Where in the incident cycle is moving to a stand-by arrangements found?

A fire breaks out in a branch office of a health insurance company. The personnel are transferred to neighboring branches to continue their work. Where in the incident cycle is moving to a stand-by arrangements found?A . between threat and incidentB . between recovery and threatC . between damage and...

June 30, 2021 No Comments READ MORE +

Information Security is a matter of building and maintaining ________ .

Information Security is a matter of building and maintaining ________ .A . ConfidentialityB . TrustC . ProtectionD . FirewallsView AnswerAnswer: B

June 29, 2021 No Comments READ MORE +

Four types of Data Classification (Choose two)

Four types of Data Classification (Choose two)A . Restricted Data, Confidential DataB . Project Data, Highly Confidential DataC . Financial Data, Highly Confidential DataD . Unrestricted Data, Highly Confidential DataView AnswerAnswer: A,D

June 29, 2021 No Comments READ MORE +

What is the purpose of an Information Security policy?

What is the purpose of an Information Security policy?A . An information security policy makes the security plan concrete by providing the necessary detailsB . An information security policy provides insight into threats and the possible consequencesC . An information security policy provides direction and support to the management regarding...

June 29, 2021 No Comments READ MORE +

What does this signify?

You see a blue color sticker on certain physical assets . What does this signify?A . The asset is very high critical and its failure affects the entire organizationB . The asset with blue stickers should be kept air conditioned at all timesC . The asset is high critical and...

June 27, 2021 No Comments READ MORE +

How can this affect the confidentiality of information?

Often, people do not pick up their prints from a shared printer . How can this affect the confidentiality of information?A . Confidentiality cannot be guaranteedB . Integrity cannot be guaranteedC . Authenticity cannot be guaranteedD . Availability cannot be guaranteedView AnswerAnswer: A

June 26, 2021 No Comments READ MORE +

Which reliability aspect of information is in danger here?

A member of staff denies sending a particular message. Which reliability aspect of information is in danger here?A . availabilityB . correctnessC . integrityD . confidentialityView AnswerAnswer: C

June 26, 2021 No Comments READ MORE +

An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.

An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.A . TrueB . FalseView AnswerAnswer: A

June 26, 2021 No Comments READ MORE +

Which of the following is a preventive security measure?

Which of the following is a preventive security measure?A . Installing logging and monitoring softwareB . Shutting down the Internet connection after an attackC . Storing sensitive information in a data saveView AnswerAnswer: C

June 24, 2021 No Comments READ MORE +

Which threat could occur if no physical measures are taken?

Which threat could occur if no physical measures are taken?A . Unauthorised persons viewing sensitive filesB . Confidential prints being left on the printerC . A server shutting down because of overheatingD . Hackers entering the corporate networkView AnswerAnswer: C

June 24, 2021 No Comments READ MORE +