What is accomplished if reports are assigned the appropriate grading?
What is accomplished if reports are assigned the appropriate grading?
which concept is ‘measures taken to safeguard an information system from attacks’ the definition?
Of which concept is ‘measures taken to safeguard an information system from attacks’ the
definition?
What is the physical equivalent of the logical information security measure Intrusion Detection System (IDS)?
What is the physical equivalent of the logical information security measure Intrusion Detection
System (IDS)?
which main threat category does this threat belong?
An employee is about to lose his job and decides to delete as many documents as possible from
the network storage server.
In which main threat category does this threat belong?
What are the two main types of damage, resulting from incidents?
What are the two main types of damage, resulting from incidents?
Which process adds value to the data and turns data into ‘information’?
The term ‘big data’ is commonly used. However data itself has less (or no) value for an
organization.
Which process adds value to the data and turns data into ‘information’?
Which type of escalation is described above?
An employee detects abnormal behavior of her desktop computer.
After reporting to the system administrator and a first investigation, the system administrators
decide to get some help from the Computer emergency response Team (CERT).
Which type of escalation is described above?
Which key is used, prior to transmission, to ensure the authenticity of the document?
Two friends want to exchange a confidential document. It is important that eavesdroppers cannot
see this information. Furthermore the receiver should be able to validate the sender and that the
information is not altered during transport. Both friends have a public/private key combination.
Which key is used, prior to transmission, to ensure the authenticity of the document?
Which kind of risk treatment control is described here?
After a thorough risk analysis and the identification of appropriate security controls, the
management team decides that for one specific threat the impact should be covered by insurance.
Which kind of risk treatment control is described here?
Which technical security measure protects the information from unwanted disclosure in case the employee loses
Within a company several employees work mostly outside the perimeter of the company. These
employees have laptops on which the necessary (confidential) information is stored.
Which technical security measure protects the information from unwanted disclosure in case the
employee loses the laptop?