Question: A malware released into the system causing machines in financial department to be locked.
This event should be covered in:
a. Damage Assessment
b. Business Continuity Planning
c. Incident Response Planning
d. Disaster Response Planning
Solution: Disaster Response Planning
Question: Register the guest at the reception counter
Escort the guest to their designated meeting area
Leave the guest only if they are received by another employee at the meeting area.
This is an example of:
a. Standard
b. Guideline
c. Policy
d. Procedure
Solution: Procedure
Question: Only registered guest will be allowed access into the premise
This is an example of:
Select one:
a. Guideline
b. Standard
c. Procedure
d. Policy
Solution: Policy
Question: All critical department computers should always be backed up regularly to another site.
This event should be included in the:
Select one:
a. Disaster Recovery Planning
b. Incident Response Planning
c. Business Continuity Planning
d. Damage Assessment
Solution: Business Continuity Planning
Question: An employee accidentally clicked on a phishing link causing his machine to be locked by ransomware.
This event should be covered in:
Select one:
a. Disaster Response Planning
b. Damage Assessment
c. Business Continuity Planning
d. Incident Response Planning
Solution: Incident Response Planning
Question: Guest(s) will be given keycard to enter only the location that they have registered to.
Guest(s) entering the premise must always be escorted by an employee.
This is an example of:
Select one:
a. Standard
b. Procedure
c. Guideline
d. Policy
Solution: Standard
Question: Employer will be able to indicate employee's awareness and behavior of a certain security policy by the following method EXCEPT
Select one:
a. Putting up posters and leaflet around the workplace
b. Reviewing comments and feedback from the clients
c. Observation based on weekly walkabouts around the workplace
d. Employee engagement
Solution: Putting up posters and leaflet around the workplace
Question: Employee log files should be saved, stored and documented.
The event is related to:
Select one:
a. Business Continuity Planning
b. Damage Assessment
c. Disaster Recovery Planning
d. Incident Response Planning
Solution: Damage Assessment
Question: Policy should be easy to understand and contain less technical jargon because:
Select one:
a. People are basically ignorant and selfish
b. People comes from all walks of life and background
c. Employees and clients are not paid to follow technical policy
d. The employer needs to train them harder if it is too technical
Solution: People comes from all walks of life and background
Question: The following could be a successful awareness program approach EXCEPT:
Select one:
a. Highlight the achievement and success related to compliance
b. Produce and distribute easy to understand content over a planned timeline
c. Have a specific target group and a more customize the content
d. Focuses on spanned groups that could understand technical details
Solution: Focuses on spanned groups that could understand technical details
No comments:
Post a Comment