An employee is about to lose his job and decides to delete as many documents as possible from the network storage server.
In which main threat category does this threat belong?
A. Disgruntled employee
B. Intentional human threat
C. Social engineering
正解:B
質問 2:
We can acquire and supply information in various ways. The value of the information depends on whether it is reliable. What are the reliability aspects of information?
A. Availability, Information Value and Confidentiality
B. Availability, Integrity and Confidentiality
C. Timeliness, Accuracy and Completeness
D. Availability, Integrity and Completeness
正解:B
質問 3:
The act of taking organizational security measures is inextricably linked with all other measures that have to be taken. What is the name of the system that guarantees the coherence of information security in the organization?
A. Rootkit
B. Information Security Management System (ISMS)
C. Security regulations for special information for the government
正解:B
質問 4:
There are three types of "human threats".
The threat that a user accidentally deletes a document belongs to which category?
A. Intentional human threats
B. Unintentional human threats
C. Acts of stupidity
D. Social engineering
正解:B
質問 5:
What is the best way to comply with legislation and regulations for personal data protection?
A. Appointing the responsibility to someone
B. Performing a threat analysis
C. Performing a vulnerability analysis
D. Maintaining an incident register
正解:A
質問 6:
Which threat can materialize as a result of the absence of physical security?
A. A worm infects several servers due to insufficient port filtering.
B. Systems malfunction due to spikes in the power supply.
C. Software stops working because the license has expired.
D. A USB stick with confidential information is lost by an employee.
正解:B
質問 7:
You are the first to arrive at work in the morning and notice that the CD ROM on which you saved contracts yesterday has disappeared. You were the last to leave yesterday. When should you report this information security incident?
A. You should first investigate this incident yourself and try to limit the damage.
B. This incident should be reported immediately.
C. You should wait a few days before reporting this incident. The CD ROM can still reappear and, in that case, you will have made a fuss for nothing.
正解:B
質問 8:
A hacker gains access to a webserver and deletes a file on the server containing credit card numbers.
Which of the Confidentiality, Integrity, Availability (CIA) principles of the credit card file are violated?
A. Confidentiality
B. Integrity
C. Availability
正解:C
質問 9:
Someone sends an e-mail. The sender wants the recipient to be able to verify who wrote and sent the email.
What does the sender attach to the email?
A. A PKI certificate
B. Her public key
C. A digital signature
D. Her private key
正解:C
原レ** -
EX0-105試験のテキストですが、これが実に解り易い。図が多く、イメージをつかみやすい