<< Prev Question Next Question >>

Question 31/36

You receive the following mail from the IT support team: Dear User,Starting next week, we will be deleting all inactive email accounts in order to create spaceshare the below details in order to continue using your account. In case of no response, Name:
Email ID:
Password:
DOB:
Kindly contact the webmail team for any further support. Thanks for your attention.
Which of the following is the best response?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (36q)
Question 1: You receive an E-mail from some unknown person claiming to b...
Question 2: There is a scheduled fire drill in your facility. What shoul...
Question 3: -------------------------is an asset like other important bu...
Question 4: You have a hard copy of a customer design document that you ...
Question 5: Who are allowed to access highly confidential files?...
Question 6: Which is the glue that ties the triad together...
Question 7: What type of compliancy standard, regulation or legislation ...
Question 8: What is the security management term for establishing whethe...
Question 9: Which threat could occur if no physical measures are taken?...
Question 10: Which measure is a preventive measure?...
Question 11: Which of the following does a lack of adequate security cont...
Question 12: The computer room is protected by a pass reader. Only the Sy...
Question 13: Which of the following does an Asset Register contain? (Choo...
1 commentQuestion 14: Which of the following is not a type of Information Security...
Question 15: A property of Information that has the ability to prove occu...
Question 16: Which of the following is an information security management...
Question 17: Often, people do not pick up their prints from a shared prin...
Question 18: Which of the following statements are correct for Clean Desk...
Question 19: A decent visitor is roaming around without visitor's ID. As ...
Question 20: Does the security have the right to ask you to display your ...
Question 21: In which order is an Information Security Management System ...
Question 22: Which of the following factors does NOT contribute to the va...
Question 23: There is a network printer in the hallway of the company whe...
Question 24: What is the purpose of an Information Security policy?...
Question 25: Which department maintain's contacts with law enforcement au...
Question 26: An employee caught with offense of abusing the internet, suc...
Question 27: Information Security is a matter of building and maintaining...
Question 28: What is social engineering?
Question 29: What is the standard definition of ISMS?...
Question 30: What is the name of the system that guarantees the coherence...
Question 31: You receive the following mail from the IT support team: Dea...
Question 32: In what part of the process to grant access to a system does...
Question 33: After a devastating office fire, all staff are moved to othe...
Question 34: Stages of Information
Question 35: You see a blue color sticker on certain physical assets. Wha...
Question 36: What is a reason for the classification of information?...