Which reliability aspect of information is compromised when a staff member denies having sent a message?
Which reliability aspect of information is compromised when a staff member denies having sent a message?A . ConfidentialityB . IntegrityC . AvailabilityD . CorrectnessView AnswerAnswer: B
What is a repressive measure in case of a fire?
What is a repressive measure in case of a fire?A . Taking out a fire insuranceB . Putting out a fire after it has been detected by a fire detectorC . Repairing damage caused by the fireView AnswerAnswer: B
CEO sends a mail giving his views on the status of the company and the company’s future strategy and the CEO's vision and the employee's part in it. The mail should be classified as
CEO sends a mail giving his views on the status of the company and the company’s future strategy and the CEO's vision and the employee's part in it. The mail should be classified asA . Internal MailB . Public MailC . Confidential MailD . Restricted MailView AnswerAnswer: A
Phishing is what type of Information Security Incident?
Phishing is what type of Information Security Incident?A . Private IncidentsB . Cracker/Hacker AttacksC . Technical VulnerabilitiesD . Legal IncidentsView AnswerAnswer: B
Information or data that are classified as ______ do not require labeling.
Information or data that are classified as ______ do not require labeling.A . PublicB . InternalC . ConfidentialD . Highly ConfidentialView AnswerAnswer: A
An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.
An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.A . TrueB . FalseView AnswerAnswer: B
What is the goal of classification of information?
What is the goal of classification of information?A . To create a manual about how to handle mobile devicesB . Applying labels making the information easier to recognizeC . Structuring information according to its sensitivityView AnswerAnswer: C
Who are allowed to access highly confidential files?
Who are allowed to access highly confidential files?A . Employees with a business need-to-knowB . Contractors with a business need-to-knowC . Employees with signed NDA have a business need-to-knowD . Non-employees designated with approved access and have signed NDAView AnswerAnswer: C
What is social engineering?
What is social engineering?A . A group planning for a social activity in the organizationB . Creating a situation wherein a third party gains confidential information from youC . The organization planning an activity for welfare of the neighborhoodView AnswerAnswer: B
Access Control System, CCTV and security guards are form of:
Access Control System, CCTV and security guards are form of:A . Environment SecurityB . Access ControlC . Physical SecurityD . ComplianceView AnswerAnswer: C