Does the security have the right to ask you to display your ID badges and check your bags?
A. True
B. False
Someone from a large tech company calls you on behalf of your company to check the health of your PC, and therefore needs your user-id and password. What type of threat is this?
A. Social engineering threat
B. Organisational threat
C. Technical threat
D. Malware threat
Information Security is a matter of building and maintaining ________ .
A. Confidentiality
B. Trust
C. Protection
D. Firewalls
Changes on project-managed applications or database should undergo the change control process as documented.
A. True
B. False
Stages of Information:
A. creation, evolution, maintenance, use, disposition
B. creation, use, disposition, maintenance, evolution
C. creation, distribution, use, maintenance, disposition
D. creation, distribution, maintenance, disposition, use
What is a definition of compliance?
A. Laws, considered collectively or the process of making or enacting laws
B. The state or fact of according with or meeting rules or standards
C. An official or authoritative instruction
D. A rule or directive made and maintained by an authority.
Which is the glue that ties the triad together
A. Process
B. People
C. Collaboration
D. Technology
A scenario wherein the city or location where the building(s) reside is / are not accessible.
A. Component
B. Facility
C. City
D. Country
What type of legislation requires a proper controlled purchase process?
A. Personal data protection act
B. Computer criminality act
C. Government information act
D. Intellectual property rights act
Integrity of data means
A. Accuracy and completeness of the data
B. Data should be viewable at all times
C. Data should be accessed by only the right people