Which two of the following statements are true?

Which two of the following statements are true?A . The benefit of certifying an ISMS is to show the accreditation certificate on the website.B . The purpose of an ISMS is to demonstrate awareness of information security issues by management.C . The benefit of certifying an ISMS is to increase...

January 28, 2025 No Comments READ MORE +

Which two of the following statements are true?

You are an ISMS audit team leader who has been assigned by your certification body to carry out a follow-up audit of a client. You are preparing your audit plan for this audit. Which two of the following statements are true?A . Verification should focus on whether any action undertaken...

January 22, 2025 No Comments READ MORE +

Which two activities align with the “Check’’ stage of the Plan-Do-Check-Act cycle when applied to the process of managing an internal audit program as described in ISO 19011?

Which two activities align with the “Check’’ stage of the Plan-Do-Check-Act cycle when applied to the process of managing an internal audit program as described in ISO 19011?A . Retains records of internal auditsB . Define audit criteria and scope for each internal auditC . Update the internal audit programmeD...

January 22, 2025 No Comments READ MORE +

To complete the sentence with the best word(s), click on the blank section you want to complete so that it is highlighted in red, and then click on the applicable text from the options below. Alternatively, you may drag and drop the option to the appropriate blank section

DRAG DROP Select the words that best complete the sentence: To complete the sentence with the best word(s), click on the blank section you want to complete so that it is highlighted in red, and then click on the applicable text from the options below. Alternatively, you may drag and...

January 21, 2025 No Comments READ MORE +

All are prohibited in acceptable use of information assets, except:

All are prohibited in acceptable use of information assets, except: A. Electronic chain letters B. E-mail copies to non-essential readers C. Company-wide e-mails with supervisor/TL permission. D. Messages with very large attachments or to a large number ofrecipients.View AnswerAnswer: C Explanation: The only option that is not prohibited in acceptable...

January 21, 2025 No Comments READ MORE +

What are the consequences of this to the reliability of the information?

There is a network printer in the hallway of the company where you work. Many employees don’t pick up their printouts immediately and leave them on the printer. What are the consequences of this to the reliability of the information?A . The integrity of the information is no longer guaranteed.B...

December 18, 2023 No Comments READ MORE +

An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.

An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.A . TrueB . FalseView AnswerAnswer: B Explanation: An employee caught temporarily storing an MP3 file in his workstation will receive an IR, because this is also a violation of the organization’s information security policy...

December 18, 2023 No Comments READ MORE +

How can this affect the confidentiality of information?

Often, people do not pick up their prints from a shared printer. How can this affect the confidentiality of information? A. Confidentiality cannot be guaranteed B. Integrity cannot be guaranteed C. Authenticity cannot be guaranteed D. Availability cannot be guaranteedView AnswerAnswer: A Explanation: Confidentiality is one of the security principles...

December 18, 2023 No Comments READ MORE +

Which of the following is a preventive security measure?

Which of the following is a preventive security measure?A . Installing logging and monitoring softwareB . Shutting down the Internet connection after an attackC . Storing sensitive information in a data saveView AnswerAnswer: C Explanation: A preventive security measure is a measure that aims to prevent or deter potential incidents...

December 17, 2023 No Comments READ MORE +

Why do we need to test a disaster recovery plan regularly, and keep it up to date?

Why do we need to test a disaster recovery plan regularly, and keep it up to date?A . Otherwise the measures taken and the incident procedures planned may not be adequateB . Otherwise it is no longer up to date with the registration of daily occurring faultsC . Otherwise remotely...

December 16, 2023 No Comments READ MORE +