What is the first step in a structured approach to come up with this measure?

As a new member of the IT department you have noticed that confidential information has been leaked several times. This may damage the reputation of the company. You have been asked to propose an organisational measure to protect laptop computers. What is the first step in a structured approach to...

June 20, 2021 No Comments READ MORE +

Which of the following statements are correct for Clean Desk Policy?

Which of the following statements are correct for Clean Desk Policy?A . Don't leave confidential documents on your desk.B . Don't leave valuable items on your desk if you are not in your work area.C . Don't leave highly confidential items.D . Don't leave laptops without cable lock.View AnswerAnswer: A,B,C

June 20, 2021 No Comments READ MORE +

Changes on project-managed applications or database should undergo the change control process as documented.

Changes on project-managed applications or database should undergo the change control process as documented.A . TrueB . FalseView AnswerAnswer: A

June 20, 2021 No Comments READ MORE +

A property of Information that has the ability to prove occurrence of a claimed event.

A property of Information that has the ability to prove occurrence of a claimed event.A . Electronic chain lettersB . IntegrityC . AvailabilityD . AccessibilityView AnswerAnswer: B

June 19, 2021 No Comments READ MORE +

What does this signify?

You see a blue color sticker on certain physical assets. What does this signify?A . The asset is very high critical and its failure affects the entire organizationB . The asset with blue stickers should be kept air conditioned at all timesC . The asset is high critical and its...

June 17, 2021 No Comments READ MORE +

What do we call a possible event that can have a disruptive effect on the reliability of information?

An administration office is going to determine the dangers to which it is exposed. What do we call a possible event that can have a disruptive effect on the reliability of information?A . dependencyB . threatC . vulnerabilityD . riskView AnswerAnswer: B

June 17, 2021 No Comments READ MORE +

How are data and information related?

How are data and information related?A . Data is a collection of structured and unstructured informationB . Information consists of facts and statistics collected together for reference or analysisC . When meaning and value are assigned to data, it becomes informationView AnswerAnswer: C

June 17, 2021 No Comments READ MORE +

What is not one of the four main objectives of a risk analysis?

A well-executed risk analysis provides a great deal of useful information. A risk analysis has four main objectives. What is not one of the four main objectives of a risk analysis?A . Identifying assets and their valueB . Implementing counter measuresC . Establishing a balance between the costs of an...

June 15, 2021 No Comments READ MORE +

-------------------------is an asset like other important business assets has value to an organization and consequently needs to be protected.

-------------------------is an asset like other important business assets has value to an organization and consequently needs to be protected.A . InfrastructureB . DataC . InformationD . SecurityView AnswerAnswer: C

June 15, 2021 No Comments READ MORE +

Implement plan on a test basis - this comes under which section of PDCA

Implement plan on a test basis - this comes under which section of PDCAA . PlanB . DoC . ActD . CheckView AnswerAnswer: B

June 15, 2021 No Comments READ MORE +