Sample questions

Q1. An access violation is called:

  1. Data Encryption Standard
  2. Procedure
  3. Incident management
  4. Incident

Q2. A systematic and procedural way of managing incidents is known as:

  1. Configuration management
  2. Incident management
  3. Change management
  4. System management

Q3. If an event could possibly violate information security, then such an event is known as:

  1. Problem
  2. Confidentiality breach
  3. Incident
  4. Integrity breach

Q4. A full test in a disaster recovery testing is called:

  1. A functional drill
  2. Simulation test
  3. Emulates real emergency or disaster scenario
  4. All of the above

Q5. Providing wrong inputs to the system can be classified as:

  1. Problem
  2. Vulnerability
  3. Incident
  4. Threat

Q6. A periodical mock test rehearsing the steps of actions to be taken during an emergency is also known as:

  1. Table top review
  2. Evacuation drills
  3. Fire fighting
  4. Shutdown of systems

Q7. Which of the following can be classified as an incident?

Sample questions

Q8. Which one of the following disaster-recovery tests is also called a functional drill?

  1. Checklist review
  2. Table top exercise
  3. Simulation test
  4. Parallel test
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.119.28.108