1. Basic objectives of information
security include: confidentiality, integrity and accessibility of information.
⚪ A.
True
⚫ B.
False
2. Security vulnerability is occurred
naturally, and is not affected by human factors.
⚪ A.
True
⚫ B.
False
3. We need to verify the identity of the
external service providers, before allowing them to access confidential
information or systems.
⚫ A.
True
⚪ B.
False
4. Which of the following would MOST
effectively reduce social engineering incidents?
⚫ A.
Security awareness training
⚪ B.
Increased physical security measures
⚪ C.
Email monitoring policy
⚪ D.
Intrusion detection / prevention systems
5. Which one of the following should NOT
be used as an information security objective?
⚪ A.
Zero occurence of improper handling of sensitive information
⚫ B.
Notify affected customer of information leakage 90 days after incident
⚪ C.
98% or above of staff received and passed information security awareness
training
⚪ D.
Zero occurence of incorrect access right assignment
6. Which one of the following is NOT
recommended when terminating an employee?
⚪ A.
Delete all physical access privileges
⚪ B.
Organize an exit interview
⚫ C.
Escort the employee to leave the building before offboarding clearance
⚪ D.
Disable all logon accounts by last date of employment
7. Which one of the followings is NOT
acceptable?
⚪ A.
Assign unique reference numbers to customer access requests
⚫ B.
Pack equipment of different customers together to save storage spaces
⚪ C.
Verify equipment brand name and serial number during move-out
⚪ D.
Allow customer to bring and install additional power bars in their racks
8. The BEST way to ensure that
security settings on each platform are in compliance with information security
policies and procedures is to:
⚪ A.
Perform penetration testing
⚫ B.
Establish security baselines
⚪ C.
Implement vendor default settings
⚪ D.
Link policies to an independent standard
9. The FIRST priority when
responding to an information security incident is:
⚪ A.
Documentation
⚪ B.
Monitoring
⚪ C.
Restoration
⚫ D.
Containment
10. When an emergency security
patch is received via electronic mail, the patch should FIRST be:
⚪ A.
Loaded onto an isolated test machine
⚪ B.
Decompiled to check for mailicious code
⚫ C.
Validated to ensure its authenticity
⚪ D.
Copied onto write-once media to prevent tampering