Which of the following information security standards deals with the protection of the computer facilities?
Answer : A
Which of the following is a technical measure?
Answer : A
Which of the following types of social engineering attacks is a term that refers to going through someone's trash to find out useful or confidential information?
Answer : B
Which of the following are the things included by sensitive system isolation?
Each correct answer represents a complete solution. Choose all that apply.
Answer : ACD
You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to assign ownership of some assets of the organization. Which of the following statements correctly describe the responsibilities of an asset owner?
Each correct answer represents a complete solution. Choose all that apply.
Answer : BC
You work as a Security Administrator for uCertify Inc. You need to make a documentation to provide ongoing education and awareness training of disciplinary actions of your company. What are the primary reasons to create this documentation?
Each correct answer represents a complete solution. Choose all that apply.
Answer : ABC
The stronger points of CRAMM assist prioritization by providing a countermeasure with high priority if some conditions are met. Which of the following are these conditions?
Each correct answer represents a complete solution. Choose all that apply.
Answer : ABD
Which of the following tasks are performed by Information Security Management?
Each correct answer represents a complete solution. Choose all that apply.
Answer : ACD
Which of the following standards was made in 1995 by the joint initiative of the Department of Trade and Industry in the United Kingdom and leading UK private-sector businesses?
Answer : A
Which of the following are the variables on which the structure of Service Level Agreement depends?
Each correct answer represents a complete solution. Choose all that apply.
Answer : ACD
Which of the following is one of the mechanisms available for administrators to employ for replicating the databases containing the DNS data across a set of DNS servers?
Answer : A
You work as an Information Security Manager for uCertify Inc. You are working on asset management. You need to differentiate various assets of your organization. Which of the following are information assets?
Each correct answer represents a complete solution. Choose all that apply.
Answer : ACD
Fill in the blank with the appropriate term.
___________is the built-in file encryption tool for Windows file systems. It protects encrypted files from those who have physical possession of the computer where the encrypted files are stored.
Answer : EFS
Which of the following are the major tasks of risk management?
Each correct answer represents a complete solution. Choose two.
Answer : CD
You work as an Information Security Manager for uCertify Inc. You have been assigned the task to create the documentation on control A.7.2 of the ISO standard. Which of the following is the chief concern of control A.7.2?
Answer : D
Have any questions or issues ? Please dont hesitate to contact us