COMPLETE SOLUTIONS VERIFIED LATEST UPDATE
When choosing a technical product to protect classified information it is BEST to
select one which has been
Evaluated against the Common Criteria
If an Email message is NOT from the sender it claims to be from, this is known as
Repudiating
A Hash may be defined as
A message digest calculated from a set of data
Why should security incidents be reported as quickly as possible
To limit damage or loss
Bob needs to send an email to Alice and be confident that it will arrive unaltered.
Alice needs to ensure that the email has come from Bob. Which would be used?
Bobs Private Key
A Trojan Horse is
Code which is maliciously introduced into executable code
Which of the following would be a principle element of the BCP process?
Identification and Prioritisation of critical business processes
When implementing Information Security Standards, it is crucial to gain support
from whom?
Senior Executives
, When would there be a requirement to report a security incident to law
enforcement agencies?
When local legislation determines it as a requirement
Bob, an employee has developed an application during company working hours,
which is relevant to the business but not directly related to Bobs employment.
Who owns the intellectual property rights?
The Employer
Which of the following is most likely to cause a threat to be treated with a higher
priority?
Business Impact Analysis
In order to gain access to a computer operating system, the computer system
must
Request a User ID and Password to enable logon rights
System Security Test and Evaluation Plans SHOULD be set out by
Information Security Team, System Developers and relevant Operational Staff
Why would a document be classified as Top Secret? (Choose all that apply)
So that users understand the level of Confidentiality
So that users understand how to use the document
So that Users understand how to dispose of the document
Phishing is an attempt to collect personal data by using which primary means?
Email Systems
Privileged User Rights to a computer system should be made available to:
Authorised personnel on a needs basis