What is a repressive measure in case of a fire?
A. Taking out a fire insurance
B. Putting out a fire after it has been detected by a fire detector
C. Repairing damage caused by the fire
A hacker gains access to a web server and reads the credit card numbers stored on that server. Which security principle is violated?
A. Availability
B. Confidentiality
C. Integrity
D. Authenticity
The following are the guidelines to protect your password, except: (Choose two)
A. Don't use the same password for various company system security access
B. Do not share passwords with anyone
C. For easy recall, use the same password for company and personal accounts
D. Change a temporary password on first log-on
What is the name of the system that guarantees the coherence of information security in the organization?
A. Information Security Management System (ISMS)
B. Rootkit
C. Security regulations for special information for the government
D. Information Technology Service Management (ITSM)
CMM stands for?
A. Capability Maturity Matrix
B. Capacity Maturity Matrix
C. Capability Maturity Model
D. Capable Mature Model
What is the standard definition of ISMS?
A. Is an information security systematic approach to achieve business objectives for implementation, establishing, reviewing,operating and maintaining organization's reputation.
B. A company wide business objectives to achieve information security awareness for establishing, implementing, operating, monitoring, reviewing, maintaining and improving
C. A project-based approach to achieve business objectives for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organization's information security
D. A systematic approach for establishing, implementing, operating,monitoring, reviewing, maintaining and improving an organization's information security to achieve business objectives.
What type of legislation requires a proper controlled purchase process?
A. Personal data protection act
B. Computer criminality act
C. Government information act
D. Intellectual property rights act
An administration office is going to determine the dangers to which it is exposed.
What do we call a possible event that can have a disruptive effect on the reliability of information?
A. dependency
B. threat
C. vulnerability
D. risk
What type of measure involves the stopping of possible consequences of security incidents?
A. Corrective
B. Detective
C. Repressive
D. Preventive
A fire breaks out in a branch office of a health insurance company. The personnel are transferred to neighboring branches to continue their work.
Where in the incident cycle is moving to a stand-by arrangements found?
A. between threat and incident
B. between recovery and threat
C. between damage and recovery
D. between incident and damage