Which two of the following statements are true?
Which two of the following statements are true?A . The benefit of certifying an ISMS is to show the accreditation certificate on the website.B . The purpose of an ISMS is to demonstrate awareness of information security issues by management.C . The benefit of certifying an ISMS is to increase...
Which two of the following statements are true?
You are an ISMS audit team leader who has been assigned by your certification body to carry out a follow-up audit of a client. You are preparing your audit plan for this audit. Which two of the following statements are true?A . Verification should focus on whether any action undertaken...
Which two activities align with the “Check’’ stage of the Plan-Do-Check-Act cycle when applied to the process of managing an internal audit program as described in ISO 19011?
Which two activities align with the “Check’’ stage of the Plan-Do-Check-Act cycle when applied to the process of managing an internal audit program as described in ISO 19011?A . Retains records of internal auditsB . Define audit criteria and scope for each internal auditC . Update the internal audit programmeD...
To complete the sentence with the best word(s), click on the blank section you want to complete so that it is highlighted in red, and then click on the applicable text from the options below. Alternatively, you may drag and drop the option to the appropriate blank section
DRAG DROP Select the words that best complete the sentence: To complete the sentence with the best word(s), click on the blank section you want to complete so that it is highlighted in red, and then click on the applicable text from the options below. Alternatively, you may drag and...
All are prohibited in acceptable use of information assets, except:
All are prohibited in acceptable use of information assets, except: A. Electronic chain letters B. E-mail copies to non-essential readers C. Company-wide e-mails with supervisor/TL permission. D. Messages with very large attachments or to a large number ofrecipients.View AnswerAnswer: C Explanation: The only option that is not prohibited in acceptable...
What are the consequences of this to the reliability of the information?
There is a network printer in the hallway of the company where you work. Many employees don’t pick up their printouts immediately and leave them on the printer. What are the consequences of this to the reliability of the information?A . The integrity of the information is no longer guaranteed.B...
An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.
An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.A . TrueB . FalseView AnswerAnswer: B Explanation: An employee caught temporarily storing an MP3 file in his workstation will receive an IR, because this is also a violation of the organization’s information security policy...
How can this affect the confidentiality of information?
Often, people do not pick up their prints from a shared printer. How can this affect the confidentiality of information? A. Confidentiality cannot be guaranteed B. Integrity cannot be guaranteed C. Authenticity cannot be guaranteed D. Availability cannot be guaranteedView AnswerAnswer: A Explanation: Confidentiality is one of the security principles...
Which of the following is a preventive security measure?
Which of the following is a preventive security measure?A . Installing logging and monitoring softwareB . Shutting down the Internet connection after an attackC . Storing sensitive information in a data saveView AnswerAnswer: C Explanation: A preventive security measure is a measure that aims to prevent or deter potential incidents...
Why do we need to test a disaster recovery plan regularly, and keep it up to date?
Why do we need to test a disaster recovery plan regularly, and keep it up to date?A . Otherwise the measures taken and the incident procedures planned may not be adequateB . Otherwise it is no longer up to date with the registration of daily occurring faultsC . Otherwise remotely...