Join the discussion
Question 1/35
You work in the office of a large company. You receive a call from a person claiming to be from the Helpdesk. He asks you for your password. What kind of threat is this?
Correct Answer: B
Add Comments
- Other Question (35q)
- Q1. You work in the office of a large company. You receive a call from a person claiming to be...
- Q2. What is the best way to comply with legislation and regulations for personal data protecti...
- Q3. You are the owner of a growing company, SpeeDelivery, which provides courier services. You...
- Q4. Some security measures are optional. Other security measures must always be implemented. W...
- Q5. A couple of years ago you started your company which has now grown from 1 to 20 employees....
- Q6. Peter works at the company Midwest Insurance. His manager, Linda, asks him to send the ter...
- Q7. You are a consultant and are regularly hired by the Ministry of Defense to perform analysi...
- Q8. At Midwest Insurance, all information is classified. What is the goal of this classificati...
- Q9. You work for a large organization. You notice that you have access to confidential informa...
- Q10. An employee in the administrative department of Smiths Consultants Inc. finds out that the...
- Q11. Who is authorized to change the classification of a document?...
- Q12. Why do organizations have an information security policy?...
- Q13. You work in the office of a large company. You receive a call from a person claiming to be...
- Q14. What is an example of a good physical security measure?...
- Q15. Your organization has an office with space for 25 workstations. These workstations are all...
- Q16. What is an example of a non-human threat to the physical environment?...
- Q17. What is the goal of an organization's security policy?...
- Q18. Your company has to ensure that it meets the requirements set down in personal data protec...
- Q19. Why is air-conditioning placed in the server room?...
- Q20. What physical security measure is necessary to control access to company information?...
- Q21. You apply for a position in another company and get the job. Along with your contract, you...
- Q22. You have an office that designs corporate logos. You have been working on a draft for a la...
- Q23. What is the most important reason for applying segregation of duties?...
- Q24. A non-human threat for computer systems is a flood. In which situation is a flood always a...
- Q25. You are the owner of SpeeDelivery courier service. Because of your companys growth you hav...
- Q26. What sort of security does a Public Key Infrastructure (PKI) offer?...
- Q27. What is a human threat to the reliability of the information on your company website?...
- Q28. You own a small company in a remote industrial areA. Lately, the alarm regularly goes off ...
- Q29. Why is compliance important for the reliability of the information?...
- Q30. You are the owner of the courier company SpeeDelivery. You have carried out a risk analysi...
- Q31. Which type of malware builds a network of contaminated computers?...
- Q32. Three characteristics determine the reliability of information. Which characteristics are ...
- Q33. Under which condition is an employer permitted to check if Internet and email services in ...
- Q34. You read in the newspapers that the ex-employee of a large company systematically deleted ...
- Q35. When we are at our desk, we want the information system and the necessary information to b...
