Question 1 : The information security policy of Dubai chamber applies to
a. Employees
b. Contractors
c. Consultants
d..Vendors
e. All of the above
Question 2 : The action taken during the course of investigation of security incidents includes
a. Inspection of data stored on computer or telecommunication sysytems
b. Inspection of data transmitted or received via networks
c. Both a and b.
d. Neither a nor b
Question 3: The impact of threat event according to information security policy,includes
a. Financial cost
b. Legal liability
c. Loss of reputation
d. Diminuition of service to stake holders where appropriate
e. All of the above
Question 4 : The information possessed by the Dubai Chamber about its customers,employees, and associates fulfills the requirements of
a. Confidentiality
b. Integrity
c. Availability
d. All of Above
e. None of the above
Question 5 : According to Information Security Management System, the responsibilities of
a. Awareness of Information Security Policies
b. Abiding by all procedures
c. Reporting Information Security incidents
d. All of the above
e. None of the above
Question 6: The legislations whose requirements are subjected to compliance under the
Information Security Policy include
a. Cyber Crime Law
b. Data Protection Law 2007
c. Companies Act
d. Data Protection Act
e. All of the above
Question 7: The resposibilities of Information Security Manager do not include
a. Selecting controls for risk mitigation
b. Establishing and maintaining contact with external security resources
c. Coordinating with HR department regarding information security awareness education and
training to be provided to all Dubai Chamber employees.
d. Monitoring the performance of IST members regarding with respect to their assigned
security roles and responsibilities.
e. None of the above
Question 8 : The responsibilities of Information Owners associated with Dubai Chamber
include
a. Defining the security requirements for the systems
b. Controlling access to systems
c. Data retention and destruction along with backup requirements
d. All of the above
e. None of above
Question 9 : The steps taken by Information Security Team(IST) to fulfil its primary
responsibility consists in:
a. Proactively reporting observations regarding security weakness/ potential risks
b. Assisting in incident response and management process
c. Providing timely feedback to Information Security Manager (ISM) regarding information
security status in the organization.
d. Ensuring that employees and third -party personnel are educated on relevant information
security policies and procedures.
e. All of the above
Reference
DC_P1_InformationSecurity Policy V 8.0 June 2015