Which of the following activities are performed by the 'Do' cycle component of PDCA (plan-docheck- act)?
Each correct answer represents a complete solution. Choose all that apply.
You work as an Information Security Manager for uCertify Inc. You are working on an asset management plan. Which of the following controls of the ISO 27000 standard deals with asset management?
Which of the following is not one of the objectives of risk analysis?
What does CRAMM stand for?
You are the project manager for a construction project. The project involves casting of a column in a very narrow space. Because of the lack of space, casting is highly dangerous. High technical skill will be required for casting that column. You decide to hire a local expert team for casting that column. Which of the following types of risk response are you following?
Which of the following can be protected by the RAID implementation?
Which of the following statements is related to residual risks?
Which of the following is an anomaly where a program, while writing data to a buffer, overruns the buffer's boundary and overwrites adjacent memory?
Which of the following is used to align and realign IT Services to changing business needs by identifying and implementing improvements to IT services?
John works as a Security Administrator for uCertify Inc. As per his past experience, he wants to make a policy stating that any hardware devices containing information about the organization should be destroyed properly before they are thrown. After applying this policy, John will be able to ensure that the information on the devices will not fall into the hands of unauthorized persons after properly discarding the devices.
Which of the following types of policies is John going to create?