What is the standard definition of ISMS?
What type of legislation requires a proper controlled purchase process?
After a fire has occurred, what repressive measure can be taken?
How is the purpose of information security policy best described?
You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called
Which of the following does an Asset Register contain? (Choose two)
You receive the following mail from the IT support team: Dear User,Starting next week, we will be deleting all inactive email accounts in order to create spaceshare the below details in order to continue using your account. In case of no response,
Name:
Email ID:
Password:
DOB:
Kindly contact the webmail team for any further support. Thanks for your attention.
Which of the following is the best response?
Which threat could occur if no physical measures are taken?
What type of measure involves the stopping of possible consequences of security incidents?
Changes to the information processing facilities shall be done in controlled manner.