Which reliability aspect of information is compromised when a staff member denies having sent a message?
A. Confidentiality
B. Correctness
C. Integrity
D. Availability
正解:C
質問 2:
A hacker gains access to a webserver and can view a file on the server containing credit card numbers.
Which of the Confidentiality, Integrity, Availability (CIA) principles of the credit card file are violated?
A. Compliance
B. Confidentiality
C. Integrity
D. Availability
正解:B
質問 3:
You receive the following mail from the IT support team: Dear User,Starting next week, we will be deleting all inactive email accounts in order to create spaceshare the below details in order to continue using your account. In case of no response, Name:
Email ID:
Password:
DOB:
Kindly contact the webmail team for any further support. Thanks for your attention.
Which of the following is the best response?
A. One should not respond to these mails and report such email to your supervisor
B. Respond it by saying that one should not share the password with anyone
C. Ignore the email
正解:A
質問 4:
Why do we need to test a disaster recovery plan regularly, and keep it up to date?
A. Otherwise the measures taken and the incident procedures planned may not be adequate
B. Otherwise remotely stored backups may no longer be available to the security team
C. Otherwise it is no longer up to date with the registration of daily occurring faults
正解:A
質問 5:
What is a reason for the classification of information?
A. Creating a manual describing the BYOD policy
B. To provide clear identification tags
C. To structure the information according to its sensitivity
正解:C
質問 6:
An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.
A. False
B. True
正解:A
質問 7:
What type of system ensures a coherent Information Security organisation?
A. Information Security Management System (ISMS)
B. Information Exchange Data System (IEDS)
C. Information Technology Service Management System (ITSM)
D. Federal Information Security Management Act (FISMA)
正解:A
質問 8:
Below is Purpose of "Integrity", which is one of the Basic Components of Information Security
A. the property that information is not made available or disclosed to unauthorized individuals
B. the property of safeguarding the accuracy and completeness of assets.
C. the property that information is not made available or disclosed to unauthorized individuals
D. the property of being accessible and usable upon demand by an authorized entity.
正解:B
神み** -
なかなかISO-ISMS-LA試験でいい点は取れると思う。解釈でわかりやく内容を明示。つまづきやすいポイントをフォローしてくれてる。