__________ is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
__________ is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.A . TrojanB . Operating SystemC . VirusD . MalwareView AnswerAnswer: D
What is not one of the four main objectives of a risk analysis?
A well-executed risk analysis provides a great deal of useful information. A risk analysis has four main objectives. What is not one of the four main objectives of a risk analysis?A . Identifying assets and their valueB . Implementing counter measuresC . Establishing a balance between the costs of an...
What is a repressive measure in case of a fire?
What is a repressive measure in case of a fire?A . Taking out a fire insuranceB . Putting out a fire after it has been detected by a fire detectorC . Repairing damage caused by the fireView AnswerAnswer: B
The following are the guidelines to protect your password, except:
The following are the guidelines to protect your password, except:A . Don't use the same password for various company system security accessB . Do not share passwords with anyoneC . For easy recall, use the same password for company and personal accountsD . Change a temporary password on first log-onView...
All are prohibited in acceptable use of information assets, except:
All are prohibited in acceptable use of information assets, except:A . Electronic chain lettersB . E-mail copies to non-essential readersC . Company-wide e-mails with supervisor/TL permission.D . Messages with very large attachments or to a large number ofrecipients.View AnswerAnswer: C
Information or data that are classified as ______ do not require labeling.
Information or data that are classified as ______ do not require labeling.A . PublicB . InternalC . ConfidentialD . Highly ConfidentialView AnswerAnswer: A
Which is not a requirement of HR prior to hiring?
Which is not a requirement of HR prior to hiring?A . Undergo background verificationB . Applicant must complete pre-employment documentation requirementsC . Must undergo Awareness training on information security.D . Must successfully pass Background InvestigationView AnswerAnswer: C
Information Security is a matter of building and maintaining ________ .
Information Security is a matter of building and maintaining ________ .A . ConfidentialityB . TrustC . ProtectionD . FirewallsView AnswerAnswer: B
Does the security have the right to ask you to display your ID badges and check your bags?
Does the security have the right to ask you to display your ID badges and check your bags?A . TrueB . FalseView AnswerAnswer: A
Which of the following is not a type of Information Security attack?
Which of the following is not a type of Information Security attack?A . Legal IncidentsB . Vehicular IncidentsC . Technical VulnerabilitiesD . Privacy IncidentsView AnswerAnswer: B