Who is responsible for Initial asset allocation to the user/custodian of the assets?
A. Asset Manager
B. Asset Owner
C. Asset Practitioner
D. Asset Stakeholder
What controls can you do to protect sensitive data in your computer when you go out for lunch?
A. You activate your favorite screen-saver
B. You are confident to leave your computer screen as is since a password protected screensaver is installed and it is set to activate after 10 minutes of inactivity
C. You lock your computer by pressing Windows+L or CTRL-ALT-DELETE and then click "Lock Computer".
D. You turn off the monitor
An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.
A. True
B. False
A decent visitor is roaming around without visitor's ID. As an employee you should do the following, except:
A. Say "hi" and offer coffee
B. Call the receptionist and inform about the visitor
C. Greet and ask him what is his business
D. Escort him to his destination
What is a reason for the classification of information?
A. To provide clear identification tags
B. To structure the information according to its sensitivity
C. Creating a manual describing the BYOD policy
Which of the following is not a type of Information Security attack?
A. Legal Incidents
B. Vehicular Incidents
C. Technical Vulnerabilities
D. Privacy Incidents
Which is the glue that ties the triad together?
A. Process
B. People
C. Collaboration
D. Technology
A fire breaks out in a branch office of a health insurance company. The personnel are transferred to neighboring branches to continue their work.
Where in the incident cycle is moving to a stand-by arrangements found?
A. between threat and incident
B. between recovery and threat
C. between damage and recovery
D. between incident and damage
Who is authorized to change the classification of a document?
A. The author of the document
B. The administrator of the document
C. The owner of the document
D. The manager of the owner of the document
Backup media is kept in the same secure area as the servers. What risk may the organisation be exposed to?
A. Unauthorised persons will have access to both the servers and backups
B. Responsibility for the backups is not defined well
C. After a fire, the information systems cannot be restored
D. After a server crash, it will take extra time to bring it back up again
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GAQM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ISO27-13-001 exam preparations and GAQM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.