Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following is a technical security measure?

A.

Encryption

B.

Security policy

C.

Safe storage of backups

D.

User role profiles.

A couple of years ago you started your company which has now grown from 1 to 20 employees. Your company’s information is worth more and more and gone are the days when you could keep control yourself. You are aware that you have to take measures, but what should they be? You hire a consultant who advises you to start with a qualitative risk analysis.

What is a qualitative risk analysis?

A.

This analysis follows a precise statistical probability calculation in order to calculate exact loss caused by damage.

B.

This analysis is based on scenarios and situations and produces a subjective view of the possible threats.

The following are definitions of Information, except:

A.

accurate and timely data

B.

specific and organized data for a purpose

C.

mature and measurable data

D.

can lead to understanding and decrease in uncertainty

An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.

A.

True

B.

False

Someone from a large tech company calls you on behalf of your company to check the health of your PC, and therefore needs your user-id and password. What type of threat is this?

A.

Social engineering threat

B.

Organisational threat

C.

Technical threat

D.

Malware threat

What type of legislation requires a proper controlled purchase process?

A.

Personal data protection act

B.

Computer criminality act

C.

Government information act

D.

Intellectual property rights act

Which of the following is an information security management system standard published by the International Organization for Standardization?

A.

ISO9008

B.

ISO27001

C.

ISO5501

D.

ISO22301

What is the relationship between data and information?

A.

Data is structured information.

B.

Information is the meaning and value assigned to a collection of data.

What is a definition of compliance?

A.

Laws, considered collectively or the process of making or enacting laws

B.

The state or fact of according with or meeting rules or standards

C.

An official or authoritative instruction

D.

A rule or directive made and maintained by an authority.

A property of Information that has the ability to prove occurrence of a claimed event.

A.

Electronic chain letters

B.

Integrity

C.

Availability

D.

Accessibility