Q1. An access violation is called:
Data Encryption Standard
Procedure
Incident management
Incident
Q2. A systematic and procedural way of managing incidents is known as:
Configuration management
Incident management
Change management
System management
Q3. If an event could possibly violate information security, then such an event is known as:
Problem
Confidentiality breach
Incident
Integrity breach
Q4. A full test in a disaster recovery testing is called:
A functional drill
Simulation test
Emulates real emergency or disaster scenario
All of the above
Q5. Providing wrong inputs to the system can be classified as:
Problem
Vulnerability
Incident
Threat
Q6. A periodical mock test rehearsing the steps of actions to be taken during an emergency is also known as:
Table top review
Evacuation drills
Fire fighting
Shutdown of systems
Q7. Which of the following can be classified as an incident?
Q8. Which one of the following disaster-recovery tests is also called a functional drill?
Checklist review
Table top exercise...