In acceptable use of Information Assets, which is the best practice?
In acceptable use of Information Assets, which is the best practice?A . Access to information and communication systems are provided for business purpose onlyB . Interfering with or denying service to any user other than the employee's hostC . Playing any computer games during office hoursD . Accessing phone or...
Below is Purpose of "Integrity", which is one of the Basic Components of Information Security
Below is Purpose of "Integrity", which is one of the Basic Components of Information SecurityA . the property that information is not made available or disclosed to unauthorized individualsB . the property of safeguarding the accuracy and completeness of assets.C . the property that information is not made available or...
Changes on project-managed applications or database should undergo the change control process as documented.
Changes on project-managed applications or database should undergo the change control process as documented.A . TrueB . FalseView AnswerAnswer: A
The following are purposes of Information Security, except:
The following are purposes of Information Security, except:A . Ensure Business ContinuityB . Minimize Business RiskC . Increase Business AssetsD . Maximize Return on InvestmentView AnswerAnswer: C
What is a definition of compliance?
What is a definition of compliance?A . Laws, considered collectively or the process of making or enacting lawsB . The state or fact of according with or meeting rules or standardsC . An official or authoritative instructionD . A rule or directive made and maintained by an authority.View AnswerAnswer: B
Why do we need to test a disaster recovery plan regularly, and keep it up to date?
Why do we need to test a disaster recovery plan regularly, and keep it up to date?A . Otherwise the measures taken and the incident procedures planned may not be adequateB . Otherwise it is no longer up to date with the registration of daily occurring faultsC . Otherwise remotely...
Which department maintain's contacts with law enforcement authorities, regulatory bodies, information service providers and telecommunications service providers depending on the service required.
Which department maintain's contacts with law enforcement authorities, regulatory bodies, information service providers and telecommunications service providers depending on the service required.A . COOB . CISOC . CSMD . MROView AnswerAnswer: B
Information or data that are classified as ______ do not require labeling.
Information or data that are classified as ______ do not require labeling.A . PublicB . InternalC . ConfidentialD . Highly ConfidentialView AnswerAnswer: A
Which measure is a preventive measure?
Which measure is a preventive measure?A . Installing a logging system that enables changes in a system to be recognizedB . Shutting down all internet traffic after a hacker has gained access to the company systemsC . Putting sensitive information in a safeView AnswerAnswer: C
What is the name of the system that guarantees the coherence of information security in the organization?
What is the name of the system that guarantees the coherence of information security in the organization?A . Information Security Management System (ISMS)B . RootkitC . Security regulations for special information for the governmentD . Information Technology Service Management (ITSM)View AnswerAnswer: A