Four types of Data Classification (Choose two)
A. Restricted Data, Confidential Data
B. Project Data, Highly Confidential Data
C. Financial Data, Highly Confidential Data
D. Unrestricted Data, Highly Confidential Data
What is the name of the system that guarantees the coherence of information security in the organization?
A. Information Security Management System (ISMS)
B. Rootkit
C. Security regulations for special information for the government
D. Information Technology Service Management (ITSM)
Which of the following is a preventive security measure?
A. Installing logging and monitoring software
B. Shutting down the Internet connection after an attack
C. Storing sensitive information in a data save
Below is Purpose of "Integrity", which is one of the Basic Components of Information Security
A. the property that information is not made available or disclosed to unauthorized individuals
B. the property of safeguarding the accuracy and completeness of assets.
C. the property that information is not made available or disclosed to unauthorized individuals
D. the property of being accessible and usable upon demand by an authorized entity.
You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called
A. Shoulder Surfing
B. Mountaineering
C. Phishing
D. Spoofing
Stages of Information
A. creation, evolution, maintenance, use, disposition
B. creation, use, disposition, maintenance, evolution
C. creation, distribution, use, maintenance, disposition
D. creation, distribution, maintenance, disposition, use
Changes on project-managed applications or database should undergo the change control process as documented.
A. True
B. False
You see a blue color sticker on certain physical assets. What does this signify?
A. The asset is very high critical and its failure affects the entire organization
B. The asset with blue stickers should be kept air conditioned at all times
C. The asset is high critical and its failure will affect a group/s/project's work in the organization
D. The asset is critical and the impact is restricted to an employee only
A fire breaks out in a branch office of a health insurance company. The personnel are transferred to neighboring branches to continue their work.
Where in the incident cycle is moving to a stand-by arrangements found?
A. between threat and incident
B. between recovery and threat
C. between damage and recovery
D. between incident and damage
Which threat could occur if no physical measures are taken?
A. Unauthorised persons viewing sensitive files
B. Confidential prints being left on the printer
C. A server shutting down because of overheating
D. Hackers entering the corporate network
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GAQM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ISO-ISMS-LA exam preparations and GAQM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.