Which threat can materialize as a result of the absence of physical security?
Which threat can materialize as a result of the absence of physical security?
What does the sender attach to the email?
Someone sends an e-mail. The sender wants the recipient to be able to verify who wrote and sent
the email.
What does the sender attach to the email?
What is the purpose for an organization to have an information security policy?
What is the purpose for an organization to have an information security policy?
Which protection ring deals with the asset that is to be protected?
Physical security must protect a company for anyone to easily access the company assets. This is
illustrated by thinking in terms of series of protection rings.
Which protection ring deals with the asset that is to be protected?
Which characteristic of a risk is missing here?
During a risk analysis a system administrator mentions that due to the lack of communication
between Human recourses management (HRM) and system administrators, employees can still
access the company server from home even if they are no longer employed by the company.
Which characteristic of a risk is missing here?
What is the third type of human threat?
There are three types of human threats: Intentional human threats, Unintentional human threats
and a third human threat.
What is the third type of human threat?
What kind of security measure is this?
Midwest Insurance controls access to its offices with a passkey system. What kind of security
measure is this?
What is an example of a detective measure?
You own a store, and money keeps disappearing from the cash register. You want to put an end to
this by means of a detective measure.
What is an example of a detective measure?
What is the main reliability aspect of information besides Confidentiality and Integrity?
What is the main reliability aspect of information besides Confidentiality and Integrity?
which stage of the incident cycle is the Intrusion detection system (IDS) measure aimed?
An information security incident has several stages which together are known as the incident
cycle. At different stages within this cycle different kinds of security measures are applied.
At which stage of the incident cycle is the Intrusion detection system (IDS) measure aimed?