Cracker/Hacker Attacks
Information Security is a matter of building and maintaining ________ .
B
Phishing is what type of Information Security Incident?
B
Cracker/Hacker Attacks
Cracker/Hacker Attacks
The following are the guidelines to protect your password, except:
B,C
For easy recall, use the same password for company and personal accounts
The following are purposes of Information Security, except:
C
Increase Business Assets
Which of the following is not a type of Information Security attack?
B
Vehicular incident
Vehicular Incidents
Vehicular Incidents
A decent visitor is roaming around without visitor's ID. As an employee you should do the following,
except:
A
Say 'Hi and offer Coffee
Say "hi" and offer coffee
Say "hi" and offer coffee
Stages of Information
C
Creation, distribution , maintenance , disposition
Thanks for submitting , your comment will be approved soon by our moderators
creation, distribution, use, maintenance, disposition
creation, distribution, use, maintenance, disposition
A property of Information that has the ability to prove occurrence of a claimed event.
B
B,Integrity
integrity A property of Information that has the ability to prove occurrence of a claimed event
Information or data that are classified as ______ do not require labeling.
A
A. Public
Information or data that are classified as Public do not require labeling.
What is the standard definition of ISMS?
D
The Answer is option D
A systematic approach for establishing, implementing, operating,monitoring, reviewing, maintainingand improving an organizations information security to achieve business objectives.
In the event of an Information security incident, system users' roles and responsibilities are to be
observed, except:
D
The answer is option D
Thanks for submitting , your comment will be approved soon by our moderators
Make the information security incident details known to all employees
The following are definitions of Information, except:
C
mature and measurable data
You receive the following mail from the IT support team: Dear User,Starting next week, we will be
deleting all inactive email accounts in order tocreate spaceshare the below details in order to
continue using your account. In case ofno response,
Name:
Email ID:
Password:
DOB:
Kindly contact the webmail team for any further support. Thanks for your attention.
Which of the following is the best response?
C
One should not respond to these mails and report such email to your supervisor
You have a hard copy of a customer design document that you want to dispose off. What would you
do
B
Shred it using a shredder
Integrity of data means
A
Accuracy and completeness of the data
Information Security is a matter of building and maintaining Trust