Pass the GAQM GAQM: ISO ISO-ISMS-LA Questions and answers with CertsForce

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.

Options:

A.

True


B.

False


Expert Solution
Questions # 2:

Phishing is what type of Information Security Incident?

Options:

A.

Private Incidents


B.

Cracker/Hacker Attacks


C.

Technical Vulnerabilities


D.

Legal Incidents


Expert Solution
Questions # 3:

A decent visitor is roaming around without visitor's ID. As an employee you should do the following, except:

Options:

A.

Say "hi" and offer coffee


B.

Call the receptionist and inform about the visitor


C.

Greet and ask him what is his business


D.

Escort him to his destination


Expert Solution
Questions # 4:

What is the goal of classification of information?

Options:

A.

To create a manual about how to handle mobile devices 


B.

Applying labels making the information easier to recognize


C.

Structuring information according to its sensitivity 


Expert Solution
Questions # 5:

Which of the following statements are correct for Clean Desk Policy?

Options:

A.

Don't leave confidential documents on your desk.


B.

Don't leave valuable items on your desk if you are not in your work area.


C.

Don't leave highly confidential items.


D.

Don't leave laptops without cable lock.


Expert Solution
Questions # 6:

You have a hard copy of a customer design document that you want to dispose off. What would you do

Options:

A.

Throw it in any dustbin


B.

Shred it using a shredder


C.

Give it to the office boy to reuse it for other purposes


D.

Be environment friendly and reuse it for writing


Expert Solution
Questions # 7:

You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called

Options:

A.

Shoulder Surfing


B.

Mountaineering


C.

Phishing


D.

Spoofing


Expert Solution
Questions # 8:

As a new member of the IT department you have noticed that confidential information has been leaked several times. This may damage the reputation of the company. You have been asked to propose an organisational measure to protect laptop computers. What is the first step in a structured approach to come up with this measure? 

Options:

A.

Appoint security staff


B.

Encrypt all sensitive information 


C.

Formulate a policy 


D.

Set up an access control procedure 


Expert Solution
Questions # 9:

Which of the following does an Asset Register contain? (Choose two)

Options:

A.

Asset Type


B.

Asset Owner


C.

Asset Modifier


D.

Process ID


Expert Solution
Questions # 10:

A member of staff denies sending a particular message. 

Which reliability aspect of information is in danger here? 

Options:

A.

availability 


B.

correctness 


C.

integrity


D.

confidentiality


Expert Solution
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions