[Q26-Q45] Verified ISFS dumps Q&As - Pass Guarantee Exam Dumps Test Engine [2024]

Share

Verified ISFS dumps Q&As - Pass Guarantee Exam Dumps Test Engine [2024]

ISFS dumps and 80 unique questions

NEW QUESTION # 26
What is the best way to comply with legislation and regulations for personal data protection?

  • A. Performing a threat analysis
  • B. Appointing the responsibility to someone
  • C. Performing a vulnerability analysis
  • D. Maintaining an incident register

Answer: B


NEW QUESTION # 27
What is a human threat to the reliability of the information on your company website?

  • A. Because of a lack of maintenance, a fire hydrant springs a leak and floods the premises. Your employees cannot come into the office and therefore can not keep the information on the website up to date.
  • B. The computer hosting your website is overloaded and crashes. Your website is offline.
  • C. One of your employees commits an error in the price of a product on your website.

Answer: C


NEW QUESTION # 28
When we are at our desk, we want the information system and the necessary information to be available. We want to be able to work with the computer and access the network and our files.
What is the correct definition of availability?

  • A. The degree to which an information system is available for the users
  • B. The degree to which the continuity of an organization is guaranteed
  • C. The degree to which the system capacity is enough to allow all users to work with it
  • D. The total amount of time that an information system is accessible to the users

Answer: A

Explanation:
Explanation/Reference:


NEW QUESTION # 29
There is a network printer in the hallway of the company where you work. Many employees dont pick up their printouts immediately and leave them in the printer. What are the consequences of this to the reliability of the information?

  • A. The availability of the information is no longer guaranteed.
  • B. The integrity of the information is no longer guaranteed.
  • C. The confidentiality of the information is no longer guaranteed.

Answer: C


NEW QUESTION # 30
What is an example of a physical security measure?

  • A. The encryption of confidential information
  • B. A code of conduct that requires staff to adhere to the clear desk policy, ensuring that confidential information is not left visibly on the desk at the end of the work day
  • C. Special fire extinguishers with inert gas, such as Argon
  • D. An access control policy with passes that have to be worn visibly

Answer: C


NEW QUESTION # 31
Your company has to ensure that it meets the requirements set down in personal data protection legislation. What is the first thing you should do?

  • A. Translate the personal data protection legislation into a privacy policy that is geared to the company and the contracts with the customers.
  • B. Make the employees responsible for submitting their personal data.
  • C. Appoint a person responsible for supporting managers in adhering to the policy.
  • D. Issue a ban on the provision of personal information.

Answer: A


NEW QUESTION # 32
A couple of years ago you started your company which has now grown from 1 to 20 employees.
Your companys information is worth more and more and gone are the days when you could keep it all in hand yourself. You are aware that you have to take measures, but what should they be?
You hire a consultant who advises you to start with a qualitative risk analysis. What is a qualitative risk analysis?

  • A. This analysis is based on scenarios and situations and produces a subjective view of the possible threats.
  • B. This analysis follows a precise statistical probability calculation in order to calculate exact loss caused by damage.

Answer: A


NEW QUESTION # 33
You are a consultant and are regularly hired by the Ministry of Defense to perform analysis.
Since the assignments are irregular, you outsource the administration of your business to temporary workers. You don't want the temporary workers to have access to your reports. Which reliability aspect of the information in your reports must you protect?

  • A. Availability
  • B. Integrity
  • C. Confidentiality

Answer: C


NEW QUESTION # 34
What is an example of a good physical security measure?

  • A. All employees and visitors carry an access pass.
  • B. Printers that are defective or have been replaced are immediately removed and given away as garbage for recycling.
  • C. Maintenance staff can be given quick and unimpeded access to the server area in the event of disaster.

Answer: A


NEW QUESTION # 35
You are the owner of the courier company SpeeDelivery. On the basis of your risk analysis you have decided to take a number of measures. You have daily backups made of the server, keep the server room locked and install an intrusion alarm system and a sprinkler system. Which of these measures is a detective measure?

  • A. Backup tape
  • B. Access restriction to special rooms
  • C. Sprinkler installation
  • D. Intrusion alarm

Answer: D


NEW QUESTION # 36
What is the relationship between data and information?

  • A. Data is structured information.
  • B. Information is the meaning and value assigned to a collection of data.

Answer: B


NEW QUESTION # 37
You read in the newspapers that the ex-employee of a large company systematically deleted files out of revenge on his manager. Recovering these files caused great losses in time and money. What is this kind of threat called?

  • A. Natural threat
  • B. Human threat
  • C. Social Engineering

Answer: B


NEW QUESTION # 38
Which is a legislative or regulatory act related to information security that can be imposed upon all organizations?

  • A. ISO/IEC 27001:2005
  • B. Intellectual Property Rights
  • C. Personal data protection legislation
  • D. ISO/IEC 27002:2005

Answer: C


NEW QUESTION # 39
Midwest Insurance controls access to its offices with a passkey system. We call this a preventive measure. What are some other measures?

  • A. Repressive, adaptive and corrective measures
  • B. Detective, repressive and corrective measures
  • C. Partial, adaptive and corrective measures

Answer: B


NEW QUESTION # 40
Three characteristics determine the reliability of information. Which characteristics are these?

  • A. Availability, Integrity and Correctness
  • B. Availability, Nonrepudiation and Confidentiality
  • C. Availability, Integrity and Confidentiality

Answer: C

Explanation:
Explanation/Reference:


NEW QUESTION # 41
What action is an unintentional human threat?

  • A. Social engineering
  • B. Arson
  • C. Theft of a laptop
  • D. Incorrect use of fire extinguishing equipment

Answer: D

Explanation:
Explanation/Reference:


NEW QUESTION # 42
You work in the IT department of a medium-sized company. Confidential information has got into the wrong hands several times. This has hurt the image of the company. You have been asked to propose organizational security measures for laptops at your company. What is the first step that you should take?

  • A. Appoint security personnel
  • B. Encrypt the hard drives of laptops and USB sticks
  • C. Set up an access control policy
  • D. Formulate a policy regarding mobile media (PDAs, laptops, smartphones, USB sticks)

Answer: D

Explanation:
Explanation/Reference:


NEW QUESTION # 43
Your organization has an office with space for 25 workstations. These workstations are all fully equipped and in use. Due to a reorganization 10 extra workstations are added, 5 of which are used for a call centre 24 hours per day. Five workstations must always be available. What physical security measures must be taken in order to ensure this?

  • A. Obtain an extra office and set up 10 workstations. You would therefore have spare equipment that can be used to replace any non-functioning equipment.
  • B. Obtain an extra office and set up 10 workstations. Ensure that there are security personnel both in the evenings and at night, so that staff can work there safely and securely.
  • C. Obtain an extra office and provide a UPS (Uninterruptible Power Supply) for the five most important workstations.
  • D. Obtain an extra office and connect all 10 new workstations to an emergency power supply and UPS (Uninterruptible Power Supply). Adjust the access control system to the working hours of the new staff. Inform the building security personnel that work will also be carried out in the evenings and at night.

Answer: D


NEW QUESTION # 44
You are the owner of a growing company, SpeeDelivery, which provides courier services. You decide that it is time to draw up a risk analysis for your information system. This includes an inventory of the threats and risks.
What is the relation between a threat, risk and risk analysis?

  • A. Risk analyses help to find a balance between threats and risks.
  • B. A risk analysis is used to clarify which threats are relevant and what risks they involve.
  • C. A risk analysis is used to remove the risk of a threat.
  • D. A risk analysis identifies threats from the known risks.

Answer: B


NEW QUESTION # 45
......

ISFS Dumps for Pass Guaranteed - Pass ISFS Exam: https://www.actual4exams.com/ISFS-valid-dump.html

ISFS Exam Dumps - Try Best ISFS Exam Questions: https://drive.google.com/open?id=1G_0x4NnYMsUL8_Xon1677MeeNsU7MUGq