Q35. Security risk treatment in ISMS includes risk transfer, risk avoidance, risk acceptance,
and risk reduction. Which of the following is an example of risk avoidance?
a) A security measure was taken, which lowered the possibility of problems arising.
b) The company took out insurance in case a problem arises and causes damage.
c) The risk was confirmed to be small, and it was decided that damage would be borne
by the company when a problem arises.
d) The company withdrew from the services that carried high risk.
Q36. Among the following lists consisting of the information security terms availability,
integrity, confidentiality, and vulnerability, which is a complete list of characteristics
that are required by ISMS to be maintained for an organization’s information assets?
a) Availability, Integrity b) Availability, Integrity, Confidentiality
c) Integrity, Confidentiality d) Integrity, Confidentiality, Vulnerability
Q37. Which of the following is an appropriate description concerning information security
education in a company?
a) Re-education is conducted only when the information system is replaced.
b) Education is provided to new employees after they have become familiar with their
business operations.
c) Education is provided only to employees who access the information assets.
d) The content is changed according to the business operations, the roles and the
responsibilities of employees.
Q38. Which of the following is the most appropriate explanation of the operation that
spyware is meant to perform?
a) To destabilize the operation of the OS and software
b) To delete files from the file system without user consent
c) To hijack the browser and forcefully execute a particular operation
d) To collect personal information without being noticed by users