A. How the organisation will manage information assurance.
B. The compliance with legal and regulatory obligations.
C. The policy has been agreed and amended to suit all third party contractors.
D. The policy has the support of Board and the Chief Executive.
A. Online retailer.
B. Agricultural producer.
C. Traditional market trader.
D. Mail delivery business.
A. System Integrity.
B. Intrusion Prevention System.
C. Sandboxing.
D. Defence in depth.
A. SMS technology was never intended to be used to transmit high risk content such as One-time payment codes.
B. There are only two mobile phone platforms - Android and iOS - reducing the number of target environments.
C. The vast majority of mobile phones globally support the SMS protocol inexpensively.
D. The store and forward nature of SMS means it is considered a 'fire and forget service'.
A. Use MAC tittering on a SOHO network with a smart group of clients.
B. Using WPA encryption on the wireless network.
C. Turning on SSID broadcasts to advertise security levels.
D. Dedicating an access point on a dedicated VLAN connected to a firewall.
A. Remove all digital evidence from the scene to prevent unintentional damage.
B. Don't touch any evidence until a senior digital investigator arrives.
C. Remove power from all digital devices at the scene to stop the data changing.
D. Photograph all evidence and triage to determine whether live data capture is necessary.
A. To make sure the correct colour-coding system is used when the information is ready for archive.
B. To ensure that should the information be lost in transit, it can be returned to the originator using the correct protocols.
C. To comply with whatever mandatory security policy framework is in place within the geographical location in question.
D. To provide guidance and instruction on implementing appropriate security controls to protect the information.
A. Procedures.
B. Guidelines
C. Policy.
D. Standards
A. Appropriate company accreditation and staff certification.
B. Affiliation with local law enforcement bodies and local government regulations.
C. Formal certification to ISO/IEC 27001 and alignment with ISO 17025.
D. Clean credit references as well as international experience.
A. 3, 4 and 5.
B. 1, 2 and 3.
C. 1, 2 and 5.
D. 1, 2 and 4.