Question 61
An information security policy must be:
Question 62
Which of the following is NOT one of the techniques used to respond to insider threats:
Question 63
A Malicious code attack using emails is considered as:
Question 64
The most common type(s) of intellectual property is(are):
Question 65
Installing a password cracking tool, downloading pornography material, sending emails to colleagues which irritates them and hosting unauthorized websites on the company's computer are considered:
