Which of these examples is a threat to integrity?

Information has a number of reliability aspects. Reliability is constantly being threatened. Examples of threats are: a cable becomes loose, someone alters information by accident, data is used privately or is falsified. Which of these examples is a threat to integrity?A . a loose cableB . accidental alteration of dataC...

March 2, 2021 No Comments READ MORE +

Which of the following statements are correct for Clean Desk Policy?

Which of the following statements are correct for Clean Desk Policy?A . Don't leave confidential documents on your desk.B . Don't leave valuable items on your desk if you are not in your work area.C . Don't leave highly confidential items.D . Don't leave laptops without cable lock.View AnswerAnswer: A,B,C

March 2, 2021 No Comments READ MORE +

Implement plan on a test basis - this comes under which section of PDCA

Implement plan on a test basis - this comes under which section of PDCAA . PlanB . DoC . ActD . CheckView AnswerAnswer: B

March 1, 2021 No Comments READ MORE +

What is the relationship between data and information?

What is the relationship between data and information?A . Data is structured information.B . Information is the meaning and value assigned to a collection of data.View AnswerAnswer: B

March 1, 2021 No Comments READ MORE +

Availability means

Availability meansA . Service should be accessible at the required time and usable by allB . Service should be accessible at the required time and usable only by the authorized entityC . Service should not be accessible when requiredView AnswerAnswer: B

February 28, 2021 No Comments READ MORE +

Which department maintain's contacts with law enforcement authorities, regulatory bodies, information service providers and telecommunications service providers depending on the service required.

Which department maintain's contacts with law enforcement authorities, regulatory bodies, information service providers and telecommunications service providers depending on the service required.A . COOB . CISOC . CSMD . MROView AnswerAnswer: B

February 28, 2021 No Comments READ MORE +

You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called

You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is calledA . Shoulder SurfingB . MountaineeringC . PhishingD . SpoofingView AnswerAnswer: C

February 27, 2021 No Comments READ MORE +

We can leave laptops during weekdays or weekends in locked bins.

We can leave laptops during weekdays or weekends in locked bins.A . TrueB . FalseView AnswerAnswer: B

February 27, 2021 No Comments READ MORE +

What kind of threat is this?

You work in the office of a large company. You receive a call from a person claiming to be from the Helpdesk. He asks you for your password. What kind of threat is this?A . Natural threatB . Organizational threatC . Social EngineeringD . ArasonView AnswerAnswer: C

February 26, 2021 No Comments READ MORE +

Who is authorized to change the classification of a document?

Who is authorized to change the classification of a document?A . The author of the documentB . The administrator of the documentC . The owner of the documentD . The manager of the owner of the documentView AnswerAnswer: C

February 26, 2021 No Comments READ MORE +