Professional Documents
Culture Documents
A.
Blocking somebody's entry through the access door
B.
Going behind somebody through the access doors without
using own access card
C.
Opening an access door with your own access card
Availability means
A.
Service should be accessible at the required time and
usable by all
B.
Service should be accessible at the required time and
usable only by the authorized entity
C.
Service should not be accessible when required
Explanation
Availability means the property of being accessible and usable upon
demand by the authorized entity. Like Melange should be
accessible at all times to MGL employees only.
We shall
Manage efficiently, the confidentiality and
integrity of organizational and customer's
information assets
Ensure business continuity in the event of
any security incident, with minimal business
impact
Continually improve our processes to
enhance information security
A.
Environmental Policy
B.
Quality Policy
C.
Information Security Policy
What quality system standard has been adopted
for implementing the ISMS quality system?
A.
ISO9001:2008
B.
ISO27001:2005
C.
ISO14001:2004
D.
BS7799
E.
TL9000:2000
A.
a piece of code that is capable of copying itself and typically
has a detrimental effect, such as corrupting the system or
destroying data.
B.
a standalone malware computer program that replicates
itself in order to spread to other computers. Often, it uses a
computer network to spread itself, relying on security
failures on the target computer to access it. It does not need
to attach itself to an existing program.
C.
a program designed to breach the security of a computer
system while ostensibly performing some innocuous
function.
D.
a network of private computers infected with malicious
software and controlled as a group without the owners'
knowledge, e.g., to send spam messages.
Explanation
Answer 1 - This is a computer virus
Answer 2 - This is a computer worm
Answer 3 - This is a trojan horse
Answer 4 - This is a botnet
http://www.proprofs.com/quiz-
school/quizshow.php?title=Security-Mock-Exam-Questions-
set-2&q=24&next=y