How to report an incident and to whom.
You have just started working at a large organization. You have been asked to sign a code of conduct
as well as a contract. What does the organization wish to achieve with this?
A
What do employees need to know to report a security incident?
A
How to report an incident and to whom.
Which of the following measures is a corrective measure?
D
Restoring a backup of the correct database after a corrupt copy of the database was written over the original
Restoring a backup of the correct database after a corrupt copy of the database was written over the original
Restoring a backup of the correct database after a corrupt copy of the database was written over the original
What is an example of a non-human threat to the physical environment?
C
example of a non-human threat to the physical environment:Storm
What is the best description of a risk analysis?
B
A risk analysis helps to estimate the risks and develop the appropriate security measures
What is an example of a good physical security measure?
A
A. All employees and visitors carry an access pass
You apply for a position in another company and get the job. Along with your contract, you are asked
to sign a code of conduct. What is a code of conduct?
C
A code of conduct differs from company to company and specifies, among other things, the rules of behavior with regard to the usage of information systems
A company moves into a new building. A few weeks after the move, a visitor appears unannounced
in the office of the director. An investigation shows that visitors passes grant the same access as the
passes of the company's staff. Which kind of security measure could have prevented this?
A
physical security measure
Susan sends an email to Paul. Who determines the meaning and the value of information in this
email?
A
Paul, the recipient of the informatio
Logging in to a computer system is an access-granting process consisting of three steps:
identification, authentication and authorization. What occurs during the first step of this process:
identification?
B
B. The first step consists of checking if the user appears on the list of authorized users.
The company Midwest Insurance has taken many measures to protect its information. It uses an
Information Security Management System, the input and output of data in applications is validated,
confidential documents are sent in encrypted form and staff use tokens to access information
systems. Which of these is not a technical measure?
A
Information Security Management System
Which is a legislative or regulatory act related to information security that can be imposed upon all
organizations?
D
Personal data protection legislation
Midwest Insurance grades the monthly report of all claimed losses per insured as confidential. What
is accomplished if all other reports from this insurance office are also assigned the appropriate
grading?
C
Everyone can easily see how sensitive the reports' contents are by consulting the grading label
What sort of security does a Public Key Infrastructure (PKI) offer?
D
It provides digital certificates that can be used to digitally sign documents.
Of the following, which is the best organization or set of organizations to contribute to compliance?
B
IT, business management, HR and legal
A code of conduct is a set of rules and principles established by an organization to guide the behavior of its employees. It outlines ethical standards, expectations, and guidelines for professional conduct to ensure that everyone within the organization upholds values such as integrity, respect, and responsibility
A code of conduct is a set of rules and principles established by an organization to guide the behavior of its employees. It outlines ethical standards, expectations, and guidelines for professional conduct to ensure that everyone within the organization upholds values such as integrity, respect, and responsibility
A code of conduct is a set of rules and principles established by an organization to guide the behavior of its employees. It outlines ethical standards, expectations, and guidelines for professional conduct to ensure that everyone within the organization upholds values such as integrity, respect, and responsibility
A code of conduct is a set of rules and principles established by an organization to guide the behavior of its employees. It outlines ethical standards, expectations, and guidelines for professional conduct to ensure that everyone within the organization upholds values such as integrity, respect, and responsibility
. A code of conduct helps to prevent the misuse of IT facilities.
Restoring a backup of the correct database after a corrupt copy of the database was written over the original