Home
Recent Q&A
Java
Cloud
JavaScript
Python
SQL
PHP
HTML
C++
Data Science
DBMS
Devops
Hadoop
Machine Learning
Azure
Blockchain
Devops
Ask a Question
Recent questions tagged information-security
Home
Tag
information-security
0
votes
A top government official is coming to visit you in one of the Company offices. This person is a prospective client for the Company. Select the appropriate choices to handle the visitor access for such officials
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
To whom should you express your concerns and suggestions related to information security at your location?
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
You just received an e-mail from your bank asking you to confirm your online activities by logging on to your account within a week. What is the best course of action to take?
asked
Aug 18, 2023
by
sharadyadav1986
information-security
0
votes
You receive an e-mail on your Company ID which has a personal business proposal not related to the Company. Is it appropriate to reply?
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
Your college friend shares with you code for an e-mail agent that can auto-respond to specific users with pre-defined content. Is it appropriate for you to implement this agent in the Company for a specific business purpose?
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
Due care must be taken for virus check while opening encrypted attachments as compared to unencrypted attachments in e-mail. Is this statement True or False?
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
You have been working from home on your laptop. What do you need to do when you connect to the Company network?
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
You are on leave when you receive an urgent call from your supervisor asking for your login credentials so that another team member can log in and complete the pending request. What should you do in such a situation?
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
You are attending an important telecon with your client manager. All of a sudden, you hear a fire alarm. What should you do?
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
The client has sent you some data on a USB stick. What are the mandatory steps that you need to follow?
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
The primary reason for which I am not allowed to store unlicensed music files on Company assets is that:
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
You receive a call from your friend asking you to leave immediately as there is some unrest in a certain part of the city. Which of these is the most appropriate action for you to take?
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
Rohit is a project leader for a team of 30 people. He has to catch an evening flight and so is leaving the office a bit early. He was requested for laptop verification at the security desk while leaving the office. What should Rohit do?
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
You are not allowed to classify any information as Public without authorization. Is this statement True or False?
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
You are under pressure and a bit dejected when you receive an e-mail from a friend on your official mail ID. Your friend has asked you to forward the e-mail to at least ten people. If you do so, a miracle would take place in your life within the next 24 hours, or else a mishap would take place. What should you do in such a scenario?
asked
Aug 18, 2023
in
iSecurity
by
sharadyadav1986
information-security
0
votes
Reconnaissance in information security is used for _______________
asked
Aug 17, 2021
in
Security Assessment
by
Robindeniel
reconnaissance
information-security
0
votes
Which of the following is a tangible asset?
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
tangible-asset
threat-modeling
information-security
0
votes
The following is a part of a threat model, except _________.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
threat-model
threat-modeling
information-security
0
votes
_________ is a medium that allows data to flow between domains of trust.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
trust-domains
data-flow
information-security
threat-modeling
security
0
votes
The theft of intellectual property is a threat to information security.
asked
Mar 17, 2021
in
Threat Modeling
by
sharadyadav1986
theft-information
information-security
threat-modeling
ssa
To see more, click for the
full list of questions
or
popular tags
.
...