GAQM ISO IEC LI
Q: 1
A non-human threat for computer systems is a flood. In which situation is a flood always a relevant
threat?
Options
Q: 2
What is an example of a good physical security measure?
Options
Q: 3
One of the ways Internet of Things (IoT) devices can communicate with each other (or ‘the outside
world’) is using a so-called short-range radio protocol. Which kind of short-range radio protocol
makes it possible to use your phone as a credit card?
Options
Q: 4
Of the following, which is the best organization or set of organizations to contribute to compliance?
Options
Q: 5
The company Midwest Insurance has taken many measures to protect its information. It uses an
Information Security Management System, the input and output of data in applications is validated,
confidential documents are sent in encrypted form and staff use tokens to access information
systems. Which of these is not a technical measure?
Options
Q: 6
What is the best way to comply with legislation and regulations for personal data protection?
Options
Q: 7
What are the data protection principles set out in the GDPR?
Options
Q: 8
Which of the following measures is a preventive measure?
Options
Q: 9
True or False: Organizations allowing teleworking activities, the physical security of the building and
the local environment of the teleworking site should be considered
Options
Q: 10
Logging in to a computer system is an access-granting process consisting of three steps:
identification, authentication and authorization. What occurs during the first step of this process:
identification?
Options
Question 1 of 10