What is a repressive measure in case of a fire?
A. Taking out a fire insurance
B. Putting out a fire after it has been detected by a fire detector
C. Repairing damage caused by the fire
Which of the following is not a type of Information Security attack?
A. Legal Incidents
B. Vehicular Incidents
C. Technical Vulnerabilities
D. Privacy Incidents
After a devastating office fire, all staff are moved to other branches of the company. At what moment in the incident management process is this measure effectuated?
A. Between incident and damage
B. Between detection and classification
C. Between recovery and normal operations
D. Between classification and escalation
Availability means:
A. Service should be accessible at the required time and usable by all
B. Service should be accessible at the required time and usable only by the authorized entity
C. Service should not be accessible when required
Information or data that are classified as ______ do not require labeling.
A. Public
B. Internal
C. Confidential
D. Highly Confidential
Phishing is what type of Information Security Incident?
A. Private Incidents
B. Cracker/Hacker Attacks
C. Technical Vulnerabilities
D. Legal Incidents
Who is responsible for Initial asset allocation to the user/custodian of the assets?
A. Asset Manager
B. Asset Owner
C. Asset Practitioner
D. Asset Stakeholder
What type of legislation requires a proper controlled purchase process?
A. Personal data protection act
B. Computer criminality act
C. Government information act
D. Intellectual property rights act
A planning process that introduced the concept of planning as a cycle that forms the basis for continuous improvement is called:
A. time based planning.
B. plan, do, check, act.
C. planning for continuous improvement.
D. RACI Matrix
Which of the following is a possible event that can have a disruptive effect on the reliability of information?
A. Threat
B. Risk
C. Vulnerability
D. Dependency