Winter Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: v4s65

Note! Following ISFS Exam is Retired now. Please select the alternative replacement for your Exam Certification.

ISFS Exam Dumps - Information Security Foundation based on ISO/IEC 27002

Go to page:
Question # 4

Which one of the threats listed below can occur as a result of the absence of a physical measure?

A.

A user can view the files belonging to another user.

B.

A server shuts off because of overheating.

C.

A confidential document is left in the printer.

D.

Hackers can freely enter the computer network.

Full Access
Question # 5

What physical security measure is necessary to control access to company information?

A.

Air-conditioning

B.

Username and password

C.

The use of break-resistant glass and doors with the right locks, frames and hinges

D.

Prohibiting the use of USB sticks

Full Access
Question # 6

You apply for a position in another company and get the job. Along with your contract, you are

asked to sign a code of conduct. What is a code of conduct?

A.

A code of conduct specifies how employees are expected to conduct themselves and is the

same for all companies.

B.

A code of conduct is a standard part of a labor contract.

C.

A code of conduct differs from company to company and specifies, among other things, the

rules of behavior with regard to the usage of information systems.

Full Access
Question # 7

What is the definition of the Annual Loss Expectancy?

A.

The Annual Loss Expectancy is the amount of damage that can occur as a result of an incident

during the year.

B.

The Annual Loss Expectancy is the size of the damage claims resulting from not having

carried out risk analyses effectively.

C.

The Annual Loss Expectancy is the average damage calculated by insurance companies for

businesses in a country.

D.

The Annual Loss Expectancy is the minimum amount for which an organization must insure

itself.

Full Access
Question # 8

My user profile specifies which network drives I can read and write to. What is the name of the

type of logical access management wherein my access and rights are determined centrally?

A.

Discretionary Access Control (DAC)

B.

Mandatory Access Control (MAC)

C.

Public Key Infrastructure (PKI)

Full Access
Go to page: