Which measure is a preventive measure?
A. Installing a logging system that enables changes in a system to be recognized
B. Shutting down all internet traffic after a hacker has gained access to the company systems
C. Putting sensitive information in a safe
Cabling Security is associated with Power, telecommunication and network cabling carrying information are protected from interception and damage.
A. True
B. False
Which of the following statements are correct for Clean Desk Policy? (Choose three)
A. Don't leave confidential documents on your desk.
B. Don't leave valuable items on your desk if you are not in your work area.
C. Don't leave highly confidential items.
D. Don't leave laptops without cable lock.
All are prohibited in acceptable use of information assets, except:
A. Electronic chain letters
B. E-mail copies to non-essential readers
C. Company-wide e-mails with supervisor/TL permission.
D. Messages with very large attachments or to a large number ofrecipients.
In order to take out a fire insurance policy, an administration office must determine the value of the data that it manages.
Which factor is [b]not[/b] important for determining the value of data for an organization?
A. The content of data.
B. The degree to which missing, incomplete or incorrect data can be recovered.
C. The indispensability of data for the business processes.
D. The importance of the business processes that make use of the data.
A well-executed risk analysis provides a great deal of useful information. A risk analysis has four main objectives. What is not one of the four main objectives of a risk analysis?
A. Identifying assets and their value
B. Implementing counter measures
C. Establishing a balance between the costs of an incident and the costs of a security measure
D. Determining relevant vulnerabilities and threats
What is the purpose of an Information Security policy?
A. An information security policy makes the security plan concrete by providing the necessary details
B. An information security policy provides insight into threats and the possible consequences
C. An information security policy provides direction and support to the management regarding information security
D. An information security policy documents the analysis of risks and the search for countermeasures
What controls can you do to protect sensitive data in your computer when you go out for lunch?
A. You activate your favorite screen-saver
B. You are confident to leave your computer screen as is since a password protected screensaver is installed and it is set to activate after 10 minutes of inactivity
C. You lock your computer by pressing Windows+L or CTRL-ALT-DELETE and then click "Lock Computer".
D. You turn off the monitor
CMM stands for?
A. Capability Maturity Matrix
B. Capacity Maturity Matrix
C. Capability Maturity Model
D. Capable Mature Model
Which of the following is a possible event that can have a disruptive effect on the reliability of information?
A. Threat
B. Risk
C. Vulnerability
D. Dependency