The following are purposes of Information Security, except:
All are prohibited in acceptable use of information assets, except:
The computer room is protected by a pass reader. Only the System Management department has a pass.
What type of security measure is this?
A fire breaks out in a branch office of a health insurance company. The personnel are transferred to neighboring branches to continue their work.
Where in the incident cycle is moving to a stand-by arrangements found?
A member of staff denies sending a particular message.
Which reliability aspect of information is in danger here?
A planning process that introduced the concept of planning as a cycle that forms the basis for continuous improvement is called:
Which of the following is a possible event that can have a disruptive effect on the reliability of information?
Which is not a requirement of HR prior to hiring?
You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called
In what part of the process to grant access to a system does the user present a token?