3 Months Free Update
3 Months Free Update
3 Months Free Update
Which of the following is a possible event that can have a disruptive effect on the reliability of information?
What type of compliancy standard, regulation or legislation provides a code of practice for information security?
You see a blue color sticker on certain physical assets. What does this signify?
There was a fire in a branch of the company Midwest Insurance. The fire department quickly arrived at the scene and could extinguish the fire before it spread and burned down the entire premises. The server, however, was destroyed in the fire. The backup tapes kept in another room had melted and many other documents were lost for good.
What is an example of the indirect damage caused by this fire?
A member of staff denies sending a particular message.
Which reliability aspect of information is in danger here?
There is a network printer in the hallway of the company where you work. Many employees don’t pick up their printouts immediately and leave them on the printer.
What are the consequences of this to the reliability of the information?
Which of the following is an information security management system standard published by the International Organization for Standardization?
Which department maintain's contacts with law enforcement authorities, regulatory bodies, information service providers and telecommunications service providers depending on the service required.
What controls can you do to protect sensitive data in your computer when you go out for lunch?
Changes to the information processing facilities shall be done in controlled manner.
A fire breaks out in a branch office of a health insurance company. The personnel are transferred to neighboring branches to continue their work.
Where in the incident cycle is moving to a stand-by arrangements found?
An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.
__________ is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
Which reliability aspect of information is compromised when a staff member denies having sent a message?
Information has a number of reliability aspects. Reliability is constantly being threatened. Examples of threats are: a cable becomes loose, someone alters information by accident, data is used privately or is falsified.
Which of these examples is a threat to integrity?