Which reliability aspect of information is compromised when a staff member denies having sent a message?

Which reliability aspect of information is compromised when a staff member denies having sent a message?A . ConfidentialityB . IntegrityC . AvailabilityD . CorrectnessView AnswerAnswer: B

June 24, 2021 No Comments READ MORE +

What is a repressive measure in case of a fire?

What is a repressive measure in case of a fire?A . Taking out a fire insuranceB . Putting out a fire after it has been detected by a fire detectorC . Repairing damage caused by the fireView AnswerAnswer: B

June 24, 2021 No Comments READ MORE +

CEO sends a mail giving his views on the status of the company and the company’s future strategy and the CEO's vision and the employee's part in it. The mail should be classified as

CEO sends a mail giving his views on the status of the company and the company’s future strategy and the CEO's vision and the employee's part in it. The mail should be classified asA . Internal MailB . Public MailC . Confidential MailD . Restricted MailView AnswerAnswer: A

June 23, 2021 No Comments READ MORE +

Phishing is what type of Information Security Incident?

Phishing is what type of Information Security Incident?A . Private IncidentsB . Cracker/Hacker AttacksC . Technical VulnerabilitiesD . Legal IncidentsView AnswerAnswer: B

June 23, 2021 No Comments READ MORE +

Information or data that are classified as ______ do not require labeling.

Information or data that are classified as ______ do not require labeling.A . PublicB . InternalC . ConfidentialD . Highly ConfidentialView AnswerAnswer: A

June 23, 2021 No Comments READ MORE +

An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.

An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.A . TrueB . FalseView AnswerAnswer: B

June 23, 2021 No Comments READ MORE +

What is the goal of classification of information?

What is the goal of classification of information?A . To create a manual about how to handle mobile devicesB . Applying labels making the information easier to recognizeC . Structuring information according to its sensitivityView AnswerAnswer: C

June 22, 2021 No Comments READ MORE +

Who are allowed to access highly confidential files?

Who are allowed to access highly confidential files?A . Employees with a business need-to-knowB . Contractors with a business need-to-knowC . Employees with signed NDA have a business need-to-knowD . Non-employees designated with approved access and have signed NDAView AnswerAnswer: C

June 22, 2021 No Comments READ MORE +

What is social engineering?

What is social engineering?A . A group planning for a social activity in the organizationB . Creating a situation wherein a third party gains confidential information from youC . The organization planning an activity for welfare of the neighborhoodView AnswerAnswer: B

June 22, 2021 No Comments READ MORE +

Access Control System, CCTV and security guards are form of:

Access Control System, CCTV and security guards are form of:A . Environment SecurityB . Access ControlC . Physical SecurityD . ComplianceView AnswerAnswer: C

June 21, 2021 No Comments READ MORE +