ISFS | The Secret of EXIN,Inc ISFS exam dumps


New EXIN,Inc ISFS Exam Dumps Collection (Question 2 - Question 11)

Question No: 2

What is a human threat to the reliability of the information on your company website?

A. One of your employees commits an error in the price of a product on your website.

B. The computer hosting your website is overloaded and crashes. Your website is offline.

C. Because of a lack of maintenance, a fire hydrant springs a leak and floods the premises.

Your employees cannot come into the office and therefore can not keep the information on the website up to date.

Answer: A

Question No: 3

What is the goal of an organization's security policy?

A. To provide direction and support to information security

B. To define all threats to and measures for ensuring information security

C. To document all incidents that threaten the reliability of information

D. To document all procedures required to maintain information security

Answer: A

Question No: 4

You apply for a position in another company and get the job. Along with your contract, you are asked to sign a code of conduct. What is a code of conduct?

A. A code of conduct specifies how employees are expected to conduct themselves and is the same for all companies.

B. A code of conduct is a standard part of a labor contract.

C. A code of conduct differs from company to company and specifies, among other things, the

rules of behavior with regard to the usage of information systems.

Question No: 5

You have an office that designs corporate logos. You have been working on a draft for a large

client. Just as you are going to press the <save> button, the screen goes blank. The hard disk is

damaged and cannot be repaired. You find an early version of the design in your mail folder and

you reproduce the draft for the customer. What is such a measure called?

A. Corrective measure

B. Preventive measure

C. Reductive measure

Answer: A

Question No: 6

The company Midwest Insurance has taken many measures to protect its information. It uses an Information Security Management System, the input and output of data in applications is validated, confidential documents are sent in encrypted form and staff use tokens to access information systems. Which of these is not a technical measure?

A. Information Security Management System

B. The use of tokens to gain access to information systems

C. Validation of input and output data in applications

D. Encryption of information

Answer: A

Question No: 7

What sort of security does a Public Key Infrastructure (PKI) offer?

A. It provides digital certificates which can be used to digitally sign documents. Such signatures

irrefutably determine from whom a document was sent.

B. Having a PKI shows customers that a web-based business is secure.

C. By providing agreements, procedures and an organization structure, a PKI defines which

person or which system belongs to which specific public key.

D. A PKI ensures that backups of company data are made on a regular basis.

Answer: C

Question No: 8

You are the owner of the courier company SpeeDelivery. You employ a few people who, while waiting to make a delivery, can carry out other tasks. You notice, however, that they use this time

to send and read their private mail and surf the Internet. In legal terms, in which way can the use

of the Internet and e-mail facilities be best regulated?

A. Installing an application that makes certain websites no longer accessible and that filters attachments in e-mails

B. Drafting a code of conduct for the use of the Internet and e-mail in which the rights and obligations of both the employer and staff are set down

C. Implementing privacy regulations

D. Installing a virus scanner

Answer: B

Question No: 9

What is the relationship between data and information?

A. Data is structured information.

B. Information is the meaning and value assigned to a collection of data.

Answer: B

Question No: 10

You have just started working at a large organization. You have been asked to sign a code of conduct as well as a contract. What does the organization wish to achieve with this?

A. A code of conduct helps to prevent the misuse of IT facilities.

B. A code of conduct is a legal obligation that organizations have to meet.

C. A code of conduct prevents a virus outbreak.

D. A code of conduct gives staff guidance on how to report suspected misuses of IT facilities.

Answer: A

Question No: 11

Why is air-conditioning placed in the server room?

A. In the server room the air has to be cooled and the heat produced by the equipment has to be extracted. The air in the room is also dehumidified and filtered.

B. When a company wishes to cool its offices, the server room is the best place. This way, no office space needs to be sacrificed for such a large piece of equipment.

C. It is not pleasant for the maintenance staff to have to work in a server room that is too warm.

D. Backup tapes are made from thin plastic which cannot withstand high temperatures. Therefore, if it gets too hot in a server room, they may get damaged.

Answer: A

100% Replace EXIN,Inc ISFS Questions & Answers shared by 2passeasy, Get HERE: https://www.2passeasy.com/dumps/ISFS/ (New Q&As)