1.
What is the greatest risk for an organization if no information security policy has been defined?
2.
What is the objective of classifying information?
3.
What do employees need to know to report a security incident?
4.
You have just started working at a large organization. You have been asked to sign a code of conduct as well as a contract. What does the organization wish to achieve with this?
5.
Peter works at the company Midwest Insurance. His manager, Linda, asks him to send the terms and conditions for a life insurance policy to Rachel, a client. Who determines the value of the information in the insurance terms and conditions document?
6.
When we are at our desk, we want the information system and the necessary information to be available. We want to be able to work with the computer and access the network and our files. What is the correct definition of availability?
7.
What is an example of a non-human threat to the physical environment?
8.
In most organizations, access to the computer or the network is granted only after the user has entered a correct username and password. This process consists of 3 steps: identification, authentication and authorization. What is the purpose of the second step, authentication?
 
9.
Which of these is not malicious software?
10.
Some threats are caused directly by people, others have a natural cause. What is an example of an intentional human threat?