Login
Remember
Register
Ask a Question
Recent questions tagged security
0
votes
1
answer
Which of the following is most appropriate with regard to an organization's Business Continuity Planning (BCP) framework?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
1
answer
You are executing a project and you have come to know that project information has to be retained for a period more than the project duration due to regulatory requirements. What should you do?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
1
answer
Which of the following is not true about Information classified as Private and confidential?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
1
answer
You have backed up your project information on media. The project will continue for the next two years. How often should the restorability test be done?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
1
answer
You are working on a project and require logging on to the environment managed by the client. The client has provided you with a single user ID and your entire team uses the same ID to login to the environment. Which of these statements is correct in this context?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
1
answer
You were creating some design/flow diagrams on paper for a sensitive project of a client. when suddenly the PL calls you for an urgent meeting in a meeting room which is outside the Offshore Development Center (ODC). What is the appropriate way to handle the papers?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
1
answer
Rakesh has been deputed to a client located in the US. The client has provided a laptop to Rakesh. His family resides in India. Every evening he uses the client-provided laptop to chat with his family through a webcam using software he has installed directly from the internet. Which of the following is correct?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
1
answer
One day when you log on to your e-mail, you find that there is an unsolicited e-mail having abusive and offensive content in your inbox. What should you do?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
1
answer
What should you do to make your password difficult to guess or crack?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
1
answer
If you find a person whom you know tailgating, what should you do?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
1
answer
What is referred to as social engineering?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
1
answer
Writing down passwords is wrong. With respect to this statement, which of the following options is appropriate?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
1
answer
Which of the following statements is/are correct while using the Internet/intranet/Network Channels provided by the company?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
1
answer
When you have to retain the information, which factors should be considered for the retention period?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
1
answer
You are executing a project, and you have come to know that project information has to be retained for a period more than the project duration due to regulatory requirements. What should you do?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
1
answer
You have prepared a Design Document for the new product being launched by your customer. The customer has not provided any guidance on how such documents should be classified. How will you handle the document?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
1
answer
You are working overseas at a client location and need to use the data when you return to your home country. How will you ensure data availability?
asked
Aug 17, 2023
in
iSecurity
by
rajeshsharma
security
0
votes
1
answer
Your team needs a tool that can be used to correlate events from multiple resources into a central repository. Which of the following can be used for this purpose?
asked
Jun 1, 2023
in
Azure
by
sharadyadav1986
azure
security
center
0
votes
1
answer
What’s the difference between transport layer security and secure sockets layer?
asked
May 14, 2023
in
JAVA
by
john ganales
transport
layer
security
socketslayer
0
votes
1
answer
How does Synapse achieve row-level security?
asked
Mar 27, 2023
in
Azure
by
john ganales
synapse
row-level
security
Page:
« prev
1
2
3
4
5
6
next »
...