What type of compliancy standard, regulation or legislation provides a code of practice for information security?
A. ISO/IEC 27002
B. Personal data protection act
C. Computer criminality act
D. IT Service Management
An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.
A. True
B. False
Which reliability aspect of information is compromised when a staff member denies having sent a message?
A. Confidentiality
B. Integrity
C. Availability
D. Correctness
A property of Information that has the ability to prove occurrence of a claimed event.
A. Electronic chain letters
B. Integrity
C. Availability
D. Accessibility
What is an example of a human threat?
A. a lightning strike
B. fire
C. phishing
D. thunderstrom
CMM stands for?
A. Capability Maturity Matrix
B. Capacity Maturity Matrix
C. Capability Maturity Model
D. Capable Mature Model
Who are allowed to access highly confidential files?
A. Employees with a business need-to-know
B. Contractors with a business need-to-know
C. Employees with signed NDA have a business need-to-know
D. Non-employees designated with approved access and have signed NDA
How are data and information related?
A. Data is a collection of structured and unstructured information
B. Information consists of facts and statistics collected together for reference or analysis
C. When meaning and value are assigned to data, it becomes information
You see a blue color sticker on certain physical assets. What does this signify?
A. The asset is very high critical and its failure affects the entire organization
B. The asset with blue stickers should be kept air conditioned at all times
C. The asset is high critical and its failure will affect a group/s/project's work in the organization
D. The asset is critical and the impact is restricted to an employee only
A well-executed risk analysis provides a great deal of useful information. A risk analysis has four main objectives.
What is not one of the four main objectives of a risk analysis?
A. Identifying assets and their value
B. Implementing counter measures
C. Establishing a balance between the costs of an incident and the costs of a security measure
D. Determining relevant vulnerabilities and threats
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GAQM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ISO27-13-001 exam preparations and GAQM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.