Cabling Security is associated with Power, telecommunication and network cabling carrying information are protected from interception and damage.
A. True
B. False
What controls can you do to protect sensitive data in your computer when you go out for lunch?
A. You activate your favorite screen-saver
B. You are confident to leave your computer screen as is since a password protected screensaver is installed and it is set to activate after 10 minutes of inactivity
C. You lock your computer by pressing Windows+L or CTRL-ALT-DELETE and then click "Lock Computer".
D. You turn off the monitor
Changes to the information processing facilities shall be done in controlled manner.
A. True
B. False
Someone from a large tech company calls you on behalf of your company to check the health of your PC, and therefore needs your user-id and password. What type of threat is this?
A. Social engineering threat
B. Organisational threat
C. Technical threat
D. Malware threat
__________ is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.
A. Trojan
B. Operating System
C. Virus
D. Malware
Who are allowed to access highly confidential files?
A. Employees with a business need-to-know
B. Contractors with a business need-to-know
C. Employees with signed NDA have a business need-to-know
D. Non-employees designated with approved access and have signed NDA
An administration office is going to determine the dangers to which it is exposed.
What do we call a possible event that can have a disruptive effect on the reliability of information?
A. dependency
B. threat
C. vulnerability
D. risk
Implement plan on a test basis - this comes under which section of PDCA
A. Plan
B. Do
C. Act
D. Check
What is an example of a human threat?
A. a lightning strike
B. fire
C. phishing
D. thunderstrom
How are data and information related?
A. Data is a collection of structured and unstructured information
B. Information consists of facts and statistics collected together for reference or analysis
C. When meaning and value are assigned to data, it becomes information
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GAQM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ISO-ISMS-LA exam preparations and GAQM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.