Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

The following are the guidelines to protect your password, except: 

A.

Don't use the same password for various company system security access

B.

Do not share passwords with anyone

C.

For easy recall, use the same password for company and personal accounts

D.

Change a temporary password on first log-on

A hacker gains access to a web server and reads the credit card numbers stored on that server. Which security principle is violated? 

A.

Availability

B.

Confidentiality

C.

Integrity 

D.

Authenticity 

Implement plan on a test basis - this comes under which section of PDCA

A.

Plan

B.

Do

C.

Act

D.

Check

What is the goal of classification of information?

A.

To create a manual about how to handle mobile devices 

B.

Applying labels making the information easier to recognize

C.

Structuring information according to its sensitivity 

In acceptable use of Information Assets, which is the best practice?

A.

Access to information and communication systems are provided for business purpose only

B.

Interfering with or denying service to any user other than the employee's host

C.

Playing any computer games during office hours

D.

Accessing phone or network transmissions, including wireless or wifi transmissions

A scenario wherein the city or location where the building(s) reside is / are not accessible.

A.

Component

B.

Facility

C.

City

D.

Country

Which of the following is a possible event that can have a disruptive effect on the reliability of information? 

A.

Threat

B.

Risk

C.

Vulnerability

D.

Dependency

Changes on project-managed applications or database should undergo the change control process as documented.

A.

True

B.

False

Backup media is kept in the same secure area as the servers. What risk may the organisation be exposed to? 

A.

Unauthorised persons will have access to both the servers and backups 

B.

Responsibility for the backups is not defined well

C.

After a fire, the information systems cannot be restored

D.

After a server crash, it will take extra time to bring it back up again

Information or data that are classified as ______ do not require labeling.

A.

Public

B.

Internal

C.

Confidential

D.

Highly Confidential