Below is Purpose of "Integrity", which is one of the Basic Components of Information Security
Below is Purpose of "Integrity", which is one of the Basic Components of Information SecurityA . the property that information is not made available or disclosed to unauthorized individualsB . the property of safeguarding the accuracy and completeness of assets.C . the property that information is not made available or...
What is a qualitative risk analysis?
A couple of years ago you started your company which has now grown from 1 to 20 employees. Your company’s information is worth more and more and gone are the days when you could keep control yourself. You are aware that you have to take measures, but what should they...
Which security principle is violated?
A hacker gains access to a web server and reads the credit card numbers stored on that server. Which security principle is violated?A . AvailabilityB . ConfidentialityC . IntegrityD . AuthenticityView AnswerAnswer: B
The following are definitions of Information, except:
The following are definitions of Information, except:A . accurate and timely dataB . specific and organized data for a purposeC . mature and measurable dataD . can lead to understanding and decrease in uncertaintyView AnswerAnswer: C
What is an example of the indirect damage caused by this fire?
There was a fire in a branch of the company Midwest Insurance. The fire department quickly arrived at the scene and could extinguish the fire before it spread and burned down the entire premises. The server, however, was destroyed in the fire. The backup tapes kept in another room had...
Cabling Security is associated with Power, telecommunication and network cabling carrying information are protected from interception and damage.
Cabling Security is associated with Power, telecommunication and network cabling carrying information are protected from interception and damage.A . TrueB . FalseView AnswerAnswer: A
Which factor is [b]not[/b] important for determining the value of data for an organization?
In order to take out a fire insurance policy, an administration office must determine the value of the data that it manages. Which factor is [b]not[/b] important for determining the value of data for an organization?A . The content of data.B . The degree to which missing, incomplete or incorrect...
What is we do in ACT - From PDCA cycle
What is we do in ACT - From PDCA cycleA . Take actions to continually monitor process performanceB . Take actions to continually improve process performanceC . Take actions to continually monitor process performanceD . Take actions to continually improve people performanceView AnswerAnswer: B
What is the security management term for establishing whether someone's identity is correct?
What is the security management term for establishing whether someone's identity is correct?A . IdentificationB . AuthenticationC . AuthorisationD . VerificationView AnswerAnswer: B
What does this signify?
You see a blue color sticker on certain physical assets. What does this signify?A . The asset is very high critical and its failure affects the entire organizationB . The asset with blue stickers should be kept air conditioned at all timesC . The asset is high critical and its...