Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

What is the difference between a restricted and confidential document?

A.

Restricted - to be shared among an authorized group

Confidential - to be shared among named individuals

B.

Restricted - to be shared among named individuals

Confidential - to be shared among an authorized group

C.

Restricted - to be shared among named individuals

Confidential - to be shared across the organization only

D.

Restricted - to be shared among named individuals

Confidential - to be shared with friends and family

A decent visitor is roaming around without visitor's ID. As an employee you should do the following, except:

A.

Say "hi" and offer coffee

B.

Call the receptionist and inform about the visitor

C.

Greet and ask him what is his business

D.

Escort him to his destination

You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called

A.

Shoulder Surfing

B.

Mountaineering

C.

Phishing

D.

Spoofing

Information has a number of reliability aspects. Reliability is constantly being threatened. Examples of threats are: a cable becomes loose, someone alters information by accident, data is used privately or is falsified.

Which of these examples is a threat to integrity?

A.

a loose cable

B.

accidental alteration of data

C.

private use of data

D.

System restart

Stages of Information

A.

creation, evolution, maintenance, use, disposition

B.

creation, use, disposition, maintenance, evolution

C.

creation, distribution, use, maintenance, disposition

D.

creation, distribution, maintenance, disposition, use

What is the purpose of an Information Security policy?

A.

An information security policy makes the security plan concrete by providing the necessary details

B.

An information security policy provides insight into threats and the possible consequences

C.

An information security policy provides direction and support to the management regarding information security

D.

An information security policy documents the analysis of risks and the search for countermeasures

Which of the following does an Asset Register contain? (Choose two)

A.

Asset Type

B.

Asset Owner

C.

Asset Modifier

D.

Process ID

An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.

A.

True

B.

False

Which of the following factors does NOT contribute to the value of data for an organisation?

A.

The correctness of data

B.

The indispensability of data

C.

The importance of data for processes

D.

The content of data

In acceptable use of Information Assets, which is the best practice?

A.

Access to information and communication systems are provided for business purpose only

B.

Interfering with or denying service to any user other than the employee's host

C.

Playing any computer games during office hours

D.

Accessing phone or network transmissions, including wireless or wifi transmissions