1.
Why do you need to classify data?
Correct Answer
B. To decide upon the security level required by the classified data
Explanation
It is important to have a classification of data to ensure correct levels of security to the relevant type of data.
2.
Which of the following can be referred to as confidential data?
Correct Answer
C. Budget related information
Explanation
Budget related information is classified as confidential information.
3.
Monitoring is the best way of identifying sensitive data in the organization?
Correct Answer
B. False
Explanation
Auditing is the best process of taking stock of sensitive data in the network.
4.
How would you secure the organization premises?
Correct Answer
C. Surveillance systems
Explanation
Surveillance systems are an integral part of tracking intruders and attackers.
5.
Cipher locks can be used for punch system locks. T/F?
Correct Answer
A. True
Explanation
Cipher locks can be used in punch lock systems.
6.
Which of the following is needed for 24/7 surveillance?
Correct Answer
A. Power backup systems
Explanation
Burglar alarms are connected to the electric supply. Hence it is important to backup power lines for emergency situation of power outages.
7.
Surge protectors are meant to protect electronic devices. T/F?
Correct Answer
A. True
Explanation
Surge protectors provide electronic devices protection against power surge.
8.
Which of the following can increase damage due to fire?
Correct Answer
A. Electric supply
Explanation
Leaving the electric supply on during fire can have disastrous effect on the site. It can lead to electrical fire as well.
9.
Backup is required to provide fault tolerance to electronic data. T/F?
Correct Answer
A. True
Explanation
It is mandatory that data be given maximum online and offline fault tolerance.
10.
Which of the following enhances is an availability service?
Correct Answer
B. Server clustering
Explanation
Server clustering is considered as an availability service because it provides fault tolerance against server failure with no downtime and keeps the user transparent to the process.
11.
Data backup must be stored offsite always. T/F?
Correct Answer
A. True
Explanation
Explanation: Any off site location within the vicinity of the site will ensure that data backup is safe in case of fire and is also available at short notice when required to restore.
12.
Which of the following requires maximum restore time?
Correct Answer
C. Master backup
Explanation
Master back up or Full backup is a copy of all the files that are available on the storage media and hence requires maximum restore time.
13.
Which of the following ensures quick return to business?
Correct Answer
A. Hot site
Explanation
A Hot site provides all resources required for a business to shift in case of emergency and be online within negligible time. It is also very expensive
14.
Which part of a security policy must be a mandatory part of policy briefing?
Correct Answer
A. The effect caused by security breach
Explanation
It is very essential for every employee/user to know the relevant security policies and the effect of security breach.
15.
Security policy briefing must be a part of which of the following?
Correct Answer
B. Induction program
Explanation
The security policy briefing is nothing but the security program in short. It needs to be a part of induction program.
16.
Which of the following processes will verify policy implementation?
Correct Answer
B. Monitoring
Explanation
Monitoring for implementation is very essential to ascertain that all policies that were created are in place.
17.
Which of the following is a common error in a network?
Correct Answer
C. Incorrect virus database updation
Explanation
Virus database not being updated as per schedule could be a common but serious error on the network that leaves it open to inadvertent attacks.
18.
Risk management is an essential part of threat analysis. T/F?
Correct Answer
A. True
Explanation
Threat analysis is not complete without performing risk management.
19.
Network resource being unavailable is not in the way of the productivity of an organization. T/F?
Correct Answer
B. False
Explanation
Network resources not being available means the user has to manage with available resources and hence use more time than required to complete a task. This does affect productivity in a big way.
20.
Which of the following must an administrator ensure as far as user accounts are concerned.
Correct Answer
B. Disable unnecessary users
Explanation
Disabling unnecessary users will ensure that unused accounts do not get misused by attackers.
21.
Which of the following must get a dedicated scanning as far as electronic data is concerned?
Correct Answer
C. Email
Explanation
Emails must get dedicated scanning as they are the ones that carry the latest virus into the network. User data and System data will get scanned as per schedule.
22.
Supporting multiple encryption standards will make a network platform insecure. T/F?
Correct Answer
B. False
Explanation
Supporting multiple encryption standards will make a network platform flexible.
23.
An organization has to classify all existing data before deciding on an encryption system. T/F?
Correct Answer
A. True
Explanation
Unless data has been classified, an organization cannot arrive at factual information and hence will not be able to correctly analyze which type of data needs what type of encryption system.