What is the relationship between data and information?
A. Data is structured information.
B. Information is the meaning and value assigned to a collection of data.
Which measure is a preventive measure?
A. Installing a logging system that enables changes in a system to be recognized
B. Shutting down all internet traffic after a hacker has gained access to the company systems
C. Putting sensitive information in a safe
What is a definition of compliance?
A. Laws, considered collectively or the process of making or enacting laws
B. The state or fact of according with or meeting rules or standards
C. An official or authoritative instruction
D. A rule or directive made and maintained by an authority.
Which threat could occur if no physical measures are taken?
A. Unauthorised persons viewing sensitive files
B. Confidential prints being left on the printer
C. A server shutting down because of overheating
D. Hackers entering the corporate network
In which order is an Information Security Management System set up?
A. Implementation, operation, maintenance, establishment
B. Implementation, operation, improvement, maintenance
C. Establishment, implementation, operation, maintenance
D. Establishment, operation, monitoring, improvement
A scenario wherein the city or location where the building(s) reside is / are not accessible.
A. Component
B. Facility
C. City
D. Country
You work in the office of a large company. You receive a call from a person claiming to be from the Helpdesk. He asks you for your password.
What kind of threat is this?
A. Natural threat
B. Organizational threat
C. Social Engineering
D. Arason
Cabling Security is associated with Power, telecommunication and network cabling carrying information are protected from interception and damage.
A. True
B. False
Information Security is a matter of building and maintaining ________ .
A. Confidentiality
B. Trust
C. Protection
D. Firewalls
What is the purpose of an Information Security policy?
A. An information security policy makes the security plan concrete by providing the necessary details
B. An information security policy provides insight into threats and the possible consequences
C. An information security policy provides direction and support to the management regarding information security
D. An information security policy documents the analysis of risks and the search for countermeasures
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GAQM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ISO27-13-001 exam preparations and GAQM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.