An employee in the administrative department of Smiths Consultants Inc. finds out that the expiry date of a contract with one of the clients is earlier than the start date. What type of measure could prevent this error?
Answer : D
Logging in to a computer system is an access-granting process consisting of three steps: identification, authentication and authorization. What occurs during the first step of this process: identification?
Answer : B
What does the Information Security Policy describe?
Answer : A
A non-human threat for computer systems is a flood. In which situation is a flood always a relevant threat?
Answer : B
What do employees need to know to report a security incident?
Answer : A
You are the owner of a growing company, SpeeDelivery, which provides courier services. You decide that it is time to draw up a risk analysis for your information system. This includes an inventory of threats and risks. What is the relation between a threat, risk and risk analysis?
Answer : B
What is an example of a security incident?
Answer : B