An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.

An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.A . TrueB . FalseView AnswerAnswer: B

March 3, 2021 No Comments READ MORE +

What type of security measure is this?

The computer room is protected by a pass reader. Only the System Management department has a pass. What type of security measure is this?A . a corrective security measureB . a physical security measureC . a logical security measureD . a repressive security measureView AnswerAnswer: B

March 2, 2021 No Comments READ MORE +

Which measure is a preventive measure?

Which measure is a preventive measure?A . Installing a logging system that enables changes in a system to be recognizedB . Shutting down all internet traffic after a hacker has gained access to the company systemsC . Putting sensitive information in a safeView AnswerAnswer: C

March 2, 2021 No Comments READ MORE +

Which of the following is a preventive security measure?

Which of the following is a preventive security measure?A . Installing logging and monitoring softwareB . Shutting down the Internet connection after an attackC . Storing sensitive information in a data saveView AnswerAnswer: C

March 2, 2021 No Comments READ MORE +

What is the purpose of an Information Security policy?

What is the purpose of an Information Security policy?A . An information security policy makes the security plan concrete by providing the necessary detailsB . An information security policy provides insight into threats and the possible consequencesC . An information security policy provides direction and support to the management regarding...

March 2, 2021 No Comments READ MORE +

Which of these examples is a threat to integrity?

Information has a number of reliability aspects. Reliability is constantly being threatened. Examples of threats are: a cable becomes loose, someone alters information by accident, data is used privately or is falsified. Which of these examples is a threat to integrity?A . a loose cableB . accidental alteration of dataC...

March 2, 2021 No Comments READ MORE +

Which of the following statements are correct for Clean Desk Policy?

Which of the following statements are correct for Clean Desk Policy?A . Don't leave confidential documents on your desk.B . Don't leave valuable items on your desk if you are not in your work area.C . Don't leave highly confidential items.D . Don't leave laptops without cable lock.View AnswerAnswer: A,B,C

March 2, 2021 No Comments READ MORE +

Implement plan on a test basis - this comes under which section of PDCA

Implement plan on a test basis - this comes under which section of PDCAA . PlanB . DoC . ActD . CheckView AnswerAnswer: B

March 1, 2021 No Comments READ MORE +

What is the relationship between data and information?

What is the relationship between data and information?A . Data is structured information.B . Information is the meaning and value assigned to a collection of data.View AnswerAnswer: B

March 1, 2021 No Comments READ MORE +

Availability means

Availability meansA . Service should be accessible at the required time and usable by allB . Service should be accessible at the required time and usable only by the authorized entityC . Service should not be accessible when requiredView AnswerAnswer: B

February 28, 2021 No Comments READ MORE +