You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called
A. Shoulder Surfing
B. Mountaineering
C. Phishing
D. Spoofing
Information has a number of reliability aspects. Reliability is constantly being threatened. Examples of threats are: a cable becomes loose, someone alters information by accident, data is used privately or is falsified.
Which of these examples is a threat to integrity?
A. a loose cable
B. accidental alteration of data
C. private use of data
D. System restart
There was a fire in a branch of the company Midwest Insurance. The fire department quickly arrived at the scene and could extinguish the fire before it spread and burned down the entire premises. The server, however, was destroyed in the fire. The backup tapes kept in another room had melted and many other documents were lost for good.
What is an example of the indirect damage caused by this fire?
A. Melted backup tapes
B. Burned computer systems
C. Burned documents
D. Water damage due to the fire extinguishers
Which is not a requirement of HR prior to hiring?
A. Undergo background verification
B. Applicant must complete pre-employment documentation requirements
C. Must undergo Awareness training on information security.
D. Must successfully pass Background Investigation
A couple of years ago you started your company which has now grown from 1 to 20 employees. Your company's information is worth more and more and gone are the days when you could keep control yourself. You are aware that you have to take measures, but what should they be? You hire a consultant who advises you to start with a qualitative risk analysis.
What is a qualitative risk analysis?
A. This analysis follows a precise statistical probability calculation in order to calculate exact loss caused by damage.
B. This analysis is based on scenarios and situations and produces a subjective view of the possible threats.
What is a repressive measure in case of a fire?
A. Taking out a fire insurance
B. Putting out a fire after it has been detected by a fire detector
C. Repairing damage caused by the fire
Below is Purpose of "Integrity", which is one of the Basic Components of Information Security
A. the property that information is not made available or disclosed to unauthorized individuals
B. the property of safeguarding the accuracy and completeness of assets.
C. the property that information is not made available or disclosed to unauthorized individuals
D. the property of being accessible and usable upon demand by an authorized entity.
Does the security have the right to ask you to display your ID badges and check your bags?
A. True
B. False
You work in the office of a large company. You receive a call from a person claiming to be from the Helpdesk. He asks you for your password. What kind of threat is this?
A. Natural threat
B. Organizational threat
C. Social Engineering
D. Arason
A hacker gains access to a web server and reads the credit card numbers stored on that server. Which security principle is violated?
A. Availability
B. Confidentiality
C. Integrity
D. Authenticity
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only PECB exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ISO-IEC-27001-LEAD-AUDITOR exam preparations and PECB certification application, do not hesitate to visit our Vcedump.com to find your solutions here.