Q1. During a periodical review of information security controls and their effectiveness in a corporation, that a file was found to be containing privacy-related data in a publicly accessible location. Which one of the following is ultimately responsible for such a security violation?
Q2. ______ is a cryptographic method in which plain text is scrambled to form a scrambled text that is not directly readable without unscrambling.
Q3. Which one of the following is a malicious threat?
Q4. Which one of the following is a Recovery Time Objective (RTO)?
Q5. Which of the following represents Data in use? Drag and drop the correct examples to the red box.
Q6. ________ is a type of cybercrime wherein an unsuspecting user is lured by way of emails or pop-up messages to visit attacker-constructed malicious websites.
Q7. A corporation establishes security policies and procedures based on proper risk assessment and compliance requirements. Such an activity is called______.
Q8. Which of the following information classifications mandates the need to know principle?
Q9. A cyber attack is perpetrated against a corporate network with the intention of destabilizing the systems and gaining competitive advantage. Such an attack can be referred as______.
Q10. Which one of the following is not a best security practice?