__________ is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.

__________ is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.A . TrojanB . Operating SystemC . VirusD . MalwareView AnswerAnswer: D

February 26, 2021 No Comments READ MORE +

What is not one of the four main objectives of a risk analysis?

A well-executed risk analysis provides a great deal of useful information. A risk analysis has four main objectives. What is not one of the four main objectives of a risk analysis?A . Identifying assets and their valueB . Implementing counter measuresC . Establishing a balance between the costs of an...

February 26, 2021 No Comments READ MORE +

What is a repressive measure in case of a fire?

What is a repressive measure in case of a fire?A . Taking out a fire insuranceB . Putting out a fire after it has been detected by a fire detectorC . Repairing damage caused by the fireView AnswerAnswer: B

February 26, 2021 No Comments READ MORE +

The following are the guidelines to protect your password, except:

The following are the guidelines to protect your password, except:A . Don't use the same password for various company system security accessB . Do not share passwords with anyoneC . For easy recall, use the same password for company and personal accountsD . Change a temporary password on first log-onView...

February 25, 2021 No Comments READ MORE +

All are prohibited in acceptable use of information assets, except:

All are prohibited in acceptable use of information assets, except:A . Electronic chain lettersB . E-mail copies to non-essential readersC . Company-wide e-mails with supervisor/TL permission.D . Messages with very large attachments or to a large number ofrecipients.View AnswerAnswer: C

February 25, 2021 No Comments READ MORE +

Information or data that are classified as ______ do not require labeling.

Information or data that are classified as ______ do not require labeling.A . PublicB . InternalC . ConfidentialD . Highly ConfidentialView AnswerAnswer: A

February 25, 2021 No Comments READ MORE +

Which is not a requirement of HR prior to hiring?

Which is not a requirement of HR prior to hiring?A . Undergo background verificationB . Applicant must complete pre-employment documentation requirementsC . Must undergo Awareness training on information security.D . Must successfully pass Background InvestigationView AnswerAnswer: C

February 25, 2021 No Comments READ MORE +

Information Security is a matter of building and maintaining ________ .

Information Security is a matter of building and maintaining ________ .A . ConfidentialityB . TrustC . ProtectionD . FirewallsView AnswerAnswer: B

February 24, 2021 No Comments READ MORE +

Does the security have the right to ask you to display your ID badges and check your bags?

Does the security have the right to ask you to display your ID badges and check your bags?A . TrueB . FalseView AnswerAnswer: A

February 23, 2021 No Comments READ MORE +

Which of the following is not a type of Information Security attack?

Which of the following is not a type of Information Security attack?A . Legal IncidentsB . Vehicular IncidentsC . Technical VulnerabilitiesD . Privacy IncidentsView AnswerAnswer: B

February 23, 2021 No Comments READ MORE +