which condition is an employer permitted to check if Internet and email services in the workplace are being us
Under which condition is an employer permitted to check if Internet and email services in the
workplace are being used for private purposes?
What is the relationship between the threat of fire and the risk of fire?
You have a small office in an industrial areA. You would like to analyze the risks your company
faces. The office is in a pretty remote location; therefore, the possibility of arson is not entirely out
of the question. What is the relationship between the threat of fire and the risk of fire?
What are the consequences for the reliability of the information if you leave your USB memory stick behind on
You work for a flexible employer who doesn’t mind if you work from home or on the road. You
regularly take copies of documents with you on a USB memory stick that is not secure. What are
the consequences for the reliability of the information if you leave your USB memory stick behind
on the train?
What is the best way to comply with legislation and regulations for personal data protection?
What is the best way to comply with legislation and regulations for personal data protection?
What is an example of the indirect damage caused by this fire?
There was a fire in a branch of the company Midwest Insurance. The fire department quickly
arrived at the scene and could extinguish the fire before it spread and burned down the entire
premises. The server, however, was destroyed in the fire. The backup tapes kept in another room
had melted and many other documents were lost for good. What is an example of the indirect
damage caused by this fire?
What are the consequences of this to the reliability of the information?
There is a network printer in the hallway of the company where you work. Many employees don’t
pick up their printouts immediately and leave them in the printer. What are the consequences of
this to the reliability of the information?
What is a human threat to the reliability of the information on your company website?
What is a human threat to the reliability of the information on your company website?
What is accomplished if all other reports from this insurance office are also assigned the appropriate grading
Midwest Insurance grades the monthly report of all claimed losses per insured as confidential.
What is accomplished if all other reports from this insurance office are also assigned the
appropriate grading?
What occurs during the first step of this process: identification?
Logging in to a computer system is an access-granting process consisting of three steps:
identification, authentication and authorization. What occurs during the first step of this process:
identification?
What is this kind of risk strategy called?
In the organization where you work, information of a very sensitive nature is processed.
Management is legally obliged to implement the highest-level security measures. What is this kind
of risk strategy called?