What would be the reference for you to know who should have access to data/document?
A. Data Classification Label
B. Masterlist of Project Records (MLPR)
C. Information Rights Management (IRM)
D. Access Control List (ACL)
正解:D
質問 2:
A planning process that introduced the concept of planning as a cycle that forms the basis for continuous improvement is called:
A. plan, do, check, act.
B. time based planning.
C. RACI Matrix
D. planning for continuous improvement.
正解:A
質問 3:
There is a network printer in the hallway of the company where you work. Many employees don't pick up their printouts immediately and leave them on the printer.
What are the consequences of this to the reliability of the information?
A. The Security of the information is no longer guaranteed.
B. The availability of the information is no longer guaranteed.
C. The integrity of the information is no longer guaranteed.
D. The confidentiality of the information is no longer guaranteed.
正解:B
質問 4:
The computer room is protected by a pass reader. Only the System Management department has a pass.
What type of security measure is this?
A. a physical security measure
B. a repressive security measure
C. a corrective security measure
D. a logical security measure
正解:A
質問 5:
After a devastating office fire, all staff are moved to other branches of the company. At what moment in the incident management process is this measure effectuated?
A. Between recovery and normal operations
B. Between classification and escalation
C. Between detection and classification
D. Between incident and damage
正解:D
質問 6:
What is an example of a human threat?
A. thunderstrom
B. a lightning strike
C. fire
D. phishing
正解:D
質問 7:
Four types of Data Classification (Choose two)
A. Project Data, Highly Confidential Data
B. Financial Data, Highly Confidential Data
C. Unrestricted Data, Highly Confidential Data
D. Restricted Data, Confidential Data
正解:C,D
質問 8:
What is the purpose of an Information Security policy?
A. An information security policy makes the security plan concrete by providing the necessary details
B. An information security policy provides direction and support to the management regarding information security
C. An information security policy provides insight into threats and the possible consequences
D. An information security policy documents the analysis of risks and the search for countermeasures
正解:B
Mizusawa -
内容が分かり易いのはもちろん、苦手克服や直前対策に役立ちます。ISO-ISMS-LAにみごと合格いたしました