You receive the following mail from the IT support team: Dear User,Starting next week, we will be deleting all inactive email accounts in order to create spaceshare the below details in order to continue using your account. In case of no response,
Name:
Email ID:
Password:
DOB:
Kindly contact the webmail team for any further support. Thanks for your attention.
Which of the following is the best response?
Changes to the information processing facilities shall be done in controlled manner.
Backup media is kept in the same secure area as the servers. What risk may the organisation be exposed to?
Which measure is a preventive measure?
The following are definitions of Information, except:
Why do we need to test a disaster recovery plan regularly, and keep it up to date?
Which of the following is an information security management system standard published by the International Organization for Standardization?
Who is responsible for Initial asset allocation to the user/custodian of the assets?
The computer room is protected by a pass reader. Only the System Management department has a pass.
What type of security measure is this?
You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called
What is an example of a human threat?
Below is Purpose of "Integrity", which is one of the Basic Components of Information Security
Information has a number of reliability aspects. Reliability is constantly being threatened. Examples of threats are: a cable becomes loose, someone alters information by accident, data is used privately or is falsified.
Which of these examples is a threat to integrity?
Which department maintain's contacts with law enforcement authorities, regulatory bodies, information service providers and telecommunications service providers depending on the service required.
There is a scheduled fire drill in your facility. What should you do?