<< Prev Question Next Question >>

Question 62/67

What is the difference between a restricted and confidential document?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (67q)
Question 1: What controls can you do to protect sensitive data in your c...
Question 2: Four types of Data Classification (Choose two)...
Question 3: Who is authorized to change the classification of a document...
Question 4: You are an experienced audit team leader guiding an auditor ...
Question 5: Please match the roles to the following descriptions: (Exhib...
Question 6: Integrity of data means
Question 7: What type of measure involves the stopping of possible conse...
Question 8: The data center at which you work is currently seeking ISO/I...
Question 9: Cabling Security is associated with Power, telecommunication...
Question 10: An employee caught with offense of abusing the internet, suc...
Question 11: What is the security management term for establishing whethe...
Question 12: You work in the office of a large company. You receive a cal...
Question 13: You are an experienced ISMS audit team leader providing inst...
Question 14: __________ is a software used or created by hackers to disru...
Question 15: The following are purposes of Information Security, except:...
Question 16: In which order is an Information Security Management System ...
Question 17: You are conducting an ISMS audit in the despatch department ...
Question 18: Often, people do not pick up their prints from a shared prin...
Question 19: What is a definition of compliance?...
Question 20: What type of legislation requires a proper controlled purcha...
Question 21: Select the words that best complete the sentence: To complet...
Question 22: A scenario wherein the city or location where the building(s...
Question 23: There is a scheduled fire drill in your facility. What shoul...
Question 24: Which three of the following work documents are not required...
Question 25: Which two of the following statements are true?...
Question 26: How are data and information related?...
Question 27: Access Control System, CCTV and security guards are form of:...
Question 28: Which one of the following options best describes the main p...
Question 29: Which department maintain's contacts with law enforcement au...
Question 30: Which of the following is a preventive security measure?...
Question 31: What is the standard definition of ISMS?...
Question 32: During an opening meeting of a Stage 2 audit, the Managing D...
Question 33: What type of system ensures a coherent Information Security ...
Question 34: A couple of years ago you started your company which has now...
Question 35: A hacker gains access to a web server and reads the credit c...
Question 36: You are an experienced ISMS audit team leader, talking to an...
Question 37: CEO sends a mail giving his views on the status of the compa...
Question 38: A decent visitor is roaming around without visitor's ID. As ...
Question 39: An administration office is going to determine the dangers t...
Question 40: You are an ISMS auditor conducting a third-party surveillanc...
Question 41: What is an example of a human threat?...
Question 42: The computer room is protected by a pass reader. Only the Sy...
Question 43: What is social engineering?
Question 44: Who is responsible for Initial asset allocation to the user/...
Question 45: You are conducting a third-party surveillance audit when ano...
Question 46: What is the worst possible action that an employee may recei...
Question 47: Below is Purpose of "Integrity", which is one of the Basic C...
Question 48: After completing Stage 1 and in preparation for a Stage 2 in...
Question 49: Which of the following does a lack of adequate security cont...
Question 50: Which three of the following options are an advantage of usi...
Question 51: You are preparing the audit findings. Select two options tha...
Question 52: A member of staff denies sending a particular message. Which...
Question 53: You are performing an ISMS audit at a residential nursing ho...
Question 54: You are carrying out your first third-party ISMS surveillanc...
Question 55: Which two of the following are examples of audit methods tha...
Question 56: Which of the following is not a type of Information Security...
Question 57: An employee caught with offense of abusing the internet, suc...
Question 58: What would be the reference for you to know who should have ...
Question 59: You are performing an ISMS audit at a nursing home where res...
Question 60: In regard to generating an audit finding, select the words t...
Question 61: You see a blue color sticker on certain physical assets. Wha...
Question 62: What is the difference between a restricted and confidential...
Question 63: In what part of the process to grant access to a system does...
Question 64: Who are allowed to access highly confidential files?...
Question 65: Which of the following is a possible event that can have a d...
Question 66: Select a word from the following options that best completes...
Question 67: You are an experienced ISMS audit team leader guiding an aud...