Which department maintain's contacts with law enforcement authorities, regulatory bodies, information service providers and telecommunications service providers depending on the service required.

Which department maintain's contacts with law enforcement authorities, regulatory bodies, information service providers and telecommunications service providers depending on the service required.A . COOB . CISOC . CSMD . MROView AnswerAnswer: B

February 28, 2021 No Comments READ MORE +

You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called

You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is calledA . Shoulder SurfingB . MountaineeringC . PhishingD . SpoofingView AnswerAnswer: C

February 27, 2021 No Comments READ MORE +

We can leave laptops during weekdays or weekends in locked bins.

We can leave laptops during weekdays or weekends in locked bins.A . TrueB . FalseView AnswerAnswer: B

February 27, 2021 No Comments READ MORE +

What kind of threat is this?

You work in the office of a large company. You receive a call from a person claiming to be from the Helpdesk. He asks you for your password. What kind of threat is this?A . Natural threatB . Organizational threatC . Social EngineeringD . ArasonView AnswerAnswer: C

February 26, 2021 No Comments READ MORE +

Who is authorized to change the classification of a document?

Who is authorized to change the classification of a document?A . The author of the documentB . The administrator of the documentC . The owner of the documentD . The manager of the owner of the documentView AnswerAnswer: C

February 26, 2021 No Comments READ MORE +

__________ is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.

__________ is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.A . TrojanB . Operating SystemC . VirusD . MalwareView AnswerAnswer: D

February 26, 2021 No Comments READ MORE +

What is not one of the four main objectives of a risk analysis?

A well-executed risk analysis provides a great deal of useful information. A risk analysis has four main objectives. What is not one of the four main objectives of a risk analysis?A . Identifying assets and their valueB . Implementing counter measuresC . Establishing a balance between the costs of an...

February 26, 2021 No Comments READ MORE +

What is a repressive measure in case of a fire?

What is a repressive measure in case of a fire?A . Taking out a fire insuranceB . Putting out a fire after it has been detected by a fire detectorC . Repairing damage caused by the fireView AnswerAnswer: B

February 26, 2021 No Comments READ MORE +

The following are the guidelines to protect your password, except:

The following are the guidelines to protect your password, except:A . Don't use the same password for various company system security accessB . Do not share passwords with anyoneC . For easy recall, use the same password for company and personal accountsD . Change a temporary password on first log-onView...

February 25, 2021 No Comments READ MORE +

All are prohibited in acceptable use of information assets, except:

All are prohibited in acceptable use of information assets, except:A . Electronic chain lettersB . E-mail copies to non-essential readersC . Company-wide e-mails with supervisor/TL permission.D . Messages with very large attachments or to a large number ofrecipients.View AnswerAnswer: C

February 25, 2021 No Comments READ MORE +