Want to know Passleader ISFS Exam practice test features? Want to lear more about EXIN,Inc Information Security Foundation based on ISO/IEC 27002 certification experience? Study Top Quality EXIN,Inc ISFS answers to Leading ISFS questions at Passleader. Gat a success with an absolute guarantee to pass EXIN,Inc ISFS (Information Security Foundation based on ISO/IEC 27002) test on your first attempt.
♥♥ 2021 NEW RECOMMEND ♥♥
Free VCE & PDF File for EXIN,Inc ISFS Real Exam (Full Version!)
★ Pass on Your First TRY ★ 100% Money Back Guarantee ★ Realistic Practice Exam Questions
Free Instant Download NEW ISFS Exam Dumps (PDF & VCE):
Available on:
http://www.surepassexam.com/ISFS-exam-dumps.html
New EXIN,Inc ISFS Exam Dumps Collection (Question 4 - Question 13)
Question No: 4
You are the owner of a growing company, SpeeDelivery, which provides courier services.
You decide that it is time to draw up a risk analysis for your information system. This includes an inventory of the threats and risks. What is the relation between a threat, risk and risk analysis?
A. A risk analysis identifies threats from the known risks.
B. A risk analysis is used to clarify which threats are relevant and what risks they involve.
C. A risk analysis is used to remove the risk of a threat.
D. Risk analyses help to find a balance between threats and risks.
Answer: B
Question No: 5
The Information Security Manager (ISM) at Smith Consultants Inc. introduces the following measures to assure information security:
- The security requirements for the network are specified.
- A test environment is set up for the purpose of testing reports coming from the database.
- The various employee functions are assigned corresponding access rights.
- RFID access passes are introduced for the building. Which one of these measures is not a technical measure?
A. The specification of requirements for the network
B. Setting up a test environment
C. Introducing a logical access policy
D. Introducing RFID access passes
Answer:: D
Question No: 6
Three characteristics determine the reliability of information. Which characteristics are these?
A. Availability, Integrity and Correctness
B. Availability, Integrity and Confidentiality
C. Availability, Nonrepudiation and Confidentiality
Answer: B
Question No: 7
When we are at our desk, we want the information system and the necessary information to be available. We want to be able to work with the computer and access the network and our files.
What is the correct definition of availability?
A. The degree to which the system capacity is enough to allow all users to work with it
B. The degree to which the continuity of an organization is guaranteed
C. The degree to which an information system is available for the users
D. The total amount of time that an information system is accessible to the users
Answer: C
Question No: 8
Peter works at the company Midwest Insurance. His manager, Linda, asks him to send the terms and conditions for a life insurance policy to Rachel, a client. Who determines the value of the information in the insurance terms and conditions document?
A. The recipient, Rachel
B. The person who drafted the insurance terms and conditions
C. The manager, Linda
D. The sender, Peter
Answer: A
Question No: 9
Some security measures are optional. Other security measures must always be implemented.
Which measure(s) must always be implemented?
A. Clear Desk Policy
B. Physical security measures
C. Logical access security measures
D. Measures required by laws and regulations
Answer: D
Question No: 10
Susan sends an email to Paul. Who determines the meaning and the value of information in this email?
A. Paul, the recipient of the information.
B. Paul and Susan, the sender and the recipient of the information.
C. Susan, the sender of the information.
Answer: A
Question No: 11
We can acquire and supply information in various ways. The value of the information depends on
whether it is reliable. What are the reliability aspects of information?
A. Availability, Information Value and Confidentiality
B. Availability, Integrity and Confidentiality
C. Availability, Integrity and Completeness
D. Timeliness, Accuracy and Completeness
Answer: B
Question No: 12
Which of the following measures is a preventive measure?
A. Installing a logging system that enables changes in a system to be recognized
B. Shutting down all internet traffic after a hacker has gained access to the company systems
C. Putting sensitive information in a safe
D. Classifying a risk as acceptable because the cost of addressing the threat is higher than the
value of the information at risk
Answer: C
Question No: 13
What is the objective of classifying information?
A. Authorizing the use of an information system
B. Creating a label that indicates how confidential the information is
C. Defining different levels of sensitivity into which information may be arranged
D. Displaying on the document who is permitted access
Answer: C
P.S. Easily pass ISFS Exam with Examcollection Top Quality Dumps & pdf vce, Try Free: http://www.examcollectionuk.com/ISFS-vce-download.html ( New Questions)