Pass the GAQM GAQM: ISO ISO-ISMS-LA Questions and answers with CertsForce

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

Below is Purpose of "Integrity", which is one of the Basic Components of Information Security

Options:

A.

the property that information is not made available or disclosed to unauthorized individuals


B.

the property of safeguarding the accuracy and completeness of assets.


C.

the property that information is not made available or disclosed to unauthorized individuals


D.

the property of being accessible and usable upon demand by an authorized entity.


Expert Solution
Questions # 12:

A couple of years ago you started your company which has now grown from 1 to 20 employees. Your company’s information is worth more and more and gone are the days when you could keep control yourself. You are aware that you have to take measures, but what should they be? You hire a consultant who advises you to start with a qualitative risk analysis. 

What is a qualitative risk analysis? 

Options:

A.

This analysis follows a precise statistical probability calculation in order to calculate exact loss caused by damage. 


B.

This analysis is based on scenarios and situations and produces a subjective view of the possible threats.


Expert Solution
Questions # 13:

Four types of Data Classification (Choose two)

Options:

A.

Restricted Data, Confidential Data


B.

Project Data, Highly Confidential Data


C.

Financial Data, Highly Confidential Data


D.

Unrestricted Data, Highly Confidential Data


Expert Solution
Questions # 14:

You see a blue color sticker on certain physical assets. What does this signify?

Options:

A.

The asset is very high critical and its failure affects the entire organization


B.

The asset with blue stickers should be kept air conditioned at all times


C.

The asset is high critical and its failure will affect a group/s/project's work in the organization


D.

The asset is critical and the impact is restricted to an employee only


Expert Solution
Questions # 15:

Backup media is kept in the same secure area as the servers. What risk may the organisation be exposed to? 

Options:

A.

Unauthorised persons will have access to both the servers and backups 


B.

Responsibility for the backups is not defined well


C.

After a fire, the information systems cannot be restored


D.

After a server crash, it will take extra time to bring it back up again


Expert Solution
Questions # 16:

Information Security is a matter of building and maintaining ________ .

Options:

A.

Confidentiality


B.

Trust


C.

Protection


D.

Firewalls


Expert Solution
Questions # 17:

Which of the following is a technical security measure? 

Options:

A.

Encryption


B.

Security policy


C.

Safe storage of backups 


D.

User role profiles.


Expert Solution
Questions # 18:

What would be the reference for you to know who should have access to data/document?

Options:

A.

Data Classification Label


B.

Access Control List (ACL)


C.

Masterlist of Project Records (MLPR)


D.

Information Rights Management (IRM)


Expert Solution
Questions # 19:

After a fire has occurred, what repressive measure can be taken? 

Options:

A.

Extinguishing the fire after the fire alarm sounds 


B.

Buying in a proper fire insurance policy 


C.

Repairing all systems after the fire 


Expert Solution
Questions # 20:

What is the difference between a restricted and confidential document?

Options:

A.

Restricted - to be shared among an authorized group

Confidential - to be shared among named individuals


B.

Restricted - to be shared among named individuals 

Confidential - to be shared among an authorized group


C.

Restricted - to be shared among named individuals 

Confidential - to be shared across the organization only


D.

Restricted - to be shared among named individuals 

Confidential - to be shared with friends and family


Expert Solution
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions