Sample questions
Q1. An access violation is called:
- Data Encryption Standard
- Procedure
- Incident management
- Incident
Q2. A systematic and procedural way of managing incidents is known as:
- Configuration management
- Incident management
- Change management
- System management
Q3. If an event could possibly violate information security, then such an event is known as:
- Problem
- Confidentiality breach
- Incident
- Integrity breach
Q4. A full test in a disaster recovery testing is called:
- A functional drill
- Simulation test
- Emulates real emergency or disaster scenario
- All of the above
Q5. Providing wrong inputs to the system can be classified as:
- Problem
- Vulnerability
- Incident
- Threat
Q6. A periodical mock test rehearsing the steps of actions to be taken during an emergency is also known as:
- Table top review
- Evacuation drills
- Fire fighting
- Shutdown of systems
Q7. Which of the following can be classified as an incident?
Q8. Which one of the following disaster-recovery tests is also called a functional drill?
- Checklist review
- Table top exercise...