Which of the following does an Asset Register contain? (Choose two)
A. Asset Type
B. Asset Owner
C. Asset Modifier
D. Process ID
Integrity of data means
A. Accuracy and completeness of the data
B. Data should be viewable at all times
C. Data should be accessed by only the right people
In the event of an Information security incident, system users' roles and responsibilities are to be observed, except:
A. Report suspected or known incidents upon discovery through the Servicedesk
B. Preserve evidence if necessary
C. Cooperate with investigative personnel during investigation if needed
D. Make the information security incident details known to all employees
In acceptable use of Information Assets, which is the best practice?
A. Access to information and communication systems are provided for business purpose only
B. Interfering with or denying service to any user other than the employee's host
C. Playing any computer games during office hours
D. Accessing phone or network transmissions, including wireless or wifi transmissions
Which department maintain's contacts with law enforcement authorities, regulatory bodies, information service providers and telecommunications service providers depending on the service required.
A. COO
B. CISO
C. CSM
D. MRO
We can leave laptops during weekdays or weekends in locked bins.
A. True
B. False
An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.
A. True
B. False
Someone from a large tech company calls you on behalf of your company to check the health of your PC, and therefore needs your user-id and password. What type of threat is this?
A. Social engineering threat
B. Organisational threat
C. Technical threat
D. Malware threat
Changes to the information processing facilities shall be done in controlled manner.
A. True
B. False
You are the lead auditor of the courier company SpeeDelivery. You have carried out a risk analysis and now want to determine your risk strategy. You decide to take measures for the large risks but not for the small risks.
What is this risk strategy called?
A. Risk bearing
B. Risk avoidance
C. Risk neutral
D. Risk skipping
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GAQM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ISO27-13-001 exam preparations and GAQM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.