Latest ISFS Practice Tests with Actual Questions

Get Complete pool of questions with Premium PDF and Test Engine

Exam Code : ISFS
Exam Name : Information Security Foundation based on ISO/IEC 27002
Vendor Name : "Exin"







ISFS Dumps ISFS Braindumps

ISFS Real Questions ISFS Practice Test ISFS Actual Questions


Exin


ISFS


Information Security Foundation based on ISO/IEC 27002


https://killexams.com/pass4sure/exam-detail/ISFS



Question: 72

Which one of the threats listed below can occur as a result of the absence of a physical measure?


  1. A user can view the files belonging to another user.

  2. A server shuts off because of overheating.

  3. A confidential document is left in the printer.

  4. Hackers can freely enter the computer network.




Answer: B



Question: 73

What is the best description of a risk analysis?


  1. A risk analysis is a method of mapping risks without looking at company processes.

  2. A risk analysis helps to estimate the risks and develop the appropriate security measures.

  3. A risk analysis calculates the exact financial consequences of damages.




Answer: B



Question: 74

What is the goal of an organization's security policy?


  1. To provide direction and support to information security

  2. To define all threats to and measures for ensuring information security

  3. To document all incidents that threaten the reliability of information

  4. To document all procedures required to maintain information security




Answer: A



Question: 75

The Information Security Manager (ISM) at Smith Consultants Inc. introduces the following measures to assure information security: - The security requirements for the network are specified. - A test environment is set up for the purpose of testing reports coming from the database. - The various employee functions are assigned corresponding access rights. RFID access passes are introduced for the building. Which one of these measures is not a technical measure?


  1. The specification of requirements for the network

  2. Setting up a test environment

  3. Introducing a logical access policy

  4. Introducing RFID access passes




Answer: D



Question: 76

A company moves into a new building. A few weeks after the move, a visitor appears unannounced in the office of the director. An investigation shows that visitors passes grant the same access as the passes of the companys staff. Which kind of security measure could have prevented this?


  1. A physical security measure

  2. An organizational security measure

  3. A technical security measure




Answer: A



Question: 77

You have an office that designs corporate logos. You have been working on a draft for a large client. Just as you are going to press the <save> button, the screen goes blank. The hard disk is damaged and cannot be repaired. You find an early version of the design in your mail folder and you reproduce the draft for the customer. What is such a measure called?


  1. Corrective measure

  2. Preventive measure

  3. Reductive measure




Answer: A



Question: 78

You are the owner of the courier company SpeeDelivery. You have carried out a risk analysis and now want to determine your risk strategy. You decide to take measures for the large risks but not for the small risks. What is this risk strategy called?


  1. Risk bearing

  2. Risk avoiding

  3. Risk neutral




Answer: C



Question: 79

Three characteristics determine the reliability of information. Which characteristics are these?


  1. Availability, Integrity and Correctness

  2. Availability, Integrity and Confidentiality

  3. Availability, Nonrepudiation and Confidentiality




Answer: B



Question: 80

What action is an unintentional human threat?


  1. Arson

  2. Theft of a laptop

  3. Social engineering

  4. Incorrect use of fire extinguishing equipment




Answer: D