What type of legislation requires a proper controlled purchase process?
A . Personal data protection act
B . Computer criminality act
C . Government information act
D . Intellectual property rights act
Answer: D
What type of legislation requires a proper controlled purchase process?
A . Personal data protection act
B . Computer criminality act
C . Government information act
D . Intellectual property rights act
Answer: D
You receive the following mail from the IT support team: Dear User, Starting next week, we will be deleting all inactive email accounts in order to create spaceshare the below details in order to continue using your account.
In case of no response,
Name:
Email ID:
Password:
DOB:
Kindly contact the webmail team for any further support. Thanks for your attention.
Which of the following is the best response?
A . Ignore the email
B . Respond it by saying that one should not share the password with anyone
C . One should not respond to these mails and report such email to your supervisor
Answer: C
What is an example of a human threat?
A . a lightning strike
B . fire
C . phishing
D . thunderstrom
Answer: C
What type of compliancy standard, regulation or legislation provides a code of practice for information security?
A . ISO/IEC 27002
B . Personal data protection act
C . Computer criminality act
D . IT Service Management
Answer: A
What type of measure involves the stopping of possible consequences of security incidents?
A . Corrective
B . Detective
C . Repressive
D . Preventive
Answer: C
Which is not a requirement of HR prior to hiring?
A . Undergo background verification
B . Applicant must complete pre-employment documentation requirements
C . Must undergo Awareness training on information security.
D . Must successfully pass Background Investigation
Answer: C
Why do we need to test a disaster recovery plan regularly, and keep it up to date?
A . Otherwise the measures taken and the incident procedures planned may not be adequate
B . Otherwise it is no longer up to date with the registration of daily occurring faults
C . Otherwise remotely stored backups may no longer be available to the security team
Answer: A
A member of staff denies sending a particular message.
Which reliability aspect of information is in danger here?
A . availability
B . correctness
C . integrity
D . confidentiality
Answer: C
CMM stands for?
A . Capability Maturity Matrix
B . Capacity Maturity Matrix
C . Capability Maturity Model
D . Capable Mature Model
Answer: C
You have a hard copy of a customer design document that you want to dispose off.
What would you do
A . Throw it in any dustbin
B . Shred it using a shredder
C . Give it to the office boy to reuse it for other purposes
D . Be environment friendly and reuse it for writing
Answer: B