Download Exin.ISFS.PracticeTest.2018-07-30.42q.vcex

Download Exam

File Info

Exam Information Security Foundation (based on ISO/IEC 27002) (EX0-105)
Number ISFS
File Name Exin.ISFS.PracticeTest.2018-07-30.42q.vcex
Size 25 KB
Posted Jul 30, 2018
Downloads: 1
Download Exin.ISFS.PracticeTest.2018-07-30.42q.vcex

How to open VCEX & EXAM Files?

Files with VCEX & EXAM extensions can be opened by ProfExam Simulator.

Purchase

Coupon: MASTEREXAM
With discount: 20%






Demo Questions

Question 1

You work for a large organization. You notice that you have access to confidential information that you should not be able to access in your position. You report this security incident to the helpdesk. The incident cycle isinitiated. What are the stages of the security incident cycle?


  1. Threat, Damage, Incident, Recovery
  2. Threat, Damage, Recovery, Incident
  3. Threat, Incident, Damage, Recovery
  4. Threat, Recovery, Incident, Damage
Correct answer: C



Question 2

Your organization has an office with space for 25 workstations. These workstations are all fully equipped and in use. Due to a reorganization 10 extra workstations are added, 5 of which are used for a call centre 24 hours per day. Five workstations must always be available. What physical security measures must be taken in order to ensure this?


  1. Obtain an extra office and set up 10 workstations. You would therefore have spare equipment that can be used to replace any non-functioning equipment.
  2. Obtain an extra office and set up 10 workstations. Ensure that there are security personnel both in the evenings and at night, so that staff can work there safely and securely.
  3. Obtain an extra office and connect all 10 new workstations to an emergency power supply and UPS (Uninterruptible Power Supply). Adjust the access control system to the working hours of the new staff. Inform the building security personnel that work will also be carried out in the evenings and at night.
  4. Obtain an extra office and provide a UPS (Uninterruptible Power Supply) for the five most important workstations.
Correct answer: C



Question 3

Which of the following measures is a preventive measure?


  1. Installing a logging system that enables changes in a system to be recognized
  2. Shutting down all internet traffic after a hacker has gained access to the company systems
  3. Putting sensitive information in a safe
  4. Classifying a risk as acceptable because the cost of addressing the threat is higher than the value of the information at risk
Correct answer: C



Question 4

What is a risk analysis used for?


  1. A risk analysis is used to express the value of information for an organization in monetary terms.
  2. A risk analysis is used to clarify to management their responsibilities.
  3. A risk analysis is used in conjunction with security measures to reduce risks to an acceptable level.
  4. A risk analysis is used to ensure that security measures are deployed in a cost-effective and timely fashion.
Correct answer: D



Question 5

A well executed risk analysis provides a great deal of useful information. A risk analysis has four main objectives. What is not one of the four main objectives of a risk analysis?


  1. Identifying assets and their value
  2. Determining the costs of threats
  3. Establishing a balance between the costs of an incident and the costs of a security measure
  4. Determining relevant vulnerabilities and threats
Correct answer: B



Question 6

What is an example of a security incident?


  1. The lighting in the department no longer works.
  2. A member of staff loses a laptop.
  3. You cannot set the correct fonts in your word processing software.
  4. A file is saved under an incorrect name.
Correct answer: B



Question 7

Which of the following measures is a corrective measure?


  1. Incorporating an Intrusion Detection System (IDS) in the design of a computer centre
  2. Installing a virus scanner in an information system
  3. Making a backup of the data that has been created or altered that day
  4. Restoring a backup of the correct database after a corrupt copy of the database was written over the original
Correct answer: D



Question 8

We can acquire and supply information in various ways. The value of the information depends on whether it is reliable. What are the reliability aspects of information?


  1. Availability, Information Value and Confidentiality
  2. Availability, Integrity and Confidentiality
  3. Availability, Integrity and Completeness
  4. Timeliness, Accuracy and Completeness
Correct answer: B



Question 9

Your company has to ensure that it meets the requirements set down in personal data protection legislation. What is the first thing you should do?


  1. Make the employees responsible for submitting their personal data.
  2. Translate the personal data protection legislation into a privacy policy that is geared to the company and the contracts with the customers.
  3. Appoint a person responsible for supporting managers in adhering to the policy.
  4. Issue a ban on the provision of personal information.
Correct answer: B



Question 10

What sort of security does a Public Key Infrastructure (PKI) offer?


  1. It provides digital certificates which can be used to digitally sign documents. Such signatures irrefutably determine from whom a document was sent.
  2. Having a PKI shows customers that a web-based business is secure.
  3. By providing agreements, procedures and an organization structure, a PKI defines which person or which system belongs to which specific public key.
  4. A PKI ensures that backups of company data are made on a regular basis.
Correct answer: C









CONNECT US

Facebook

Twitter

PROFEXAM WITH A 20% DISCOUNT

You can buy ProfExam with a 20% discount!



HOW TO OPEN VCEX FILES

Use ProfExam Simulator to open VCEX files