CEO sends a mail giving his views on the status of the company and the company’s future strategy and the CEO's vision and the employee's part in it. The mail should be classified as

CEO sends a mail giving his views on the status of the company and the company’s future strategy and the CEO's vision and the employee's part in it. The mail should be classified asA . Internal MailB . Public MailC . Confidential MailD . Restricted MailView AnswerAnswer: A

June 23, 2021 No Comments READ MORE +

You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called

You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is calledA . Shoulder SurfingB . MountaineeringC . PhishingD . SpoofingView AnswerAnswer: C

June 23, 2021 No Comments READ MORE +

An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.

An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.A . TrueB . FalseView AnswerAnswer: B

June 23, 2021 No Comments READ MORE +

In which order is an Information Security Management System set up?

In which order is an Information Security Management System set up?A . Implementation, operation, maintenance, establishmentB . Implementation, operation, improvement, maintenanceC . Establishment, implementation, operation, maintenanceD . Establishment, operation, monitoring, improvementView AnswerAnswer: C

June 22, 2021 No Comments READ MORE +

Which of these examples is a threat to integrity?

Information has a number of reliability aspects. Reliability is constantly being threatened. Examples of threats are: a cable becomes loose, someone alters information by accident, data is used privately or is falsified. Which of these examples is a threat to integrity?A . a loose cableB . accidental alteration of dataC...

June 20, 2021 No Comments READ MORE +

What is an example of the indirect damage caused by this fire?

There was a fire in a branch of the company Midwest Insurance. The fire department quickly arrived at the scene and could extinguish the fire before it spread and burned down the entire premises. The server, however, was destroyed in the fire. The backup tapes kept in another room had...

June 20, 2021 No Comments READ MORE +

Which of the following does an Asset Register contain? (Choose two)

Which of the following does an Asset Register contain? (Choose two)A . Asset TypeB . Asset OwnerC . Asset ModifierD . Process IDView AnswerAnswer: A,B

June 19, 2021 No Comments READ MORE +

The following are definitions of Information, except:

The following are definitions of Information, except:A . accurate and timely dataB . specific and organized data for a purposeC . mature and measurable dataD . can lead to understanding and decrease in uncertaintyView AnswerAnswer: C

June 19, 2021 No Comments READ MORE +

What is the goal of classification of information?

What is the goal of classification of information?A . To create a manual about how to handle mobile devicesB . Applying labels making the information easier to recognizeC . Structuring information according to its sensitivityView AnswerAnswer: C

June 19, 2021 No Comments READ MORE +

Stages of Information

Stages of InformationA . creation, evolution, maintenance, use, dispositionB . creation, use, disposition, maintenance, evolutionC . creation, distribution, use, maintenance, dispositionD . creation, distribution, maintenance, disposition, useView AnswerAnswer: C

June 18, 2021 No Comments READ MORE +