Winter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

Question # 4

The following are definitions of Information, except:

A.

accurate and timely data

B.

specific and organized data for a purpose

C.

mature and measurable data

D.

can lead to understanding and decrease in uncertainty

Full Access
Question # 5

What is the purpose of an Information Security policy?

A.

An information security policy makes the security plan concrete by providing the necessary details

B.

An information security policy provides insight into threats and the possible consequences

C.

An information security policy provides direction and support to the management regarding information security

D.

An information security policy documents the analysis of risks and the search for countermeasures

Full Access
Question # 6

Cabling Security is associated with Power, telecommunication and network cabling carrying information are protected from interception and damage.

A.

True

B.

False

Full Access
Question # 7

What type of compliancy standard, regulation or legislation provides a code of practice for information security?

A.

ISO/IEC 27002

B.

Personal data protection act

C.

Computer criminality act

D.

IT Service Management

Full Access
Question # 8

A decent visitor is roaming around without visitor's ID. As an employee you should do the following, except:

A.

Say "hi" and offer coffee

B.

Call the receptionist and inform about the visitor

C.

Greet and ask him what is his business

D.

Escort him to his destination

Full Access
Question # 9

Which threat could occur if no physical measures are taken?

A.

Unauthorised persons viewing sensitive files

B.

Confidential prints being left on the printer

C.

A server shutting down because of overheating

D.

Hackers entering the corporate network

Full Access
Question # 10

You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called

A.

Shoulder Surfing

B.

Mountaineering

C.

Phishing

D.

Spoofing

Full Access
Question # 11

Which is not a requirement of HR prior to hiring?

A.

Undergo background verification

B.

Applicant must complete pre-employment documentation requirements

C.

Must undergo Awareness training on information security.

D.

Must successfully pass Background Investigation

Full Access
Question # 12

Which of the following is not a type of Information Security attack?

A.

Legal Incidents

B.

Vehicular Incidents

C.

Technical Vulnerabilities

D.

Privacy Incidents

Full Access
Question # 13

What is an example of a human threat?

A.

a lightning strike

B.

fire

C.

phishing

D.

thunderstrom

Full Access
Question # 14

Stages of Information

A.

creation, evolution, maintenance, use, disposition

B.

creation, use, disposition, maintenance, evolution

C.

creation, distribution, use, maintenance, disposition

D.

creation, distribution, maintenance, disposition, use

Full Access
Question # 15

A couple of years ago you started your company which has now grown from 1 to 20 employees. Your company’s information is worth more and more and gone are the days when you could keep control yourself. You are aware that you have to take measures, but what should they be? You hire a consultant who advises you to start with a qualitative risk analysis.

What is a qualitative risk analysis?

A.

This analysis follows a precise statistical probability calculation in order to calculate exact loss caused by damage.

B.

This analysis is based on scenarios and situations and produces a subjective view of the possible threats.

Full Access