Sample questions
Q1. During a periodical review of information security controls and their effectiveness in a corporation, that a file was found to be containing privacy-related data in a publicly accessible location. Which one of the following is ultimately responsible for such a security violation?
Data user
Data custodian
Data owner
Data auditor
Q2. ______ is a cryptographic method in which plain text is scrambled to form a scrambled text that is not directly readable without unscrambling.
Hashing
Transposition
Transformation
Encryption
Q3. Which one of the following is a malicious threat?
Software weakness
Wrong configuration
Botnet
Weak encryption
Q4. Which one of the following is a Recovery Time Objective (RTO)?
Recovery of data that was processed up to last week
Recovery of statistical data for the past 12 months
Recovery of IT Systems within 4 hours
Recovery of people in the event of disaster
Q5. Which of the following represents Data in use? Drag and drop the correct examples to the red box.
Q6. ________...