Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

The computer room is protected by a pass reader. Only the System Management department has a pass. 

What type of security measure is this?

A.

a corrective security measure

B.

a physical security measure

C.

a logical security measure 

D.

a repressive security measure

Full Access
Question # 5

-------------------------is an asset like other important business assets has value to an organization and consequently needs to be protected.

A.

Infrastructure

B.

Data

C.

Information

D.

Security

Full Access
Question # 6

Stages of Information 

A.

creation, evolution, maintenance, use, disposition

B.

creation, use, disposition, maintenance, evolution

C.

creation, distribution, use, maintenance, disposition 

D.

creation, distribution, maintenance, disposition, use

Full Access
Question # 7

A fire breaks out in a branch office of a health insurance company. The personnel are transferred to neighboring branches to continue their work. 

Where in the incident cycle is moving to a stand-by arrangements found? 

A.

between threat and incident

B.

between recovery and threat 

C.

between damage and recovery

D.

between incident and damage

Full Access
Question # 8

You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called

A.

Shoulder Surfing

B.

Mountaineering

C.

Phishing

D.

Spoofing

Full Access
Question # 9

Why do we need to test a disaster recovery plan regularly, and keep it up to date?

A.

Otherwise the measures taken and the incident procedures planned may not be adequate

B.

Otherwise it is no longer up to date with the registration of daily occurring faults

C.

Otherwise remotely stored backups may no longer be available to the security team 

Full Access
Question # 10

Which of the following is a preventive security measure? 

A.

Installing logging and monitoring software

B.

Shutting down the Internet connection after an attack

C.

Storing sensitive information in a data save

Full Access
Question # 11

Which of the following does a lack of adequate security controls represent?

A.

Asset

B.

Vulnerability

C.

Impact

D.

Threat

Full Access
Question # 12

In the event of an Information security incident, system users' roles and responsibilities are to be observed, except:

A.

Report suspected or known incidents upon discovery through the Servicedesk

B.

Preserve evidence if necessary

C.

Cooperate with investigative personnel during investigation if needed

D.

Make the information security incident details known to all employees

Full Access
Question # 13

A decent visitor is roaming around without visitor's ID. As an employee you should do the following, except:

A.

Say "hi" and offer coffee

B.

Call the receptionist and inform about the visitor

C.

Greet and ask him what is his business

D.

Escort him to his destination

Full Access
Question # 14

Which measure is a preventive measure? 

A.

Installing a logging system that enables changes in a system to be recognized 

B.

Shutting down all internet traffic after a hacker has gained access to the company systems

C.

Putting sensitive information in a safe

Full Access
Question # 15

Backup media is kept in the same secure area as the servers. What risk may the organisation be exposed to? 

A.

Unauthorised persons will have access to both the servers and backups 

B.

Responsibility for the backups is not defined well

C.

After a fire, the information systems cannot be restored

D.

After a server crash, it will take extra time to bring it back up again

Full Access