Information
Below is Purpose of "Integrity", which is one of the Basic Components of Information Security
B
-------------------------is an asset like other important business assets has value to an organization and
consequently needs to be protected.
C
Information
Information
Information
Information
Information
Data is an asset like other important business assets has value to an organization and consequently needs to be protected
Information
What is we do in ACT - From PDCA cycle
B
Take actions to continually improve process performance
Take actions to continually improve process performance
Take actions to continually improve process performance
Take actions to continually improve process performance
B. Take actions to continually improve process performance
Take actions to continually improve process performance
Continuly improve process performance
Implement plan on a test basis - this comes under which section of PDCA
B
The answer is "DO"
Do Implement plan on a test basis
The answer is B:Do
B. Do B. Do
the answer is B. Do
Check implement plan on a test basis
Do under pdca
Which is the glue that ties the triad together
A
Process is the glue that triad togather
Process is the glue that ties the triad together
A Process
A, Process
A. Process
Process is a triad
Who are allowed to access highly confidential files?
C
Employee with signed NDA have a business need to know
Employees with signed NDA have a business need-to-know
Employees with signed NDA have a business need-to-know
Employees with signed NDA have a business need-to-know
Employees with signed NDA have a business need-to-know
C. Employees with signed NDA have a business need-to-know
Employee with nda
Which is not a requirement of HR prior to hiring?
C
Must undergo Awareness training on information security.
Must undergo Awareness training on information security
Must undergo Awareness training on information security.
Must undergo Awareness training on information security.
CMM stands for?
C
Capacity Maturity Model
Capability Maturity Model
Capability Maturity Model
Capability Maturity Model
Capability Maturity Model
In acceptable use of Information Assets, which is the best practice?
A
A is the answer
Access to information and communication systems are provided for business purpose only
Access to information and communication systems are provided for business purpose only
Access to information and communication systems are provided for business purpose only
A. Access to information and communication systems are provided for business purpose only
All are prohibited in acceptable use of information assets, except:
C
Company-wide e-mails with supervisor/TL permission.
Company-wide e-mails with supervisor/TL permission.
Company-wide e-mails with supervisor/TL permission
Company-wide e-mails with supervisor/TL permission
C. Company-wide e-mails with supervisor/TL permission.
Information Security is a matter of building and maintaining ________ .
B
Information Security is a matter of building and maintaining Trust
B. Trust trust
B trust b trust
B. Trust B. Trust
Phishing is what type of Information Security Incident?
B
Cracker/Hacker Attacks
Cracker/Hacker Attacks
Cracker/Hacker Attacks
Cracker/Hacker Attacks
Cracker/Hacker Attacks
B. Cracker/Hacker Attacks
The following are the guidelines to protect your password, except:
B,C
For easy recall, use the same password for company and personal accounts
For easy recall, use the same password for company and personal accounts
For easy recall, use the same password for company and personal accounts
For easy recall, use the same password for company and personal accounts
Utiliser le même mot de passe pour les comptes de l'entreprise et les comptes personnels n'est pas recommandé car cela augmente le risque de compromission de la sécurité.
The following are purposes of Information Security, except:
C
Increase Business Assets
Increase Business Assets
Increase Business Assets
Increase Business Assets
Increase Business Assets
C. Increase Business Assets
n'est pas un objectif direct de la sécurité de l'information
Which of the following is not a type of Information Security attack?
B
Vehicular incident
Vehicular Incidents
Vehicular Incidents
Vehicular Incidents
Vehicular Incidents
Vehicular Incidents
Vehicular Incidents
Vehicular Incidents
B. Vehicular Incidents
Vehicular Incidents
B. Vehicular Incidents
the property of safeguarding the accuracy and completeness of assets.
the property of safeguarding the accuracy and completeness of assets
ddddddddddddddddddddddddddddddddddddddddd
the property of safeguarding the accuracy and completeness of assets.
the property of safeguarding the accuracy and completeness of assets.
the property of safeguarding the accuracy and completeness of assets.
the property of safeguarding the accuracy and completeness of assets.
the property of safeguarding the accuracy and completeness of assets
the property of safeguarding the accuracy and completeness of assets.
the property of safeguarding the accuracy and completeness of assets.
the property that information is not made available or disclosed to unauthorized individuals
Safeguarding the accuracy and completeness of the assests
C. the property that information is not made available or disclosed to unauthorized individuals