Information Security Exam Question Sample

  1. Basic objectives of information security include: confidentiality, integrity and accessibility of information.
        ⚪  A. True
        ⚫  B. False

  2. Security vulnerability is occurred naturally, and is not affected by human factors.
        ⚪  A. True
        ⚫  B. False

  3. We need to verify the identity of the external service providers, before allowing them to access confidential information or systems.
        ⚫  A. True
        ⚪ B. False

  4. Which of the following would MOST effectively reduce social engineering incidents?
        ⚫  A. Security awareness training
        ⚪  B. Increased physical security measures
        ⚪  C. Email monitoring policy
        ⚪  D. Intrusion detection / prevention systems

  5. Which one of the following should NOT be used as an information security objective?
        ⚪  A. Zero occurence of improper handling of sensitive information
        ⚫  B. Notify affected customer of information leakage 90 days after incident
        ⚪  C. 98% or above of staff received and passed information security awareness training
        ⚪  D. Zero occurence of incorrect access right assignment

  6. Which one of the following is NOT recommended when terminating an employee?
        ⚪  A. Delete all physical access privileges
        ⚪  B. Organize an exit interview
        ⚫  C. Escort the employee to leave the building before offboarding clearance
        ⚪  D. Disable all logon accounts by last date of employment

  7. Which one of the followings is NOT acceptable?
        ⚪  A. Assign unique reference numbers to customer access requests
        ⚫  B. Pack equipment of different customers together to save storage spaces
        ⚪  C. Verify equipment brand name and serial number during move-out
        ⚪ D. Allow customer to bring and install additional power bars in their racks

  8. The BEST way to ensure that security settings on each platform are in compliance with information security policies and procedures is to:
        ⚪  A. Perform penetration testing
        ⚫  B. Establish security baselines
        ⚪  C. Implement vendor default settings
        ⚪  D. Link policies to an independent standard

  9. The FIRST priority when responding to an information security incident is:
        ⚪  A. Documentation
        ⚪  B. Monitoring
        ⚪  C. Restoration
        ⚫  D. Containment

 10. When an emergency security patch is received via electronic mail, the patch should FIRST be:
        ⚪ A. Loaded onto an isolated test machine
        ⚪  B. Decompiled to check for mailicious code
        ⚫  C. Validated to ensure its authenticity
        ⚪  D. Copied onto write-once media to prevent tampering

IT人日記 – 我對香港未來的看法

當管治者有無限權力,可操控所有,以致改變制度而偏向自己時 ,他(她)所管治的結果,便取決於他的能力和心意,經過過去一年的事情,已認知到香港管治的方向以及無能,只懂出賣香港來討好中共,如果政權不變,香港的未來只會是倒退,將可能成為中國的二、三線城市,更甚或是新疆的模樣,真的並不樂觀,只有求神保佑香港吧!

本人由以前是 IT區域經理, 現在已降級到系統分析員,我要重操二十多年前的職級和工作,工資下跌大半,而且再看不到將來有發展的空間,所以我的移民意向越來越強烈,希望之後可在另一天空下重新開始,或是安享晚年吧!

如果網友有移居英國或澳洲的資料或建議,歡迎PM跟本交流研究,謝謝!

Diary of IT Man – Quantum Computer will be maintstream of next generation of computer

Recently, I started to learn quantum engineering, quantum computer will become maintstream in IT development by 2023 because its performance exponentially faster than current computer. Currently it is using in field of on encryption, protein folding simulated, new medicine and treatments, etc. Its programming technique is very different from current one, I just finished a certification of Quantum Computing & Quantum Physics course, which taught about Quantum Cryptography, and Quantum Physics with Microsoft Q# (Q Sharp) & IBM Quantum Experience.

How fast are Quantum Computers? A 64-bit quantum computer can process 36 billion billion bytes of information in each step of computation. Compare that to the 8 bytes that your home computer can process in each step of computation!

Comparison of MySQL and MongoDB

MySQL Db is a structure Db for traditional application usage (or old application) such as ERP system, CRM system, etc. MongoDB is a non-structure Db for nowadays big application such as Instagram, etc.

Characteristic comparison as below:

MySQL: More Mature, Table Structure, Requires a Schema, Great with Relationships, Scales Vertically.

MongoDb: Shiny and New, Document Structure, More Flexible to Changes, Not Great with Complex Relationships, Horizontally Scalable.

Workarounds for SQL Server Parameter Sniffing

Now being exposed to the problem here are a few methods to address it: • Create SQL Server Stored Procedures using the WITH RECOMPILE Option

 • Use the SQL Server Hint OPTION (RECOMPILE)

 • Use the SQL Server Hint OPTION (OPTIMIZE FOR)

• Use Dummy Variables on SQL Server Stored Procedures

• Disable SQL Server Parameter Sniffing at the Instance Level

 • Disable Parameter Sniffing for a Specific SQL Server Query

https://www.mssqltips.com/sqlservertip/3257/different-approaches-to-correct-sql-server-parameter-sniffing/