<< Prev Question Next Question >>

Question 38/113

What sort of security does a Public Key Infrastructure (PKI) offer?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (113q)
Question 1: In most organizations, access to the computer or the network...
Question 2: To which category of security measures does a smoke alarm be...
Question 3: What is the relationship between data and information?...
Question 4: Some security measures are optional. Other security measures...
Question 5: You read in the newspapers that the ex-employee of a large c...
Question 6: Which legislation regulates the storage and destruction of a...
Question 7: Which approach does/did the United States take with regard t...
Question 8: What is a human threat to the reliability of the information...
Question 9: Which type of malware is a program that collects information...
Question 10: What is not a category for security measures?...
Question 11: Under which condition is an employer permitted to check if I...
Question 12: What is the best description of a risk analysis?...
Question 13: There are three types of human threats: Intentional human th...
Question 14: Someone sends an e-mail. The sender wants the recipient to b...
Question 15: At Midwest Insurance, all information is classified. What is...
Question 16: What is an example of a security incident?...
Question 17: You work for a large organization. You notice that you have ...
Question 18: Physical security must protect a company for anyone to easil...
Question 19: You are the owner of SpeeDelivery courier service. Because o...
Question 20: You are the owner of the courier company SpeeDelivery. On th...
Question 21: What do employees need to know to report a security incident...
Question 22: Midwest Insurance controls access to its offices with a pass...
Question 23: Within a company several employees work mostly outside the p...
Question 24: My user profile specifies which network drives I can read an...
Question 25: What is the purpose of a Disaster Recovery Plan (DRP)?...
Question 26: We can acquire and supply information in various ways. The v...
Question 27: You are a consultant and are regularly hired by the Ministry...
Question 28: Some threats are caused directly by people, others have a na...
Question 29: A well executed risk analysis provides a great deal of usefu...
Question 30: Which one of the threats listed below can occur as a result ...
Question 31: What is 'a potential cause of an unwanted incident, which ma...
Question 32: The incident cycle has four stages. Which stage follows the ...
Question 33: A Dutch company is processing information from Dutch civilia...
Question 34: What is an example of a non-human threat to the physical env...
Question 35: You work for a flexible employer who doesn't mind if you wor...
Question 36: You have just started working at a large organization. You h...
Question 37: You are the first to arrive at work in the morning and notic...
Question 38: What sort of security does a Public Key Infrastructure (PKI)...
Question 39: Who is authorized to change the classification of a document...
Question 40: An airline company employee notices that she has access to o...
Question 41: What physical security measure is necessary to control acces...
Question 42: Which regulation is only applicable for United States public...
Question 43: You own a store, and money keeps disappearing from the cash ...
Question 44: An employee in the administrative department of Smiths Consu...
Question 45: Peter works at the company Midwest Insurance. His manager, L...
Question 46: You work for a large organization. You notice that you have ...
Question 47: The act of taking organizational security measures is inextr...
Question 48: Midwest Insurance grades the monthly report of all claimed l...
Question 49: Your organization has an office with space for twenty five (...
Question 50: You are the owner of the courier company SpeeDelivery. You h...
Question 51: What is the purpose of authentication?...
Question 52: Midwest Insurance controls access to its offices with a pass...
Question 53: What is the greatest risk for an organization if no informat...
Question 54: You are the owner of a growing company, SpeeDelivery, which ...
Question 55: An Incident Management process has several purposes. Which i...
Question 56: Which type of malware is a program which, in addition to the...
Question 57: You work in the office of a large company. You receive a cal...
Question 58: When we are at our desk, we want the information system and ...
Question 59: Which threat can materialize as a result of the absence of p...
Question 60: A hacker gains access to a webserver and deletes a file on t...
Question 61: What is the most important reason for applying segregation o...
Question 62: What is the objective of classifying information?...
Question 63: Two friends want to exchange a confidential document. It is ...
Question 64: Susan sends an email to Paul. Who determines the meaning and...
Question 65: Which is a legislative or regulatory act related to informat...
Question 66: What is the most common risk strategy besides Risk bearing a...
Question 67: Which of these is not malicious software?...
Question 68: Your company is concerned about the effect of global warming...
Question 69: In the organization where you work, information of a very se...
Question 70: Why is air-conditioning placed in the server room?...
Question 71: There are three types of "human threats". The threat that a ...
Question 72: You apply for a position in another company and get the job....
Question 73: Which type of malware builds a network of contaminated compu...
Question 74: What is not a criteria in the review process where it is det...
Question 75: A couple of years ago you started your company which has now...
Question 76: What are the two main types of damage, resulting from incide...
Question 77: What action is an unintentional human threat?...
Question 78: During a risk analysis a system administrator mentions that ...
Question 79: What is the best way to comply with legislation and regulati...
Question 80: You have an office that designs corporate logos. You have be...
Question 81: What is accomplished if reports are assigned the appropriate...
Question 82: The Information Security Manager (ISM) at Smith Consultants ...
Question 83: Why is sensitive information graded?...
Question 84: Why is compliance important for the reliability of the infor...
Question 85: What is an example of a good physical security measure?...
Question 86: There is a network printer in the hallway of the company whe...
Question 87: What is a repressive measure in the case of a fire?...
Question 88: The term 'big data' is commonly used. However data itself ha...
Question 89: Two friends want to exchange a confidential document by e-ma...
Question 90: What is a risk analysis used for?...
Question 91: A marketing employee accidentally e-mails a spreadsheet with...
Question 92: Three characteristics determine the reliability of informati...
Question 93: What is the purpose for an organization to have an informati...
Question 94: What is the definition of the Annual Loss Expectancy?...
Question 95: Lightning strikes the data center and the power surge destro...
Question 96: After a thorough risk analysis and the identification of app...
Question 97: Logging in to a computer system is an access-granting proces...
Question 98: An employee detects abnormal behavior of her desktop compute...
Question 99: Which measure assures that valuable information is not left ...
Question 100: What is the goal of an organization's security policy?...
Question 101: The company Midwest Insurance has taken many measures to pro...
Question 102: What is the physical equivalent of the logical information s...
Question 103: You have a small office in an industrial areA. You would lik...
Question 104: What is the relationship between data and information?...
Question 105: The consultants at Smith Consultants Inc. work on laptops th...
Question 106: Which legislation makes it easier to deal with offences perp...
Question 107: A company moves into a new building. A few weeks after the m...
Question 108: Your organization has an office with space for 25 workstatio...
Question 109: You are the owner of the SpeeDelivery courier service. Last ...
Question 110: You work in the IT department of a medium-sized company. Con...
Question 111: Of which concept is 'measures taken to safeguard an informat...
Question 112: You own a small company in a remote industrial area. Lately,...
Question 113: A Dutch company requests to be listed on the American Stock ...