After a devastating office fire, all staff are moved to other branches of the company. At what moment in the incident management process is this measure effectuated?

After a devastating office fire, all staff are moved to other branches of the company. At what moment in the incident management process is this measure effectuated?A . Between incident and damageB . Between detection and classificationC . Between recovery and normal operationsD . Between classification and escalationView AnswerAnswer: A...

December 6, 2023 No Comments READ MORE +

Which of the Confidentiality, Integrity, Availability (CIA) principles of the credit card file are violated?

A hacker gains access to a webserver and can view a file on the server containing credit card numbers. Which of the Confidentiality, Integrity, Availability (CIA) principles of the credit card file are violated?A . AvailabilityB . ConfidentialityC . IntegrityD . ComplianceView AnswerAnswer: B Explanation: Confidentiality is one of the...

December 6, 2023 No Comments READ MORE +

What is the purpose of an Information Security policy?

What is the purpose of an Information Security policy?A . An information security policy makes the security plan concrete by providing the necessary detailsB . An information security policy provides insight into threats and the possible consequencesC . An information security policy provides direction and support to the management regarding...

December 6, 2023 No Comments READ MORE +

In which order is an Information Security Management System set up?

In which order is an Information Security Management System set up?A . Implementation, operation, maintenance, establishmentB . Implementation, operation, improvement, maintenanceC . Establishment, implementation, operation, maintenanceD . Establishment, operation, monitoring, improvementView AnswerAnswer: C Explanation: The establishment phase of an ISMS involves defining the scope, context, objectives, and leadership commitment for...

December 5, 2023 No Comments READ MORE +

What type of threat is this?

Someone from a large tech company calls you on behalf of your company to check the health of your PC, and therefore needs your user-id and password. What type of threat is this?A . Social engineering threatB . Organisational threatC . Technical threatD . Malware threatView AnswerAnswer: A Explanation: The...

December 5, 2023 No Comments READ MORE +

Below is Purpose of "Integrity", which is one of the Basic Components of Information Security

Below is Purpose of "Integrity", which is one of the Basic Components of Information SecurityA . the property that information is not made available or disclosed to unauthorized individualsB . the property of safeguarding the accuracy and completeness of assets.C . the property that information is not made available or...

March 8, 2021 No Comments READ MORE +

What is a qualitative risk analysis?

A couple of years ago you started your company which has now grown from 1 to 20 employees. Your company’s information is worth more and more and gone are the days when you could keep control yourself. You are aware that you have to take measures, but what should they...

March 8, 2021 No Comments READ MORE +

Which security principle is violated?

A hacker gains access to a web server and reads the credit card numbers stored on that server. Which security principle is violated?A . AvailabilityB . ConfidentialityC . IntegrityD . AuthenticityView AnswerAnswer: B

March 7, 2021 No Comments READ MORE +

The following are definitions of Information, except:

The following are definitions of Information, except:A . accurate and timely dataB . specific and organized data for a purposeC . mature and measurable dataD . can lead to understanding and decrease in uncertaintyView AnswerAnswer: C

March 7, 2021 No Comments READ MORE +

What is an example of the indirect damage caused by this fire?

There was a fire in a branch of the company Midwest Insurance. The fire department quickly arrived at the scene and could extinguish the fire before it spread and burned down the entire premises. The server, however, was destroyed in the fire. The backup tapes kept in another room had...

March 7, 2021 No Comments READ MORE +