
Governance deals with regulations, while compliance focuses on internal policies
Governance refers to policies, while compliance refers to risk assessment
Correct answer
Governance defines the rules, while compliance ensures adherence to those rules
Governance establishes procedures, while compliance dictates technology use
Overall explanation
C) Governance defines the rules, while compliance ensures adherence to those rules. Governance sets the framework, rules, and guidelines for security, while compliance is about conforming to those rules and standards.
Incorrect answers:
A) Governance deals with regulations, while compliance focuses on internal policies: Both governance and compliance involve rules and regulations, but their focus areas differ.
B) Governance refers to policies, while compliance refers to risk assessment: Compliance involves adherence to policies, but it’s not focused on risk assessment.
D) Governance establishes procedures, while compliance dictates technology use: Compliance ensures alignment with established rules, but it doesn’t dictate specific technology use.
Question 20
What is the main purpose of a compliance audit?
Identifying vulnerabilities
Correct answer
Ensuring conformity to established standards and regulations
Conducting risk assessments
Creating security policies
Overall explanation
B) A compliance audit verifies whether an organization is adhering to relevant laws, regulations, and internal policies regarding security measures.
Incorrect answers:
A) Compliance audits primarily focus on conformity rather than identifying vulnerabilities.
C) Risk assessments concentrate on identifying risks rather than ensuring compliance.
D) Compliance audits check adherence to policies rather than crafting them.
Question 21
How does risk acceptance differ from risk avoidance in risk management?
Risk acceptance involves mitigating identified risks, while risk avoidance ignores potential risks.
Correct answer
Risk acceptance is acknowledging the existence of a risk without taking action, while risk avoidance is actively working to eliminate risks.
Risk acceptance transfers identified risks to a third party, while risk avoidance mitigates risks within the organization.
Risk acceptance is embracing identified risks, while risk avoidance is eliminating the risk by investing in insurance.
Overall explanation
B) Risk acceptance means acknowledging the existence of a risk without taking actions to mitigate it, whereas risk avoidance involves active measures to eliminate or reduce the risk.
Incorrect answers:
A) Risk acceptance doesn’t involve mitigating risks; it’s about acknowledging their presence.
C) Risk acceptance and risk avoidance do not necessarily involve third-party transfers but rather the strategies applied within the organization.
D) Risk avoidance involves proactive measures to eliminate risks, not merely investing in insurance.
Question 22
What is the primary objective of a security policy in an organization?
Enforcing legal regulations
Providing technical guidance for IT professionals
Correct answer
Communicating management’s directives for security
Establishing penalties for security breaches
Overall explanation
C) Security policies in an organization communicate management’s directives and expectations for security measures to ensure alignment and compliance throughout the organization.
Incorrect answers:
A) Enforcing legal regulations: Security policies aim to guide an organization’s internal security measures, not enforce external legal regulations.
B) Providing technical guidance for IT professionals: While policies might include technical aspects, they are broader directives, not specifically technical guidelines.
D) Establishing penalties for security breaches: Policies guide behavior but don’t solely establish penalties; those are typically part of an incident response plan.
Question 23
What is the primary objective of a data classification policy in an organization’s security framework?
To define security measures for physical data storage
Correct answer
To categorize data based on sensitivity and define handling procedures
To outline procedures for disaster recovery
To encrypt all sensitive data
Overall explanation
B) A data classification policy establishes how data should be categorized based on sensitivity levels and outlines appropriate handling procedures for each category.
Incorrect answers:
A) Data classification policies are more focused on categorization and handling than on physical storage.
C) Disaster recovery policies primarily address recovery after an incident, not data categorization.
D) While encryption is a crucial part, the policy is broader and includes classification and handling guidelines.
Question 24
What is the primary focus of a change management process in an organization’s security governance?
Implementing security incident response plans
Reviewing security policies quarterly
Correct answer
Controlling modifications to systems and environments
Evaluating security awareness training effectiveness
Overall explanation
C) Change management in security governance primarily focuses on controlling and documenting modifications to systems, configurations, and environments to maintain security and reduce risks associated with changes.
Incorrect answers:
A) Incident response plans are for addressing security incidents, not the same as change management.
B) Policy reviews are part of governance but different from change management.
D) Training evaluation is essential but not the primary focus of change management.
Question 25
Which term refers to the maximum acceptable amount of time a system can be unavailable before it starts causing severe damage to the organization?
MTBF (Mean Time Between Failures)
RTO (Recovery Time Objective)
MTTR (Mean Time to Repair)
Correct answer
MTD (Maximum Tolerable Downtime)
Overall explanation
D) MTD is the maximum duration a system can be down before severe damage occurs to the organization.
Incorrect answers:
A) MTBF refers to the average time between failures, not the maximum allowable downtime.
B) RTO is the targeted duration for restoring services after an incident.
C) MTTR is the average time it takes to repair a failed system but doesn’t indicate maximum tolerable downtime.
Question 26
What is the primary purpose of a security awareness training program within an organization?
Implementing security controls
Identifying security incidents
Correct answer
Educating employees about security best practices
Responding to security breaches
Overall explanation
C) Security awareness training aims to educate employees about security best practices and potential threats.
Incorrect answers:
A) Training educates but doesn’t directly implement controls.
B) While training may help recognize incidents, it’s not the primary goal.
D) Training is preventive, not reactive in handling breaches.
Question 27
What is the primary objective of an IT audit of an organization’s security governance?
Ensuring all software is up-to-date
Correct answer
Verifying compliance with policies and regulations
Implementing new security protocols
Assessing user access controls
Overall explanation
B) An IT audit primarily aims to assess and ensure that the organization complies with established policies, regulations, and industry standards.
Incorrect answers:
A) Though important, ensuring software updates isn’t the primary objective of an IT audit in security governance.
C) IT audits typically assess adherence to existing protocols rather than introducing new ones.
D) While this can be a part of an audit, the primary focus is compliance with policies and regulations.
Question 28
Which regulation is specifically designed to protect the privacy of individuals’ personally identifiable information (PII)?
Correct answer
GDPR
SOX
GLBA
FERPA
Overall explanation
A) GDPR (General Data Protection Regulation) is specifically designed to protect the privacy of individuals’ personally identifiable information within the European Union and the European Economic Area.
Incorrect answers:
B) SOX (Sarbanes-Oxley Act) primarily focuses on financial reporting regulations for public companies in the United States.
C) GLBA (Gramm-Leach-Bliley Act) is focused on financial institutions’ requirements for safeguarding customers’ non-public personal information.
D) FERPA (Family Educational Rights and Privacy Act) is related to the privacy of student educational records, not specifically PII in a broader context.
Question 29
What type of risk is associated with the potential financial loss due to human errors, fraud, or intentional sabotage within an organization?
Compliance risk
Human error risk
Correct answer
Operational risk
Financial risk
Overall explanation
C) Operational risk involves potential financial loss resulting from human errors, fraud, or deliberate sabotage within an organization.
Incorrect answers:
A) Compliance risk involves potential financial loss due to the failure to comply with industry regulations or standards.
B) While human errors are a component, this term doesn’t capture fraud or deliberate sabotage.
D) Financial risk encompasses a broader range, not specifically limited to internal errors or fraud.
Question 30
What type of risk involves potential financial loss due to the inability to recover from a disaster or unexpected event?
Operational risk
Compliance risk
Correct answer
Business continuity risk
Legal risk
Overall explanation
C) Business continuity risk refers to the potential financial loss resulting from an organization’s inability to recover from a disaster or unexpected event.
Incorrect answers:
A) Operational risk involves the risk of loss due to failed internal processes, systems, or people.
B) Compliance risk refers to the potential of financial loss or damage to an organization’s reputation resulting from its failure to comply with laws and regulations.
D) Legal risk involves the potential financial loss resulting from legal actions, lawsuits, or regulatory sanctions.
Question 31
How does implementing account lockout policies contribute to credential security within an organization?
Encourages employees to use simple passwords
Correct answer
Prevents unauthorized access by limiting login attempts
Ensures continuous access to all user accounts
Allows unlimited login attempts without restriction
Overall explanation
B) Account lockout policies prevent unauthorized access by restricting the number of unsuccessful login attempts, enhancing credential security.
Incorrect answers:
A) Account lockout policies do not encourage the use of simple passwords, but rather discourage unauthorized access through repeated attempts.
C) Account lockout policies restrict access after multiple failed login attempts to prevent unauthorized entry.
D) This statement is incorrect; account lockout policies aim to limit the number of unsuccessful login attempts.
Question 32
Which type of System and Organization Controls (SOC) report is based on the design and suitability of controls at a specific point in time?
SSAE SOC 1 Type I
Correct answer
SSAE SOC 2 Type I
SSAE SOC 1 Type II
SSAE SOC 2 Type II
Overall explanation
B) SOC 2 Type I reports focus on the design and suitability of controls at a specific point in time.
Incorrect answers:
A) SSAE SOC 1 Type I: SOC 1 Type I reports focus on controls relevant to financial reporting and are not related to the design and suitability of controls at a specific time.
C) SSAE SOC 1 Type II: SOC 1 Type II reports concentrate on the operational effectiveness of controls over a specific time period rather than design.
D) SSAE SOC 2 Type II: SOC 2 Type II reports assess the operational effectiveness and suitability of controls over a specified period, not just the design.
Question 33
What should be included in a comprehensive third-party risk management plan?
Legal disclaimers for liability
Regular security audits of the organization
A process for onboarding new employees
Correct answer
Assessment of third-party access and controls
Overall explanation
D) A comprehensive third-party risk management plan should involve assessing third-party access levels and the controls in place to manage those access privileges.
Incorrect answers:
A) While legal disclaimers are important for contractual agreements, they are not directly related to risk management or security assessments.
B) While essential for the organization’s internal security, it doesn’t directly address third-party risk.
C) Onboarding processes for employees are not part of third-party risk management but rather internal HR procedures.
Question 34
How can "Phishing Campaigns" benefit an organization’s security preparedness?
By encouraging employees to share personal information to improve teamwork.
Correct answer
By identifying and educating employees on recognizing and avoiding phishing attempts.
By distributing email links for users to click and win prizes for engagement.
By implementing random system shutdowns to test employee response time.
Overall explanation
B) Phishing campaigns help in identifying vulnerable employees and educating them on spotting and avoiding phishing attempts, thereby strengthening security awareness.
Incorrect answers:
A) Contrary to the goal of security campaigns and poses a security risk.
C) Promotes unsafe behavior and disregards the risks associated with phishing attempts.
D) Unrelated to the purpose of phishing campaigns in educating employees on security threats.
Question 35
In the context of security training, what is the primary goal of a "Capture the Flag" exercise?
To capture sensitive information through network security breaches.
To engage employees in a competitive outdoor team-building exercise.
Correct answer
To simulate real-world cyber-attack scenarios for skill improvement.
To test physical security measures within the workplace.
Overall explanation
C) Capture the Flag exercises simulate real-world cyber-attack scenarios, helping participants improve their skills and responses.
Incorrect answers:
A) Misinterprets the exercise’s goal, as it’s about defensive learning, not actual hacking.
B) The exercise is related to cybersecurity, not outdoor team-building.
D) Capture the Flag exercises are specific to cyber scenarios, not physical security.
Question 36
How is "Asset Value" defined in a risk assessment?
The monetary value of a specific risk occurrence
Correct answer
The overall worth of an organization’s physical and digital resources
The probability of a risk’s impact on the organization
The total value of all potential annual losses within an organization
Overall explanation
B) Asset value refers to the total worth of an organization’s assets, both physical and digital, which are subject to risk.
Incorrect answers:
A) Represents Single-Loss Expectancy (SLE), not asset value.
C) Describes likelihood, not asset value.
D) Refers to Annualized Loss Expectancy (ALE), not asset value.
Question 37
What does "Annualized Loss Expectancy (ALE)" represent in a risk assessment?
The likelihood of occurrence of a specific risk over a year
Correct answer
The total potential loss from a specific risk in a year
The qualitative nature of a potential risk impact
The value assigned to a single occurrence of a potential risk
Overall explanation
B) ALE represents the total expected loss from a particular risk over a year, factoring in SLE and ARO.
Incorrect answers:
A) This refers to the Annualized Rate of Occurrence (ARO), not ALE.
C) Pertains to qualitative assessment, not ALE.
D) Defines Single-Loss Expectancy (SLE), not ALE.
Question 38
What is the primary goal of "Risk Control Self-Assessment" within an organization?
Determining the inherent risks of specific activities
Correct answer
Evaluating the effectiveness of control measures
Assessing the residual risks after implementing controls
Increasing employee awareness of workplace risks
Overall explanation
B) The primary goal of Risk Control Self-Assessment is to assess and gauge the effectiveness of control measures in place to manage risks within the organization.
Incorrect answers:
A) This is related to identifying inherent risk, not evaluating control effectiveness.
C) Pertains to residual risk assessment, not specifically risk control self-assessment.
D) Relates more to general risk awareness training rather than the specific aim of self-assessment.
Question 39
What does "Residual Risk" represent in the context of risk management?
Correct answer
The risk level after implementing risk controls
The initial risk level identified in a risk self-assessment
Employee awareness of potential risks in the workplace
The inherent risks associated with a particular activity
Overall explanation
A) Residual risk represents the remaining level of risk after all applicable controls, safeguards, and mitigations have been applied.
Incorrect answers:
B) This represents the inherent risk, not residual risk.
C) Pertains to risk awareness but not specifically residual risk.
D) Represents inherent risk, not residual risk.
Question 40
What is the primary aim of "Mandatory Vacation" within an organization’s security strategy?
Providing employees time off for relaxation and stress reduction
Limiting access to specific areas of the workplace to certain roles
Ensuring sensitive roles are temporarily filled by other staff
Correct answer
Preventing potential risks or fraud by requiring employees to take time off
Overall explanation
D) Mandatory vacations ensure that employees take time off, reducing the potential for fraud or errors by requiring others to cover their roles temporarily.
Incorrect answers:
A) While a benefit, this isn’t the primary purpose within the context of security.
B) More related to access controls than mandatory vacations.
C) This is a positive outcome but not the primary aim of mandatory vacations in security strategy.