What is the most important reason for applying segregation of duties?
What is the most important reason for applying segregation of duties?
which situation is a flood always a relevant threat?
A non-human threat for computer systems is a flood. In which situation is a flood always a
relevant threat?
Why is compliance important for the reliability of the information?
Why is compliance important for the reliability of the information?
Which of these measures is a detective measure?
[tagged]
You are the owner of the courier company SpeeDelivery. On the basis of your risk analysis you
have decided to take a number of measures. You have daily backups made of the server, keep
the server room locked and install an intrusion alarm system and a sprinkler system. Which of
these measures is a detective measure?
What is the relationship between data and information?
What is the relationship between data and information?
Which type of malware builds a network of contaminated computers?
[tagged]
Which type of malware builds a network of contaminated computers?
What kind of threat is this?
[tagged]
You work in the office of a large company. You receive a call from a person claiming to be from
the Helpdesk. He asks you for your password. What kind of threat is this?
Which reliability aspect of the information in your reports must you protect?
You are a consultant and are regularly hired by the Ministry of Defense to perform analysis.
Since the assignments are irregular, you outsource the administration of your business to
temporary workers. You don’t want the temporary workers to have access to your reports. Which
reliability aspect of the information in your reports must you protect?
What do we call this type of damage?
Your company is in the news as a result of an unfortunate action by one of your employees. The
phones are ringing off the hook with customers wanting to cancel their contracts. What do we call
this type of damage?
Is this an information security incident?
An airline company employee notices that she has access to one of the company’s applications
that she has not used before. Is this an information security incident?