An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.

An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR. A. True B. FalseView AnswerAnswer: A Explanation: According to ISO/IEC 27001:2022, clause A.8.1.5, the organization should establish and...

December 10, 2023 No Comments READ MORE +

Which factor is [b]not[/b] important for determining the value of data for an organization?

In order to take out a fire insurance policy, an administration office must determine the value of the data that it manages. Which factor is [b]not[/b] important for determining the value of data for an organization? A. The content of data. B. The degree to which missing, incomplete or incorrect...

December 10, 2023 No Comments READ MORE +

What is the relationship between data and information?

What is the relationship between data and information?A . Data is structured information.B . Information is the meaning and value assigned to a collection of data.View AnswerAnswer: B Explanation: The relationship between data and information is that information is the meaning and value assigned to a collection of data. Data...

December 10, 2023 No Comments READ MORE +

After a fire has occurred, what repressive measure can be taken?

After a fire has occurred, what repressive measure can be taken?A . Extinguishing the fire after the fire alarm soundsB . Buying in a proper fire insurance policyC . Repairing all systems after the fireView AnswerAnswer: A Explanation: A repressive security measure is a measure that aims to stop or...

December 10, 2023 No Comments READ MORE +

What should you do?

There is a scheduled fire drill in your facility. What should you do?A . Participate in the drillB . Excuse yourself by saying you have an urgent deliverableC . Call in sickD . None of the aboveView AnswerAnswer: A Explanation: You should participate in the drill, because this is part...

December 10, 2023 No Comments READ MORE +

Four types of Data Classification (Choose two)

Four types of Data Classification (Choose two) A. Restricted Data, Confidential Data B. Project Data, Highly Confidential Data C. Financial Data, Highly Confidential Data D. Unrestricted Data, Highly Confidential DataView AnswerAnswer: A,D Explanation: Two types of data classification are restricted data and unrestricted data. Restricted data is data that has...

December 10, 2023 No Comments READ MORE +

What risk may the organisation be exposed to?

Backup media is kept in the same secure area as the servers. What risk may the organisation be exposed to?A . Unauthorised persons will have access to both the servers and backupsB . Responsibility for the backups is not defined wellC . After a fire, the information systems cannot be...

December 10, 2023 No Comments READ MORE +

What would be the reference for you to know who should have access to data/document?

What would be the reference for you to know who should have access to data/document?A . Data Classification LabelB . Access Control List (ACL)C . Masterlist of Project Records (MLPR)D . Information Rights Management (IRM)View AnswerAnswer: B Explanation: The reference for you to know who should have access to data/document...

December 9, 2023 No Comments READ MORE +

What type of legislation requires a proper controlled purchase process?

What type of legislation requires a proper controlled purchase process? A. Personal data protection act B. Computer criminality act C. Government information act D. Intellectual property rights actView AnswerAnswer: D Explanation: An intellectual property rights act is a type of legislation that requires a proper controlled purchase process. Intellectual property...

December 9, 2023 No Comments READ MORE +

What is the worst possible action that an employee may receive for sharing his or her password or access with others?

What is the worst possible action that an employee may receive for sharing his or her password or access with others?A . Forced roll off from the projectB . The lowest rating on his or her performance assessmentC . Three days suspension from workD . TerminationView AnswerAnswer: D Explanation: The...

December 9, 2023 No Comments READ MORE +