aiotestking uk

ISFS Exam Questions - Online Test


ISFS Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

New EXIN,Inc ISFS Exam Dumps Collection (Question 5 - Question 14)

New Questions 5

Why do organizations have an information security policy?

A. In order to demonstrate the operation of the Plan-Do-Check-Act cycle within an organization.

B. In order to ensure that staff do not break any laws.

C. In order to give direction to how information security is set up within an organization.

D. In order to ensure that everyone knows who is responsible for carrying out the backup procedures.

Answer: : C


New Questions 6

Why is air-conditioning placed in the server room?

A. In the server room the air has to be cooled and the heat produced by the equipment has to be extracted. The air in the room is also dehumidified and filtered.

B. When a company wishes to cool its offices, the server room is the best place. This way, no office space needs to be sacrificed for such a large piece of equipment.

C. It is not pleasant for the maintenance staff to have to work in a server room that is too warm.

D. Backup tapes are made from thin plastic which cannot withstand high temperatures. Therefore, if it gets too hot in a server room, they may get damaged.

Answer: A


New Questions 7

Your company has to ensure that it meets the requirements set down in personal data protection legislation. What is the first thing you should do?

A. Make the employees responsible for submitting their personal data.

B. Translate the personal data protection legislation into a privacy policy that is geared to the company and the contracts with the customers.

C. Appoint a person responsible for supporting managers in adhering to the policy.

D. Issue a ban on the provision of personal information.

Answer: B


New Questions 8

You are the owner of the courier company SpeeDelivery. You employ a few people who, while waiting to make a delivery, can carry out other tasks. You notice, however, that they use this time

to send and read their private mail and surf the Internet. In legal terms, in which way can the use

of the Internet and e-mail facilities be best regulated?

A. Installing an application that makes certain websites no longer accessible and that filters attachments in e-mails

B. Drafting a code of conduct for the use of the Internet and e-mail in which the rights and obligations of both the employer and staff are set down

C. Implementing privacy regulations

D. Installing a virus scanner

Answer: B


New Questions 9

You are a consultant and are regularly hired by the Ministry of Defense to perform analysis. Since the assignments are irregular, you outsource the administration of your business to temporary workers. You donu2021t want the temporary workers to have access to your reports. Which reliability aspect of the information in your reports must you protect?

A. Availability

B. Integrity

C. Confidentiality

Answer: C


New Questions 10

You have just started working at a large organization. You have been asked to sign a code of conduct as well as a contract. What does the organization wish to achieve with this?

A. A code of conduct helps to prevent the misuse of IT facilities.

B. A code of conduct is a legal obligation that organizations have to meet.

C. A code of conduct prevents a virus outbreak.

D. A code of conduct gives staff guidance on how to report suspected misuses of IT facilities.

Answer: A


New Questions 11

You have a small office in an industrial areA. You would like to analyze the risks your company faces. The office is in a pretty remote location; therefore, the possibility of arson is not entirely out of the question. What is the relationship between the threat of fire and the risk of fire?

A. The risk of fire is the threat of fire multiplied by the chance that the fire may occur and the consequences thereof.

B. The threat of fire is the risk of fire multiplied by the chance that the fire may occur and the consequences thereof.

Answer: A


New Questions 12

Three characteristics determine the reliability of information. Which characteristics are these?

A. Availability, Integrity and Correctness

B. Availability, Integrity and Confidentiality

C. Availability, Nonrepudiation and Confidentiality

Answer: B


New Questions 13

A non-human threat for computer systems is a flood. In which situation is a flood always a relevant threat?

A. If the risk analysis has not been carried out.

B. When computer systems are kept in a cellar below ground level.

C. When the computer systems are not insured.

D. When the organization is located near a river.

Answer: B


New Questions 14

You are the owner of a growing company, SpeeDelivery, which provides courier services.

You decide that it is time to draw up a risk analysis for your information system. This includes an inventory of the threats and risks. What is the relation between a threat, risk and risk analysis?

A. A risk analysis identifies threats from the known risks.

B. A risk analysis is used to clarify which threats are relevant and what risks they involve.

C. A risk analysis is used to remove the risk of a threat.

D. Risk analyses help to find a balance between threats and risks.

Answer: B


P.S. Easily pass ISFS Exam with Allfreedumps 100% Correct Dumps & pdf vce, Try Free: https://www.allfreedumps.com/ISFS-dumps.html ( New Questions)