Q33. In the PDCA (Plan, Do, Check, Act) cycle of an information security management
system (ISMS), which of the following is performed during the “Act” phase?
a) Maintenance and improvement of the ISMS
b) Establishment of the ISMS
c) Monitoring and review of the ISMS
d) Installation and operations of the ISMS
Q34. Which of the following is a security attack that is sent to users as a part of a program
with a hidden destructive function, or as a program designed to trick users into
executing a malicious function?
a) DoS attack b) Dictionary attack
c) Trojan horse d) Buffer overflow attack