Question No: 3
Peter works at the company Midwest Insurance. His manager, Linda, asks him to send the terms and conditions for a life insurance policy to Rachel, a client. Who determines the value of the information in the insurance terms and conditions document?
A. The recipient, Rachel
B. The person who drafted the insurance terms and conditions
C. The manager, Linda
D. The sender, Peter
Answer: A
Question No: 4
Which of the following measures is a corrective measure?
A. Incorporating an Intrusion Detection System (IDS) in the design of a computer centre
B. Installing a virus scanner in an information system
C. Making a backup of the data that has been created or altered that day
D. Restoring a backup of the correct database after a corrupt copy of the database was written over the original
Answer: D
Question No: 5
Which of these is not malicious software?
A. Phishing
B. Spyware
C. Virus
D. Worm
Answer: A
Question No: 6
You work for a large organization. You notice that you have access to confidential information that you should not be able to access in your position. You report this security
incident to the helpdesk. The incident cycle isinitiated. What are the stages of the security incident cycle?
A. Threat, Damage, Incident, Recovery
B. Threat, Damage, Recovery, Incident
C. Threat, Incident, Damage, Recovery
D. Threat, Recovery, Incident, Damage
Answer: C
Question No: 7
You are the owner of SpeeDelivery courier service. Because of your companys growth you have to think about information security. You know that you have to start creating a policy. Why is it so important to have an information security policy as a starting point?
A. The information security policy gives direction to the information security efforts.
B. The information security policy supplies instructions for the daily practice of information security.
C. The information security policy establishes which devices will be protected.
D. The information security policy establishes who is responsible for which area of information security.
Answer: A
Question No: 8
What action is an unintentional human threat?
A. Arson
B. Theft of a laptop
C. Social engineering
D. Incorrect use of fire extinguishing equipment
Answer: D
Question No: 9
You work for a flexible employer who doesnt mind if you work from home or on the road.
You regularly take copies of documents with you on a USB memory stick that is not secure. What are the consequences for the reliability of the information if you leave your USB memory stick behind on the train?
A. The integrity of the data on the USB memory stick is no longer guaranteed.
B. The availability of the data on the USB memory stick is no longer guaranteed.
C. The confidentiality of the data on the USB memory stick is no longer guaranteed.
Answer: C
Question No: 10
An employee in the administrative department of Smiths Consultants Inc. finds out that the expiry date of a contract with one of the clients is earlier than the start date. What type of measure could prevent this error?
A. Availability measure
B. Integrity measure
C. Organizational measure
D. Technical measure
Answer: D
Question No: 11
What is an example of a non-human threat to the physical environment?
A. Fraudulent transaction
B. Corrupted file
C. Storm
D. Virus
Answer: C
Question No: 12
Your organization has an office with space for 25 workstations. These workstations are all fully
equipped and in use. Due to a reorganization 10 extra workstations are added, 5 of which are
used for a call centre 24 hours per day. Five workstations must always be available. What physical security measures must be taken in order to ensure this?
A. Obtain an extra office and set up 10 workstations. You would therefore have spare equipment
that can be used to replace any non-functioning equipment.
B. Obtain an extra office and set up 10 workstations. Ensure that there are security personnel
both in the evenings and at night, so that staff can work there safely and securely.
C. Obtain an extra office and connect all 10 new workstations to an emergency power supply and
UPS (Uninterruptible Power Supply). Adjust the access control system to the working hours of
the new staff. Inform the building security personnel that work will also be carried out in the evenings and at night.
D. Obtain an extra office and provide a UPS (Uninterruptible Power Supply) for the five most
important workstations.
Answer: C
100% Far out EXIN,Inc ISFS Questions & Answers shared by Certifytools, Get HERE: https://www.certifytools.com/ISFS-exam.html (New Q&As)