The following are purposes of Information Security, except:
A. Ensure Business Continuity
B. Minimize Business Risk
C. Increase Business Assets
D. Maximize Return on Investment
What is the worst possible action that an employee may receive for sharing his or her password or access with others?
A. Forced roll off from the project
B. The lowest rating on his or her performance assessment
C. Three days suspension from work
D. Termination
How is the purpose of information security policy best described?
A. An information security policy documents the analysis of risks and the search for countermeasures.
B. An information security policy provides direction and support to the management regarding information security.
C. An information security policy makes the security plan concrete by providing it with the necessary details.
D. An information security policy provides insight into threats and the possible consequences.
Availability means
A. Service should be accessible at the required time and usable by all
B. Service should be accessible at the required time and usable only by the authorized entity
C. Service should not be accessible when required
Does the security have the right to ask you to display your ID badges and check your bags?
A. True
B. False
After a devastating office fire, all staff are moved to other branches of the company. At what moment in the incident management process is this measure effectuated?
A. Between incident and damage
B. Between detection and classification
C. Between recovery and normal operations
D. Between classification and escalation
What type of system ensures a coherent Information Security organisation?
A. Federal Information Security Management Act (FISMA)
B. Information Technology Service Management System (ITSM)
C. Information Security Management System (ISMS)
D. Information Exchange Data System (IEDS)
A planning process that introduced the concept of planning as a cycle that forms the basis for continuous improvement is called:
A. time based planning.
B. plan, do, check, act.
C. planning for continuous improvement.
D. RACI Matrix
What is the standard definition of ISMS?
A. Is an information security systematic approach to achieve business objectives for implementation, establishing, reviewing,operating and maintaining organization's reputation.
B. A company wide business objectives to achieve information security awareness for establishing, implementing, operating, monitoring, reviewing, maintaining and improving
C. A project-based approach to achieve business objectives for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organization's information security
D. A systematic approach for establishing, implementing,operating,monitoring, reviewing, maintaining and improving an organization's information security to achieve business objectives.
Which of the following is a preventive security measure?
A. Installing logging and monitoring software
B. Shutting down the Internet connection after an attack
C. Storing sensitive information in a data save
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GAQM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ISO27-13-001 exam preparations and GAQM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.