Which approach does/did the United States take with regard to privacy legislation?
Which approach does/did the United States take with regard to privacy legislation?
Why is sensitive information graded?
Why is sensitive information graded?
What physical security measures must be taken in order to ensure this?
Your organization has an office with space for twenty five (25) workstations. These workstations
are all fully equipped and in use. Due to a reorganization ten (10) extra workstations are added,
five (5) of which are used for a call center 24 hours per day. Five (5) workstations must always be
available.
What physical security measures must be taken in order to ensure this?
Which legislation makes it easier to deal with offences perpetrated through advanced information technology?
Which legislation makes it easier to deal with offences perpetrated through advanced information
technology?
Which is not a purpose of the Incident Management process?
An Incident Management process has several purposes.
Which is not a purpose of the Incident Management process?
Which stage of the incident cycle follows the incident stage?
You work for a large organization. You notice that you have access to confidential information that
you should not be able to access in your position. You report this security incident to the helpdesk.
The incident cycle is initiated.
Which stage of the incident cycle follows the incident stage?
Which type of malware is a program that collects information of the computer user and sends it to another part
Which type of malware is a program that collects information of the computer user and sends it to
another party?
What is an organizational security measure?
What is an organizational security measure?
Which of the Confidentiality, Integrity, Availability (CIA) principles of the credit card file are violated?
A hacker gains access to a webserver and deletes a file on the server containing credit card
numbers.
Which of the Confidentiality, Integrity, Availability (CIA) principles of the credit card file are
violated?
which category?
There are three types of “human threats”.
The threat that a user accidentally deletes a document belongs to which category?