Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

What is the standard definition of ISMS? 

A.

Is an information security systematic approach to achieve business objectives for implementation, establishing, reviewing,operating and maintaining organization's reputation.

B.

A company wide business objectives to achieve information security awareness for establishing, implementing, operating, monitoring, reviewing, maintaining and improving

C.

A project-based approach to achieve business objectives for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organization’s information security

D.

A systematic approach for establishing, implementing, operating,monitoring, reviewing,  maintaining and improving an organization’s information security to achieve business objectives.

What type of legislation requires a proper controlled purchase process?

A.

Personal data protection act 

B.

Computer criminality act 

C.

Government information act 

D.

Intellectual property rights act

After a fire has occurred, what repressive measure can be taken? 

A.

Extinguishing the fire after the fire alarm sounds 

B.

Buying in a proper fire insurance policy 

C.

Repairing all systems after the fire 

How is the purpose of information security policy best described?

A.

An information security policy documents the analysis of risks and the search for countermeasures.

B.

An information security policy provides direction and support to the management regarding information security. 

C.

An information security policy makes the security plan concrete by providing it with the necessary details.

D.

An information security policy provides insight into threats and the possible consequences. 

You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called

A.

Shoulder Surfing

B.

Mountaineering

C.

Phishing

D.

Spoofing

Which of the following does an Asset Register contain? (Choose two)

A.

Asset Type

B.

Asset Owner

C.

Asset Modifier

D.

Process ID

You receive the following mail from the IT support team: Dear User,Starting next week, we will be deleting all inactive email accounts in order to create spaceshare the below details in order to continue using your account. In case of no response, 

Name:

Email ID:

Password:

DOB:

Kindly contact the webmail team for any further support. Thanks for your attention.

Which of the following is the best response?

A.

Ignore the email

B.

Respond it by saying that one should not share the password with anyone

C.

One should not respond to these mails and report such email to your supervisor 

Which threat could occur if no physical measures are taken?

A.

Unauthorised persons viewing sensitive files

B.

Confidential prints being left on the printer 

C.

A server shutting down because of overheating 

D.

Hackers entering the corporate network 

What type of measure involves the stopping of possible consequences of security incidents?

A.

Corrective

B.

Detective

C.

Repressive 

D.

Preventive

Changes to the information processing facilities shall be done in controlled manner.

A.

True

B.

False