Pass the GAQM GAQM: ISO ISO-ISMS-LA Questions and answers with CertsForce

Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions
Questions # 21:

What type of measure involves the stopping of possible consequences of security incidents?

Options:

A.

Corrective


B.

Detective


C.

Repressive 


D.

Preventive


Expert Solution
Questions # 22:

A fire breaks out in a branch office of a health insurance company. The personnel are transferred to neighboring branches to continue their work. 

Where in the incident cycle is moving to a stand-by arrangements found? 

Options:

A.

between threat and incident


B.

between recovery and threat 


C.

between damage and recovery


D.

between incident and damage


Expert Solution
Questions # 23:

In order to take out a fire insurance policy, an administration office must determine the value of the data that it manages. 

Which factor is [b]not[/b] important for determining the value of data for an organization?

Options:

A.

The content of data.


B.

The degree to which missing, incomplete or incorrect data can be recovered.


C.

The indispensability of data for the business processes.


D.

The importance of the business processes that make use of the data. 


Expert Solution
Questions # 24:

What controls can you do to protect sensitive data in your computer when you go out for lunch?

Options:

A.

You activate your favorite screen-saver


B.

You are confident to leave your computer screen as is since a password protected screensaver is installed and it is set to activate after 10 minutes of inactivity


C.

You lock your computer by pressing Windows+L or CTRL-ALT-DELETE and then click "Lock Computer".


D.

You turn off the monitor


Expert Solution
Questions # 25:

Which is not a requirement of HR prior to hiring?

Options:

A.

Undergo background verification


B.

Applicant must complete pre-employment documentation requirements


C.

Must undergo Awareness training on information security.


D.

Must successfully pass Background Investigation


Expert Solution
Questions # 26:

A hacker gains access to a webserver and can view a file on the server containing credit card numbers. 

Which of the Confidentiality, Integrity, Availability (CIA) principles of the credit card file are violated? 

Options:

A.

Availability 


B.

Confidentiality


C.

Integrity


D.

Compliance


Expert Solution
Questions # 27:

Which of the following is an information security management system standard published by the International Organization for Standardization?

Options:

A.

ISO9008


B.

ISO27001


C.

ISO5501


D.

ISO22301


Expert Solution
Questions # 28:

The following are the guidelines to protect your password, except: 

Options:

A.

Don't use the same password for various company system security access


B.

Do not share passwords with anyone


C.

For easy recall, use the same password for company and personal accounts


D.

Change a temporary password on first log-on


Expert Solution
Questions # 29:

Which of the following is not a type of Information Security attack?

Options:

A.

Legal Incidents


B.

Vehicular Incidents


C.

Technical Vulnerabilities


D.

Privacy Incidents


Expert Solution
Questions # 30:

Changes on project-managed applications or database should undergo the change control process as documented.

Options:

A.

True


B.

False


Expert Solution
Viewing page 3 out of 3 pages
Viewing questions 21-30 out of questions