What is the greatest risk for an organization if no information security policy has been defined?

What is the greatest risk for an organization if no information security policy has been defined?
A . If everyone works with the same account, it is impossible to find out who worked on what.
B . Information security activities are carried out by only a few people.
C . Too many measures areimplemented.
D . It is not possible for an organization to implement information security in a consistent manner.

Answer: D

What is accomplished if all other reports from this insurance office are also assigned the appropriate grading?

Midwest Insurance grades the monthly report of all claimed losses per insured as confidential.

What is accomplished if all other reports from this insurance office are also assigned the appropriate grading?
A . The costs for automating are easier to charge to the responsible departments.
B . A determination can be made as to which report should be printed first and which ones can wait a little longer.
C . Everyone can easily see how sensitive the reports’ contents are by consulting the grading label.
D . Reports can be developed more easily and with fewer errors.

Answer: C

Which of these is not a technical measure?

The company Midwest Insurance has taken many measures to protect its information. It uses an Information Security Management System, the input and output of data in applications is validated, confidential documents are sent in encrypted form and staff use tokens to access information systems.

Which of these is not a technical measure?
A . Information Security Management System
B . The use of tokens to gain access to information systems
C . Validation of input and output data in applications
D . Encryption of information

Answer: A

What is the ISO / IEC 27002 standard?

What is the ISO / IEC 27002 standard?
A . It is a guide of good practices that describes the control objectives and recommended controls regarding information security.
B . It is a guide that focuses on the critical aspects necessary for the successful design and implementation of an ISMS in accordance with ISO / IEC 27001
C . It is a guide for the development and use of applicable metrics and measurement techniques to determine the effectiveness of an ISMS and the controls or groups of controls implemented according to ISO / IEC 27001.

Answer: A