Where in the incident cycle is moving to a stand-by arrangements found?
A fire breaks out in a branch office of a health insurance company. The personnel are transferred to neighboring branches to continue their work. Where in the incident cycle is moving to a stand-by arrangements found?A . between threat and incidentB . between recovery and threatC . between damage and...
Information Security is a matter of building and maintaining ________ .
Information Security is a matter of building and maintaining ________ .A . ConfidentialityB . TrustC . ProtectionD . FirewallsView AnswerAnswer: B
Four types of Data Classification (Choose two)
Four types of Data Classification (Choose two)A . Restricted Data, Confidential DataB . Project Data, Highly Confidential DataC . Financial Data, Highly Confidential DataD . Unrestricted Data, Highly Confidential DataView AnswerAnswer: A,D
What is the purpose of an Information Security policy?
What is the purpose of an Information Security policy?A . An information security policy makes the security plan concrete by providing the necessary detailsB . An information security policy provides insight into threats and the possible consequencesC . An information security policy provides direction and support to the management regarding...
What does this signify?
You see a blue color sticker on certain physical assets . What does this signify?A . The asset is very high critical and its failure affects the entire organizationB . The asset with blue stickers should be kept air conditioned at all timesC . The asset is high critical and...
How can this affect the confidentiality of information?
Often, people do not pick up their prints from a shared printer . How can this affect the confidentiality of information?A . Confidentiality cannot be guaranteedB . Integrity cannot be guaranteedC . Authenticity cannot be guaranteedD . Availability cannot be guaranteedView AnswerAnswer: A
Which reliability aspect of information is in danger here?
A member of staff denies sending a particular message. Which reliability aspect of information is in danger here?A . availabilityB . correctnessC . integrityD . confidentialityView AnswerAnswer: C
An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.
An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.A . TrueB . FalseView AnswerAnswer: A
Which of the following is a preventive security measure?
Which of the following is a preventive security measure?A . Installing logging and monitoring softwareB . Shutting down the Internet connection after an attackC . Storing sensitive information in a data saveView AnswerAnswer: C
Which threat could occur if no physical measures are taken?
Which threat could occur if no physical measures are taken?A . Unauthorised persons viewing sensitive filesB . Confidential prints being left on the printerC . A server shutting down because of overheatingD . Hackers entering the corporate networkView AnswerAnswer: C