1.
You work for a large organization. You notice that you have access to confidential information that you should not be able to access in your position. You report this security incident to the helpdesk. The incident cycle isinitiated. What are the stages of the security incident cycle?
2.
Your organization has an office with space for 25 workstations. These workstations are all fully equipped and in use. Due to a reorganization 10 extra workstations are added, 5 of which are used for a call centre 24 hours per day. Five workstations must always be available. What physical security measures must be taken in order to ensure this?
3.
What is a risk analysis used for?
4.
A well executed risk analysis provides a great deal of useful information. A risk analysis has four main objectives. What is not one of the four main objectives of a risk analysis?
5.
What is an example of a security incident?
6.
Which of the following measures is a corrective measure?
7.
We can acquire and supply information in various ways. The value of the information depends on whether it is reliable. What are the reliability aspects of information?
8.
Your company has to ensure that it meets the requirements set down in personal data protection legislation. What is the first thing you should do?
9.
What sort of security does a Public Key Infrastructure (PKI) offer?
10.
An employee in the administrative department of Smiths Consultants Inc. finds out that the expiry date of a contract with one of the clients is earlier than the start date. What type of measure could prevent this error?