Which of the following is a technical security measure?

Which of the following is a technical security measure?A . EncryptionB . Security policyC . Safe storage of backupsD . User role profiles.View AnswerAnswer: A

March 5, 2021 No Comments READ MORE +

Which threat could occur if no physical measures are taken?

Which threat could occur if no physical measures are taken?A . Unauthorised persons viewing sensitive filesB . Confidential prints being left on the printerC . A server shutting down because of overheatingD . Hackers entering the corporate networkView AnswerAnswer: C

March 4, 2021 No Comments READ MORE +

After a devastating office fire, all staff are moved to other branches of the company. At what moment in the incident management process is this measure effectuated?

After a devastating office fire, all staff are moved to other branches of the company. At what moment in the incident management process is this measure effectuated?A . Between incident and damageB . Between detection and classificationC . Between recovery and normal operationsD . Between classification and escalationView AnswerAnswer: A

March 4, 2021 No Comments READ MORE +

What type of threat is this?

Someone from a large tech company calls you on behalf of your company to check the health of your PC, and therefore needs your user-id and password. What type of threat is this?A . Social engineering threatB . Organisational threatC . Technical threatD . Malware threatView AnswerAnswer: A

March 3, 2021 No Comments READ MORE +

Which of the Confidentiality, Integrity, Availability (CIA) principles of the credit card file are violated?

A hacker gains access to a webserver and can view a file on the server containing credit card numbers. Which of the Confidentiality, Integrity, Availability (CIA) principles of the credit card file are violated?A . AvailabilityB . ConfidentialityC . IntegrityD . ComplianceView AnswerAnswer: B

March 3, 2021 No Comments READ MORE +

An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.

An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.A . TrueB . FalseView AnswerAnswer: B

March 3, 2021 No Comments READ MORE +

What type of security measure is this?

The computer room is protected by a pass reader. Only the System Management department has a pass. What type of security measure is this?A . a corrective security measureB . a physical security measureC . a logical security measureD . a repressive security measureView AnswerAnswer: B

March 2, 2021 No Comments READ MORE +

Which measure is a preventive measure?

Which measure is a preventive measure?A . Installing a logging system that enables changes in a system to be recognizedB . Shutting down all internet traffic after a hacker has gained access to the company systemsC . Putting sensitive information in a safeView AnswerAnswer: C

March 2, 2021 No Comments READ MORE +

Which of the following is a preventive security measure?

Which of the following is a preventive security measure?A . Installing logging and monitoring softwareB . Shutting down the Internet connection after an attackC . Storing sensitive information in a data saveView AnswerAnswer: C

March 2, 2021 No Comments READ MORE +

What is the purpose of an Information Security policy?

What is the purpose of an Information Security policy?A . An information security policy makes the security plan concrete by providing the necessary detailsB . An information security policy provides insight into threats and the possible consequencesC . An information security policy provides direction and support to the management regarding...

March 2, 2021 No Comments READ MORE +