Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

In which order is an Information Security Management System set up? 

A.

Implementation, operation, maintenance, establishment

B.

Implementation, operation, improvement, maintenance 

C.

Establishment, implementation, operation, maintenance

D.

Establishment, operation, monitoring, improvement 

What is a repressive measure in case of a fire? 

A.

Taking out a fire insurance

B.

Putting out a fire after it has been detected by a fire detector

C.

Repairing damage caused by the fire 

The computer room is protected by a pass reader. Only the System Management department has a pass. 

What type of security measure is this?

A.

a corrective security measure

B.

a physical security measure

C.

a logical security measure 

D.

a repressive security measure

Four types of Data Classification (Choose two)

A.

Restricted Data, Confidential Data

B.

Project Data, Highly Confidential Data

C.

Financial Data, Highly Confidential Data

D.

Unrestricted Data, Highly Confidential Data

A fire breaks out in a branch office of a health insurance company. The personnel are transferred to neighboring branches to continue their work. 

Where in the incident cycle is moving to a stand-by arrangements found? 

A.

between threat and incident

B.

between recovery and threat 

C.

between damage and recovery

D.

between incident and damage

An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.

A.

True

B.

False

A well-executed risk analysis provides a great deal of useful information. A risk analysis has four main objectives. 

What is not one of the four main objectives of a risk analysis?

A.

Identifying assets and their value

B.

Implementing counter measures

C.

Establishing a balance between the costs of an incident and the costs of a security measure

D.

Determining relevant vulnerabilities and threats  

CMM stands for?

A.

Capability Maturity Matrix

B.

Capacity Maturity Matrix

C.

Capability Maturity Model

D.

Capable Mature Model

As a new member of the IT department you have noticed that confidential information has been leaked several times. This may damage the reputation of the company. You have been asked to propose an organisational measure to protect laptop computers. What is the first step in a structured approach to come up with this measure? 

A.

Appoint security staff

B.

Encrypt all sensitive information 

C.

Formulate a policy 

D.

Set up an access control procedure 

You see a blue color sticker on certain physical assets. What does this signify?

A.

The asset is very high critical and its failure affects the entire organization

B.

The asset with blue stickers should be kept air conditioned at all times

C.

The asset is high critical and its failure will affect a group/s/project's work in the organization

D.

The asset is critical and the impact is restricted to an employee only