Question 11

The Information Security Manager (ISM) at Smith Consultants Inc. introduces the following measures to assure information security:
-The security requirements for the network are specified.
-A test environment is set up for the purpose of testing reports coming from the database.
-The various employee functions are assigned corresponding access rights.
-
RFID access passes are introduced for the building. Which one of these measures is not a technical measure?
  • Question 12

    You work in the office of a large company. You receive a call from a person claiming to be from the Helpdesk. He asks you for your password. What kind of threat is this?
  • Question 13

    What is the best way to comply with legislation and regulations for personal data protection?
  • Question 14

    Your company has to ensure that it meets the requirements set down in personal data protection legislation.
    What is the first thing you should do?
  • Question 15

    You work in the office of a large company. You receive a call from a person claiming to be from the Helpdesk.
    He asks you for your password. What kind of threat is this?