Victor wants to send an encrypted message to his friend. He is using a steganography technique to accomplish his task. He takes a cover object and changes it accordingly to hide information.
This secret information is recovered only when the algorithm compares the changed cover with the original cover. Which of the following steganography methods is Victor using to accomplish his task?
Answer : A
Which of the following is also known as the 'Code for Information Security'?
Answer : C
You work as an Information Security Manager for uCertify Inc. You are working on asset management. You have been assigned the task to secure information labeling and handling within the organization. Which of the following controls of the ISO standard is concerned with information labeling and handling?
Answer : C
Which of the following plans provides measures and capabilities for recovering a major application or general support system?
Answer : C
Which of the following documents is developed along the risk management processes to monitor and control risks?
Answer : D
Choose and reorder the appropriate steps that you will take to perform auditing.
Answer : A
You work as a Security Administrator for uCertify Inc. You have been assigned a task to implement information classification levels. You want to put the highly sensitive documents that should only be accessed by few people of the organization. In which of the following information classification levels should you put those documents?
Answer : B
Which of the following are the factors that determine the degree to which the Return on
Investment overstates the economic value?
Each correct answer represents a complete solution. Choose all that apply.
Answer : A,B,D
Which of the following is expressly set up to attract and trap people who attempt to penetrate other people's computer systems?
Answer : A
Which of the following types of attack can be used to break the best physical and logical security mechanism to gain access to a system?
Answer : C
Which of the following are the sub-elements of environmental security?
Each correct answer represents a complete solution. Choose all that apply.
Answer : A,C,D
Which of the following is the element used in the technology of encrypting and decrypting the text in cryptography?
Answer : B
Mark is hired as an Information Security Officer for BlueWell Inc. He wants to draw the attention of the management towards the significance of integrating information security in the business processes.
Which of the following tasks should he perform first to accomplish the task?
Answer : A
You are working with a company that depends on real time data being available to employees, thus performance is an issue. They are trying to select the best method for handing the situation of a hard drive crashing. Which of the following would you recommend to them?
Answer : D
The Information Security Officer (ISO) of Blue Well Inc. wants to have a list of security measures put together. What should be done before security measures are selected by the
Information Security Officer?
Answer : A