A planning process that introduced the concept of planning as a cycle that forms the basis for continuous improvement is called:
Which of the following is an information security management system standard published by the International Organization for Standardization?
What controls can you do to protect sensitive data in your computer when you go out for lunch?
An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.
What is an example of a human threat?
After a fire has occurred, what repressive measure can be taken?
Which reliability aspect of information is compromised when a staff member denies having sent a message?
A hacker gains access to a webserver and can view a file on the server containing credit card numbers.
Which of the Confidentiality, Integrity, Availability (CIA) principles of the credit card file are violated?
What is the purpose of an Information Security policy?
PDF + Testing Engine
|
---|
$57.75 |
Testing Engine
|
---|
$43.75 |
PDF (Q&A)
|
---|
$36.75 |
GAQM Free Exams |
---|
![]() |