As a new member of the IT department you have noticed that confidential information has been leaked several times. This may damage the reputation of the company. You have been asked to propose an
organisational measure to protect laptop computers. What is the first step in a structured approach to come up with this measure?
What is the worst possible action that an employee may receive for sharing his or her password or access with others?
Why do we need to test a disaster recovery plan regularly, and keep it up to date?
Which of the following is a possible event that can have a disruptive effect on the reliability of information?
Which is the glue that ties the triad together
Stages of Information
The following are purposes of Information Security, except:
A decent visitor is roaming around without visitor's ID. As an employee you should do the following, except:
Cabling Security is associated with Power, telecommunication and network cabling carrying information are protected from interception and damage.
What would be the reference for you to know who should have access to data/document?
PDF + Testing Engine
|
---|
$66 |
Testing Engine
|
---|
$50 |
PDF (Q&A)
|
---|
$42 |
GAQM Free Exams |
---|
![]() |