<< Prev Question Next Question >>

Question 5/36

Who are allowed to access highly confidential files?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (36q)
Question 1: You receive an E-mail from some unknown person claiming to b...
Question 2: There is a scheduled fire drill in your facility. What shoul...
Question 3: -------------------------is an asset like other important bu...
Question 4: You have a hard copy of a customer design document that you ...
Question 5: Who are allowed to access highly confidential files?...
Question 6: Which is the glue that ties the triad together...
Question 7: What type of compliancy standard, regulation or legislation ...
Question 8: What is the security management term for establishing whethe...
Question 9: Which threat could occur if no physical measures are taken?...
Question 10: Which measure is a preventive measure?...
Question 11: Which of the following does a lack of adequate security cont...
Question 12: The computer room is protected by a pass reader. Only the Sy...
Question 13: Which of the following does an Asset Register contain? (Choo...
1 commentQuestion 14: Which of the following is not a type of Information Security...
Question 15: A property of Information that has the ability to prove occu...
Question 16: Which of the following is an information security management...
Question 17: Often, people do not pick up their prints from a shared prin...
Question 18: Which of the following statements are correct for Clean Desk...
Question 19: A decent visitor is roaming around without visitor's ID. As ...
Question 20: Does the security have the right to ask you to display your ...
Question 21: In which order is an Information Security Management System ...
Question 22: Which of the following factors does NOT contribute to the va...
Question 23: There is a network printer in the hallway of the company whe...
Question 24: What is the purpose of an Information Security policy?...
Question 25: Which department maintain's contacts with law enforcement au...
Question 26: An employee caught with offense of abusing the internet, suc...
Question 27: Information Security is a matter of building and maintaining...
Question 28: What is social engineering?
Question 29: What is the standard definition of ISMS?...
Question 30: What is the name of the system that guarantees the coherence...
Question 31: You receive the following mail from the IT support team: Dea...
Question 32: In what part of the process to grant access to a system does...
Question 33: After a devastating office fire, all staff are moved to othe...
Question 34: Stages of Information
Question 35: You see a blue color sticker on certain physical assets. Wha...
Question 36: What is a reason for the classification of information?...