A planning process that introduced the concept of planning as a cycle that forms the basis for continuous improvement is called:
In what part of the process to grant access to a system does the user present a token?
In which order is an Information Security Management System set up?
Which threat could occur if no physical measures are taken?
A couple of years ago you started your company which has now grown from 1 to 20 employees. Your company’s information is worth more and more and gone are the days when you could keep control yourself. You are aware that you have to take measures, but what should they be? You hire a consultant who advises you to start with a qualitative risk analysis.
What is a qualitative risk analysis?
Which measure is a preventive measure?
What is a repressive measure in case of a fire?
You work in the office of a large company. You receive a call from a person claiming to be from the Helpdesk. He asks you for your password.
What kind of threat is this?
A property of Information that has the ability to prove occurrence of a claimed event.
A hacker gains access to a webserver and can view a file on the server containing credit card numbers.
Which of the Confidentiality, Integrity, Availability (CIA) principles of the credit card file are violated?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
GAQM Free Exams |
---|
![]() |