Cabling Security is associated with Power, telecommunication and network cabling carrying information are protected from interception and damage.
Cabling Security is associated with Power, telecommunication and network cabling carrying information are protected from interception and damage.A . TrueB . FalseView AnswerAnswer: A
Which factor is [b]not[/b] important for determining the value of data for an organization?
In order to take out a fire insurance policy, an administration office must determine the value of the data that it manages. Which factor is [b]not[/b] important for determining the value of data for an organization?A . The content of data.B . The degree to which missing, incomplete or incorrect...
What is we do in ACT - From PDCA cycle
What is we do in ACT - From PDCA cycleA . Take actions to continually monitor process performanceB . Take actions to continually improve process performanceC . Take actions to continually monitor process performanceD . Take actions to continually improve people performanceView AnswerAnswer: B
What is the security management term for establishing whether someone's identity is correct?
What is the security management term for establishing whether someone's identity is correct?A . IdentificationB . AuthenticationC . AuthorisationD . VerificationView AnswerAnswer: B
What does this signify?
You see a blue color sticker on certain physical assets. What does this signify?A . The asset is very high critical and its failure affects the entire organizationB . The asset with blue stickers should be kept air conditioned at all timesC . The asset is high critical and its...
Which of the following is a technical security measure?
Which of the following is a technical security measure?A . EncryptionB . Security policyC . Safe storage of backupsD . User role profiles.View AnswerAnswer: A
Which threat could occur if no physical measures are taken?
Which threat could occur if no physical measures are taken?A . Unauthorised persons viewing sensitive filesB . Confidential prints being left on the printerC . A server shutting down because of overheatingD . Hackers entering the corporate networkView AnswerAnswer: C
After a devastating office fire, all staff are moved to other branches of the company. At what moment in the incident management process is this measure effectuated?
After a devastating office fire, all staff are moved to other branches of the company. At what moment in the incident management process is this measure effectuated?A . Between incident and damageB . Between detection and classificationC . Between recovery and normal operationsD . Between classification and escalationView AnswerAnswer: A
What type of threat is this?
Someone from a large tech company calls you on behalf of your company to check the health of your PC, and therefore needs your user-id and password. What type of threat is this?A . Social engineering threatB . Organisational threatC . Technical threatD . Malware threatView AnswerAnswer: A
Which of the Confidentiality, Integrity, Availability (CIA) principles of the credit card file are violated?
A hacker gains access to a webserver and can view a file on the server containing credit card numbers. Which of the Confidentiality, Integrity, Availability (CIA) principles of the credit card file are violated?A . AvailabilityB . ConfidentialityC . IntegrityD . ComplianceView AnswerAnswer: B