After a devastating office fire, all staff are moved to other branches of the company. At what moment in the incident management process is this measure effectuated?
After a devastating office fire, all staff are moved to other branches of the company. At what moment in the incident management process is this measure effectuated?A . Between incident and damageB . Between detection and classificationC . Between recovery and normal operationsD . Between classification and escalationView AnswerAnswer: A...
Which of the Confidentiality, Integrity, Availability (CIA) principles of the credit card file are violated?
A hacker gains access to a webserver and can view a file on the server containing credit card numbers. Which of the Confidentiality, Integrity, Availability (CIA) principles of the credit card file are violated?A . AvailabilityB . ConfidentialityC . IntegrityD . ComplianceView AnswerAnswer: B Explanation: Confidentiality is one of the...
What is the purpose of an Information Security policy?
What is the purpose of an Information Security policy?A . An information security policy makes the security plan concrete by providing the necessary detailsB . An information security policy provides insight into threats and the possible consequencesC . An information security policy provides direction and support to the management regarding...
In which order is an Information Security Management System set up?
In which order is an Information Security Management System set up?A . Implementation, operation, maintenance, establishmentB . Implementation, operation, improvement, maintenanceC . Establishment, implementation, operation, maintenanceD . Establishment, operation, monitoring, improvementView AnswerAnswer: C Explanation: The establishment phase of an ISMS involves defining the scope, context, objectives, and leadership commitment for...
What type of threat is this?
Someone from a large tech company calls you on behalf of your company to check the health of your PC, and therefore needs your user-id and password. What type of threat is this?A . Social engineering threatB . Organisational threatC . Technical threatD . Malware threatView AnswerAnswer: A Explanation: The...
Below is Purpose of "Integrity", which is one of the Basic Components of Information Security
Below is Purpose of "Integrity", which is one of the Basic Components of Information SecurityA . the property that information is not made available or disclosed to unauthorized individualsB . the property of safeguarding the accuracy and completeness of assets.C . the property that information is not made available or...
What is a qualitative risk analysis?
A couple of years ago you started your company which has now grown from 1 to 20 employees. Your company’s information is worth more and more and gone are the days when you could keep control yourself. You are aware that you have to take measures, but what should they...
Which security principle is violated?
A hacker gains access to a web server and reads the credit card numbers stored on that server. Which security principle is violated?A . AvailabilityB . ConfidentialityC . IntegrityD . AuthenticityView AnswerAnswer: B
The following are definitions of Information, except:
The following are definitions of Information, except:A . accurate and timely dataB . specific and organized data for a purposeC . mature and measurable dataD . can lead to understanding and decrease in uncertaintyView AnswerAnswer: C
What is an example of the indirect damage caused by this fire?
There was a fire in a branch of the company Midwest Insurance. The fire department quickly arrived at the scene and could extinguish the fire before it spread and burned down the entire premises. The server, however, was destroyed in the fire. The backup tapes kept in another room had...