Professional Documents
Culture Documents
7. Which of the following is the fourth step of the Risk Management Process?
a. Calculation of Risk
b. Evaluation of the Impact
c. Evaluation of and Response to Risk
d. Evaluation of Threats and Vulnerabilities to Assets
14. Which of the following is not the type of Disk-based backup system?
a. Virtual Tape Libraries
b. Flat rack container
c. Disk-Array-Based Replication
d. Host-Based Replication
15. Which of the following is the fifth stage of the IDEAL Model?
a. Diagnosis
b. Learning
c. Action
d. Establishment
27. Which of the following statement is not correct about the Radio Frequency
Identification?
a. Radio frequency identification (RFID) is the use of radio waves to find
tagged objects within a narrow radius.
b. In RFID, the microchip saves information along with an ID to
recognise a product, while the antenna transmits this information to
an RFID reader.
c. In RFID, a tag comprises a microchip and an antenna.
d. RFID offers high record ability, power-free storage, a small form
factor, and sharp environmental specifications.
28. Which of the following statement is incorrect regarding the private branch
exchange?
a. A PBX is a computer-based switch that acts as an in-house phone
company for the organisation.
b. An unsecured PBX can result in exposing the organisation to toll
fraud, theft of proprietary or confidential information, loss of
revenue, or legal entanglements.
c. PBXs are now being phased out gradually but have been part of the
organisations infrastructure.
d. PBX address the security aspects of the deployment of a mail server
through maintenance and administration standards.
30. Which of the following is the third step to Perform Audit Planning?
a. Gain an understanding of the organisation’s governance structure
and practices associated to the audit objectives.
b. Understand changes in the business environment of the auditee.
c. Identify stated contents such as policies, standards and required
guidelines, procedures, and organisation structure.
d. Perform a risk analysis to help in designing the audit plan and set the
audit scope and audit objectives.