An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.
An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.A . TrueB . FalseView AnswerAnswer: B
What type of security measure is this?
The computer room is protected by a pass reader. Only the System Management department has a pass. What type of security measure is this?A . a corrective security measureB . a physical security measureC . a logical security measureD . a repressive security measureView AnswerAnswer: B
Which measure is a preventive measure?
Which measure is a preventive measure?A . Installing a logging system that enables changes in a system to be recognizedB . Shutting down all internet traffic after a hacker has gained access to the company systemsC . Putting sensitive information in a safeView AnswerAnswer: C
Which of the following is a preventive security measure?
Which of the following is a preventive security measure?A . Installing logging and monitoring softwareB . Shutting down the Internet connection after an attackC . Storing sensitive information in a data saveView AnswerAnswer: C
What is the purpose of an Information Security policy?
What is the purpose of an Information Security policy?A . An information security policy makes the security plan concrete by providing the necessary detailsB . An information security policy provides insight into threats and the possible consequencesC . An information security policy provides direction and support to the management regarding...
Which of these examples is a threat to integrity?
Information has a number of reliability aspects. Reliability is constantly being threatened. Examples of threats are: a cable becomes loose, someone alters information by accident, data is used privately or is falsified. Which of these examples is a threat to integrity?A . a loose cableB . accidental alteration of dataC...
Which of the following statements are correct for Clean Desk Policy?
Which of the following statements are correct for Clean Desk Policy?A . Don't leave confidential documents on your desk.B . Don't leave valuable items on your desk if you are not in your work area.C . Don't leave highly confidential items.D . Don't leave laptops without cable lock.View AnswerAnswer: A,B,C
Implement plan on a test basis - this comes under which section of PDCA
Implement plan on a test basis - this comes under which section of PDCAA . PlanB . DoC . ActD . CheckView AnswerAnswer: B
What is the relationship between data and information?
What is the relationship between data and information?A . Data is structured information.B . Information is the meaning and value assigned to a collection of data.View AnswerAnswer: B
Availability means
Availability meansA . Service should be accessible at the required time and usable by allB . Service should be accessible at the required time and usable only by the authorized entityC . Service should not be accessible when requiredView AnswerAnswer: B