Act now and download your EXIN,Inc ISFS test today! Do not waste time for the worthless EXIN,Inc ISFS tutorials. Download Update EXIN,Inc Information Security Foundation based on ISO/IEC 27002 exam with real questions and answers and begin to learn EXIN,Inc ISFS with a classic professional.
New EXIN,Inc ISFS Exam Dumps Collection (Question 4 - Question 13)
Q1. You read in the newspapers that the ex-employee of a large company systematically deleted files out of revenge on his manager. Recovering these files caused great losses in time and money.
What is this kind of threat called?
A. Human threat
B. Natural threat
C. Social Engineering
Answer: A
Q2. Why is air-conditioning placed in the server room?
A. In the server room the air has to be cooled and the heat produced by the equipment has to be extracted. The air in the room is also dehumidified and filtered.
B. When a company wishes to cool its offices, the server room is the best place. This way, no office space needs to be sacrificed for such a large piece of equipment.
C. It is not pleasant for the maintenance staff to have to work in a server room that is too warm.
D. Backup tapes are made from thin plastic which cannot withstand high temperatures. Therefore, if it gets too hot in a server room, they may get damaged.
Answer: A
Q3. An employee in the administrative department of Smiths Consultants Inc. finds out that the expiry date of a contract with one of the clients is earlier than the start date. What type of measure could prevent this error?
A. Availability measure
B. Integrity measure
C. Organizational measure
D. Technical measure
Answer: D
Q4. An airline company employee notices that she has access to one of the companyu2021s applications that she has not used before. Is this an information security incident?
A. Yes
B. No
Answer: B
Q5. At Midwest Insurance, all information is classified. What is the goal of this classification of information?
A. To create a manual about how to handle mobile devices
B. Applying labels making the information easier to recognize
C. Structuring information according to its sensitivity
Answer: C
Q6. Who is authorized to change the classification of a document?
A. The author of the document
B. The administrator of the document
C. The owner of the document
D. The manager of the owner of the document
Answer: C
Q7. In the organization where you work, information of a very sensitive nature is processed.
Management is legally obliged to implement the highest-level security measures. What is this kind of risk strategy called?
A. Risk bearing
B. Risk avoiding
C. Risk neutral
Answer: B
Q8. When we are at our desk, we want the information system and the necessary information to be available. We want to be able to work with the computer and access the network and our files.
What is the correct definition of availability?
A. The degree to which the system capacity is enough to allow all users to work with it
B. The degree to which the continuity of an organization is guaranteed
C. The degree to which an information system is available for the users
D. The total amount of time that an information system is accessible to the users
Answer: C
Q9. A Dutch company requests to be listed on the American Stock Exchange. Which legislation within
the scope of information security is relevant in this case?
A. Public Records Act
B. Dutch Tax Law
C. Sarbanes-Oxley Act
D. Security regulations for the Dutch government
Answer: C
Q10. What is the objective of classifying information?
A. Authorizing the use of an information system
B. Creating a label that indicates how confidential the information is
C. Defining different levels of sensitivity into which information may be arranged
D. Displaying on the document who is permitted access
Answer: C
P.S. Easily pass ISFS Exam with Allfreedumps Virtual Dumps & pdf vce, Try Free: https://www.allfreedumps.com/ISFS-dumps.html ( New Questions)