Information Security is a matter of building and maintaining ________ .
B
Phishing is what type of Information Security Incident?
B
The following are the guidelines to protect your password, except:
B,C
The following are purposes of Information Security, except:
C
Which of the following is not a type of Information Security attack?
B
A decent visitor is roaming around without visitor's ID. As an employee you should do the following,
except:
A
Stages of Information
C
A property of Information that has the ability to prove occurrence of a claimed event.
B
Information or data that are classified as ______ do not require labeling.
A
What is the standard definition of ISMS?
D
In the event of an Information security incident, system users' roles and responsibilities are to be
observed, except:
D
The following are definitions of Information, except:
C
You receive the following mail from the IT support team: Dear User,Starting next week, we will be
deleting all inactive email accounts in order tocreate spaceshare the below details in order to
continue using your account. In case ofno response,
Name:
Email ID:
Password:
DOB:
Kindly contact the webmail team for any further support. Thanks for your attention.
Which of the following is the best response?
C
You have a hard copy of a customer design document that you want to dispose off. What would you
do
B
Integrity of data means
A