Which of these examples is a threat to integrity?
Information has a number of reliability aspects. Reliability is constantly being threatened. Examples of threats are: a cable becomes loose, someone alters information by accident, data is used privately or is falsified. Which of these examples is a threat to integrity?A . a loose cableB . accidental alteration of dataC...
Which of the following statements are correct for Clean Desk Policy?
Which of the following statements are correct for Clean Desk Policy?A . Don't leave confidential documents on your desk.B . Don't leave valuable items on your desk if you are not in your work area.C . Don't leave highly confidential items.D . Don't leave laptops without cable lock.View AnswerAnswer: A,B,C
Implement plan on a test basis - this comes under which section of PDCA
Implement plan on a test basis - this comes under which section of PDCAA . PlanB . DoC . ActD . CheckView AnswerAnswer: B
What is the relationship between data and information?
What is the relationship between data and information?A . Data is structured information.B . Information is the meaning and value assigned to a collection of data.View AnswerAnswer: B
Availability means
Availability meansA . Service should be accessible at the required time and usable by allB . Service should be accessible at the required time and usable only by the authorized entityC . Service should not be accessible when requiredView AnswerAnswer: B
Which department maintain's contacts with law enforcement authorities, regulatory bodies, information service providers and telecommunications service providers depending on the service required.
Which department maintain's contacts with law enforcement authorities, regulatory bodies, information service providers and telecommunications service providers depending on the service required.A . COOB . CISOC . CSMD . MROView AnswerAnswer: B
You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called
You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is calledA . Shoulder SurfingB . MountaineeringC . PhishingD . SpoofingView AnswerAnswer: C
We can leave laptops during weekdays or weekends in locked bins.
We can leave laptops during weekdays or weekends in locked bins.A . TrueB . FalseView AnswerAnswer: B
What kind of threat is this?
You work in the office of a large company. You receive a call from a person claiming to be from the Helpdesk. He asks you for your password. What kind of threat is this?A . Natural threatB . Organizational threatC . Social EngineeringD . ArasonView AnswerAnswer: C
Who is authorized to change the classification of a document?
Who is authorized to change the classification of a document?A . The author of the documentB . The administrator of the documentC . The owner of the documentD . The manager of the owner of the documentView AnswerAnswer: C