Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
Which of the taking after isn’t ordinarily a portion of the Data Security Management Framework system made by security approaches?
Correct
The five components of a Data Security Administration System control, arrange, execute, assess, and keep up. The report isn’t one of those elements but maybe a by-product of Assess.
Incorrect
The five components of a Data Security Administration System control, arrange, execute, assess, and keep up. The report isn’t one of those elements but maybe a by-product of Assess.
-
Question 2 of 10
2. Question
Which of the taking after may be a work of Data Security Administration?
Correct
information Security Administration is by and large driven by implementation of arrangements, authorizing activity, implementing arrangement and responsibility, arranging in terms of ventures, and appropriate utilization of resources. This is distinctive from the administration of data security, which gives a higher level of bolster and oversight
Incorrect
information Security Administration is by and large driven by implementation of arrangements, authorizing activity, implementing arrangement and responsibility, arranging in terms of ventures, and appropriate utilization of resources. This is distinctive from the administration of data security, which gives a higher level of bolster and oversight
-
Question 3 of 10
3. Question
Which of the taking after is a portion of a security administration system?
Correct
A data security administration system will have the listed components as well as a security methodology, security approaches, standards, feedback, and nonstop enhancement.
Incorrect
A data security administration system will have the listed components as well as a security methodology, security approaches, standards, feedback, and nonstop enhancement.
-
Question 4 of 10
4. Question
Which of the taking after guidelines was presented by the ITGI?
Correct
COBIT was presented by ITGI to characterize the IT requirements related to viability, proficiency, accessibility, keenness, confidentiality, reliability, and compliance
Incorrect
COBIT was presented by ITGI to characterize the IT requirements related to viability, proficiency, accessibility, keenness, confidentiality, reliability, and compliance
-
Question 5 of 10
5. Question
Moved forward reaction could be a good thing about what usage frame of information security administration?
Correct
A Distributed administration arrangement increments the responsiveness of the arrangement and arrangement development to produce income development.
Incorrect
A Distributed administration arrangement increments the responsiveness of the arrangement and arrangement development to produce income development.
-
Question 6 of 10
6. Question
Possession of data gives bolster to what security objective?
Correct
Proprietorship gives the most prominent level of integrity to the information by giving a single individual duty over how data is used or by whom.
Incorrect
Proprietorship gives the most prominent level of integrity to the information by giving a single individual duty over how data is used or by whom.
-
Question 7 of 10
7. Question
Which security practice is used to reduce the collusion of activities?
Correct
By Job Rotation, the organization can guarantee that a new see is provided to decide the necessities and exercises of a particular work.
Incorrect
By Job Rotation, the organization can guarantee that a new see is provided to decide the necessities and exercises of a particular work.
-
Question 8 of 10
8. Question
Which of the taking after control models is particularly utilized to provide structure for get to control and keenness?
Correct
The Bell-LaPadula demonstration is utilized for both get to control and integrity with distinctive usage of the rules.
Incorrect
The Bell-LaPadula demonstration is utilized for both get to control and integrity with distinctive usage of the rules.
-
Question 9 of 10
9. Question
Which of the taking after isn’t utilized by Kerberos to ensure the network?
Correct
Kerberos is named after the legendary three-headed pooch with the components of verification, bookkeeping, and reviewing. Authorization is not distinguished.
Incorrect
Kerberos is named after the legendary three-headed pooch with the components of verification, bookkeeping, and reviewing. Authorization is not distinguished.
-
Question 10 of 10
10. Question
Which alter demonstrate is utilized to handle profoundly basic changes?
Correct
Emergency changes speak to those changes that must be done immediately to handle exceedingly basic issues to the commerce or benefit.
Incorrect
Emergency changes speak to those changes that must be done immediately to handle exceedingly basic issues to the commerce or benefit.