Which department maintain's contacts with law enforcement authorities, regulatory
bodies, information service providers and telecommunications service providers depending on the service required.
What type of compliancy standard, regulation or legislation provides a code of practice for information security?
An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.
You receive the following mail from the IT support team: Dear User,Starting next week, we will be deleting all inactive email accounts in order to create spaceshare the below details in order to continue using your account. In case of no response,
Name:
Email ID:
Password:
DOB:
Kindly contact the webmail team for any further support. Thanks for your attention.
Which of the following is the best response?
What would be the reference for you to know who should have access to data/document?
In the event of an Information security incident, system users' roles and responsibilities are to be observed, except:
__________ is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
What is the name of the system that guarantees the coherence of information security in the organization?
A decent visitor is roaming around without visitor's ID. As an employee you should do the following, except:
You work in the office of a large company. You receive a call from a person claiming to be from the Helpdesk. He asks you for your password.
What kind of threat is this?
What type of measure involves the stopping of possible consequences of security incidents?
Backup media is kept in the same secure area as the servers. What risk may the organisation be exposed to?
An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.
A couple of years ago you started your company which has now grown from 1 to 20 employees. Your company’s information is worth more and more and gone are the days when you could keep control yourself. You are aware that you have to take measures, but what should they be? You hire a consultant who advises you to start with a qualitative risk analysis.
What is a qualitative risk analysis?
-------------------------is an asset like other important business assets has value to an organization and consequently needs to be protected.
Often, people do not pick up their prints from a shared printer. How can this affect the confidentiality of information?
In order to take out a fire insurance policy, an administration office must determine the value of the data that it manages.
Which factor is [b]not[/b] important for determining the value of data for an organization?
A scenario wherein the city or location where the building(s) reside is / are not accessible.
Does the security have the right to ask you to display your ID badges and check your bags?