Mark works as a System Administrator for uCertify Inc. He has recently installed freeware software from the Internet. He finds that the software displays some advertisements in a corner of the window. He notices that even when he is not downloading anything from the web, downloads are still increasing very frequently, despite the fact he is not using any web browser or Internet applications. After doing some research, Mark finds that the new software is downloading these files. Which of the following types of programs has Mark installed on his computer?
Which of the following statements are true about Regulation of Investigatory Powers Act 2000?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following best describes the identification, analysis, and ranking of risks?
Gary is the project manager for his organization. He is working with the project stakeholders on the project requirements and how risks may affect their project. One of the stakeholders is confused about what constitutes risks in the project. Which of the following is the most accurate definition of a project risk?
Which of the following groupings is correct regarding security measures?
Andrew is the CEO of uCertify Inc. He wants to improve the resources and revenue of the company. He uses the PDCA methodology to accomplish the task. Which of the following are the phases of the PDCA methodology?
Each correct answer represents a complete solution. Choose all that apply.
You work as a Security Administrator for uCertify Inc. You have made a plan to increase the security of the organization and you want to show this to the CEO of the organization. But, you do not want to share this information with others. Therefore, you want to classify this information.
Which of the following will be the suitable classification to accomplish the task?
The guidelines that are defined in the ISO/IEC 27002:2005 standard deal with which of the following aspects of information security?
Each correct answer represents a complete solution. Choose all that apply.
Which of the following persons is responsible for testing and verifying whether the security policy is properly implemented, and the derived security solutions are adequate or not?
Which of the following are elements of an information security policy document?
Each correct answer represents a complete solution. Choose all that apply.