Sample questions

Q1. During a periodical review of information security controls and their effectiveness in a corporation,  that a file was found to be containing privacy-related data in a publicly accessible location. Which one of the following is ultimately responsible for such a security violation?

  1. Data user
  2. Data custodian
  3. Data owner
  4. Data auditor

Q2. ______ is a cryptographic method in which plain text is scrambled to form a scrambled text that is not directly readable without unscrambling.

  1. Hashing
  2. Transposition
  3. Transformation
  4. Encryption

Q3. Which one of the following is a malicious threat?

  1. Software weakness
  2. Wrong configuration
  3. Botnet
  4. Weak encryption

Q4. Which one of the following is a Recovery Time Objective (RTO)?

  1. Recovery of data that was processed up to last week
  2. Recovery of statistical data for the past 12 months
  3. Recovery of IT Systems within 4 hours
  4. Recovery of people in the event of disaster

Q5. Which of the following represents Data in use? Drag and drop the correct examples to the red box.

Sample questions

Q6. ________ is a type of cybercrime wherein an unsuspecting user is lured by way of emails or pop-up messages to visit attacker-constructed malicious websites.

  1. Farming
  2. Framing
  3. Mishing
  4. Phishing

Q7. A corporation establishes security policies and procedures based on proper risk assessment and compliance requirements. Such an activity is called______.

  1. Risk management
  2. Risk mitigation strategy
  3. Due diligence
  4. Due care

Q8. Which of the following information classifications mandates the need to know principle?

  1. Confidential
  2. Sensitive
  3. Public Trust
  4. Non-Public

Q9. A cyber attack is perpetrated against a corporate network with the intention of destabilizing the systems and gaining competitive advantage. Such an attack can be referred as______.

  1. Cyberterrorism
  2. Cyber bullying
  3. Cyber stalking
  4. Denial of Service

Q10. Which one of the following is not a best security practice?

Sample questions
..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
18.119.103.204