A. Give it to the office boy to reuse it for other purposes
B. Throw it in any dustbin
C. Be environment friendly and reuse it for writing
D. Shred it using a shredder
A. Authorisation
B. Identification
C. Verification
D. Authentication
A. Computer criminality act
B. ISO/IEC 27002
C. Personal data protection act
D. IT Service Management
A. Make the information security incident details known to all employees
B. Preserve evidence if necessary
C. Report suspected or known incidents upon discovery through the Servicedesk
D. Cooperate with investigative personnel during investigation if needed
A. Establishment, operation, monitoring, improvement
B. Implementation, operation, improvement, maintenance
C. Establishment, implementation, operation, maintenance
D. Implementation, operation, maintenance, establishment
A. The confidentiality of the information is no longer guaranteed.
B. The availability of the information is no longer guaranteed.
C. The integrity of the information is no longer guaranteed.
D. The Security of the information is no longer guaranteed.
A. Integrity
B. Authenticity
C. Availability
D. Confidentiality
A. Internal
B. Confidential
C. Highly Confidential
D. Public
A. Detective
B. Preventive
C. Corrective
D. Repressive
A. specific and organized data for a purpose
B. mature and measurable data
C. can lead to understanding and decrease in uncertainty
D. accurate and timely data