In acceptable use of Information Assets, which is the best practice?

In acceptable use of Information Assets, which is the best practice?A . Access to information and communication systems are provided for business purpose onlyB . Interfering with or denying service to any user other than the employee's hostC . Playing any computer games during office hoursD . Accessing phone or...

June 18, 2021 No Comments READ MORE +

Below is Purpose of "Integrity", which is one of the Basic Components of Information Security

Below is Purpose of "Integrity", which is one of the Basic Components of Information SecurityA . the property that information is not made available or disclosed to unauthorized individualsB . the property of safeguarding the accuracy and completeness of assets.C . the property that information is not made available or...

June 18, 2021 No Comments READ MORE +

Changes on project-managed applications or database should undergo the change control process as documented.

Changes on project-managed applications or database should undergo the change control process as documented.A . TrueB . FalseView AnswerAnswer: A

June 18, 2021 No Comments READ MORE +

The following are purposes of Information Security, except:

The following are purposes of Information Security, except:A . Ensure Business ContinuityB . Minimize Business RiskC . Increase Business AssetsD . Maximize Return on InvestmentView AnswerAnswer: C

June 17, 2021 No Comments READ MORE +

What is a definition of compliance?

What is a definition of compliance?A . Laws, considered collectively or the process of making or enacting lawsB . The state or fact of according with or meeting rules or standardsC . An official or authoritative instructionD . A rule or directive made and maintained by an authority.View AnswerAnswer: B

June 17, 2021 No Comments READ MORE +

Why do we need to test a disaster recovery plan regularly, and keep it up to date?

Why do we need to test a disaster recovery plan regularly, and keep it up to date?A . Otherwise the measures taken and the incident procedures planned may not be adequateB . Otherwise it is no longer up to date with the registration of daily occurring faultsC . Otherwise remotely...

June 16, 2021 No Comments READ MORE +

Which department maintain's contacts with law enforcement authorities, regulatory bodies, information service providers and telecommunications service providers depending on the service required.

Which department maintain's contacts with law enforcement authorities, regulatory bodies, information service providers and telecommunications service providers depending on the service required.A . COOB . CISOC . CSMD . MROView AnswerAnswer: B

June 16, 2021 No Comments READ MORE +

Information or data that are classified as ______ do not require labeling.

Information or data that are classified as ______ do not require labeling.A . PublicB . InternalC . ConfidentialD . Highly ConfidentialView AnswerAnswer: A

June 15, 2021 No Comments READ MORE +

Which measure is a preventive measure?

Which measure is a preventive measure?A . Installing a logging system that enables changes in a system to be recognizedB . Shutting down all internet traffic after a hacker has gained access to the company systemsC . Putting sensitive information in a safeView AnswerAnswer: C

June 15, 2021 No Comments READ MORE +

What is the name of the system that guarantees the coherence of information security in the organization?

What is the name of the system that guarantees the coherence of information security in the organization?A . Information Security Management System (ISMS)B . RootkitC . Security regulations for special information for the governmentD . Information Technology Service Management (ITSM)View AnswerAnswer: A

June 15, 2021 No Comments READ MORE +