Which of the following is not a type of Information Security attack?
A. Legal Incidents
B. Vehicular Incidents
C. Technical Vulnerabilities
D. Privacy Incidents
In the event of an Information security incident, system users' roles and responsibilities are to be observed, except:
A. Report suspected or known incidents upon discovery through the Servicedesk
B. Preserve evidence if necessary
C. Cooperate with investigative personnel during investigation if needed
D. Make the information security incident details known to all employees
What is the difference between a restricted and confidential document?
A. Restricted - to be shared among an authorized group Confidential - to be shared among named individuals
B. Restricted - to be shared among named individuals Confidential - to be shared among an authorized group
C. Restricted - to be shared among named individuals Confidential - to be shared across the organization only
D. Restricted - to be shared among named individuals Confidential - to be shared with friends and family
Who is authorized to change the classification of a document?
A. The author of the document
B. The administrator of the document
C. The owner of the document
D. The manager of the owner of the document
What is the standard definition of ISMS?
A. Is an information security systematic approach to achieve business objectives for implementation, establishing, reviewing,operating and maintaining organization's reputation.
B. A company wide business objectives to achieve information security awareness for establishing, implementing, operating, monitoring, reviewing, maintaining and improving
C. A project-based approach to achieve business objectives for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organization's information security
D. A systematic approach for establishing, implementing, operating,monitoring, reviewing, maintaining and improving an organization's information security to achieve business objectives.
As a new member of the IT department you have noticed that confidential information has been leaked several times. This may damage the reputation of the company. You have been asked to propose an organisational measure to protect laptop computers. What is the first step in a structured approach to come up with this measure?
A. Appoint security staff
B. Encrypt all sensitive information
C. Formulate a policy
D. Set up an access control procedure
Which is not a requirement of HR prior to hiring?
A. Undergo background verification
B. Applicant must complete pre-employment documentation requirements
C. Must undergo Awareness training on information security.
D. Must successfully pass Background Investigation
The following are the guidelines to protect your password, except:
A. Don't use the same password for various company system security access
B. Do not share passwords with anyone
C. For easy recall, use the same password for company and personal accounts
D. Change a temporary password on first log-on
What type of system ensures a coherent Information Security organisation?
A. Federal Information Security Management Act (FISMA)
B. Information Technology Service Management System (ITSM)
C. Information Security Management System (ISMS)
D. Information Exchange Data System (IEDS)
The computer room is protected by a pass reader. Only the System Management department has a pass. What type of security measure is this?
A. a corrective security measure
B. a physical security measure
C. a logical security measure
D. a repressive security measure
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GAQM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ISO-ISMS-LA exam preparations and GAQM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.