What type of legislation requires a proper controlled purchase process?
Answer : D
Which of the following is a technical security measure?
Answer : A
What is the relationship between data and information?
Answer : B
A hacker gains access to a web server and reads the credit card numbers stored on that server. Which security principle is violated?
Answer : B
There is a network printer in the hallway of the company where you work. Many employees don't pick up their printouts immediately and leave them on the printer.
What are the consequences of this to the reliability of the information?
Answer : B
Which of the following does a lack of adequate security controls represent?
Answer : B
Access Control System, CCTV and security guards are form of:
Answer : C