What is the best way to comply with legislation and regulations for personal data protection?
What is a human threat to the reliability of the information on your company website?
Which type of malware builds a network of contaminated computers?
My user profile specifies which network drives I can read and write to. What is the name of the
type of logical access management wherein my access and rights are determined centrally?
A non-human threat for computer systems is a flood. In which situation is a flood always a
relevant threat?
Which one of the threats listed below can occur as a result of the absence of a physical measure?
What is the objective of classifying information?
What do employees need to know to report a security incident?
You read in the newspapers that the ex-employee of a large company systematically deleted files
out of revenge on his manager. Recovering these files caused great losses in time and money.
What is this kind of threat called?
Which of the following measures is a preventive measure?
What is the goal of an organization's security policy?
The act of taking organizational security measures is inextricably linked with all other measures
that have to be taken. What is the name of the system that guarantees the coherence of
information security in the organization?