There is a network printer in the hallway of the company where you work. Many employees don't pick up their printouts immediately and leave them on the printer.
What are the consequences of this to the reliability of the information?
A. The integrity of the information is no longer guaranteed.
B. The availability of the information is no longer guaranteed.
C. The confidentiality of the information is no longer guaranteed.
D. The Security of the information is no longer guaranteed.
Often, people do not pick up their prints from a shared printer. How can this affect the confidentiality of information?
A. Confidentiality cannot be guaranteed
B. Integrity cannot be guaranteed
C. Authenticity cannot be guaranteed
D. Availability cannot be guaranteed
CEO sends a mail giving his views on the status of the company and the company's future strategy and the CEO's vision and the employee's part in it. The mail should be classified as:
A. Internal Mail
B. Public Mail
C. Confidential Mail
D. Restricted Mail
What is an example of a human threat?
A. a lightning strike
B. fire
C. phishing
D. thunderstrom
Who are allowed to access highly confidential files?
A. Employees with a business need-to-know
B. Contractors with a business need-to-know
C. Employees with signed NDA have a business need-to-know
D. Non-employees designated with approved access and have signed NDA
In which order is an Information Security Management System set up?
A. Implementation, operation, maintenance, establishment
B. Implementation, operation, improvement, maintenance
C. Establishment, implementation, operation, maintenance
D. Establishment, operation, monitoring, improvement
You receive the following mail from the IT support team: Dear User,Starting next week, we will be deleting all inactive email accounts in order to create spaceshare the below details in order to continue using your account. In case of no
response,
Name:
Email ID:
Password:
DOB:
Kindly contact the webmail team for any further support. Thanks for your attention.
Which of the following is the best response?
A. Ignore the email
B. Respond it by saying that one should not share the password with anyone
C. One should not respond to these mails and report such email to your supervisor
-------------------------is an asset like other important business assets has value to an organization and consequently needs to be protected.
A. Infrastructure
B. Data
C. Information
D. Security
Who is responsible for Initial asset allocation to the user/custodian of the assets?
A. Asset Manager
B. Asset Owner
C. Asset Practitioner
D. Asset Stakeholder
Which reliability aspect of information is compromised when a staff member denies having sent a message?
A. Confidentiality
B. Integrity
C. Availability
D. Correctness
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only PECB exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ISO-IEC-27001-LEAD-AUDITOR exam preparations and PECB certification application, do not hesitate to visit our Vcedump.com to find your solutions here.