Question 61

An information security policy must be:
  • Question 62

    Which of the following is NOT one of the techniques used to respond to insider threats:
  • Question 63

    A Malicious code attack using emails is considered as:
  • Question 64

    The most common type(s) of intellectual property is(are):
  • Question 65

    Installing a password cracking tool, downloading pornography material, sending emails to colleagues which irritates them and hosting unauthorized websites on the company's computer are considered: