Implement plan on a test basis - this comes under which section of PDCA
A. Plan
B. Do
C. Act
D. Check
What is the goal of classification of information?
A. To create a manual about how to handle mobile devices
B. Applying labels making the information easier to recognize
C. Structuring information according to its sensitivity
As a new member of the IT department you have noticed that confidential information has been leaked several times. This may damage the reputation of the company. You have been asked to propose an organisational measure to protect laptop computers. What is the first step in a structured approach to come up with this measure?
A. Appoint security staff
B. Encrypt all sensitive information
C. Formulate a policy
D. Set up an access control procedure
Changes to the information processing facilities shall be done in controlled manner.
A. True
B. False
Which department maintain's contacts with law enforcement authorities, regulatory bodies, information service providers and telecommunications service providers depending on the service required.
A. COO
B. CISO
C. CSM
D. MRO
Which of the following is a preventive security measure?
A. Installing logging and monitoring software
B. Shutting down the Internet connection after an attack
C. Storing sensitive information in a data save
What type of system ensures a coherent Information Security organisation?
A. Federal Information Security Management Act (FISMA)
B. Information Technology Service Management System (ITSM)
C. Information Security Management System (ISMS)
D. Information Exchange Data System (IEDS)
Which threat could occur if no physical measures are taken?
A. Unauthorised persons viewing sensitive files
B. Confidential prints being left on the printer
C. A server shutting down because of overheating
D. Hackers entering the corporate network
Which of the following is not a type of Information Security attack?
A. Legal Incidents
B. Vehicular Incidents
C. Technical Vulnerabilities
D. Privacy Incidents
Information has a number of reliability aspects. Reliability is constantly being threatened. Examples of threats are: a cable becomes loose, someone alters information by accident, data is used privately or is falsified.
Which of these examples is a threat to integrity?
A. a loose cable
B. accidental alteration of data
C. private use of data
D. System restart