aiotestking uk

ISFS Exam Questions - Online Test


ISFS Premium VCE File

Learn More 100% Pass Guarantee - Dumps Verified - Instant Download
150 Lectures, 20 Hours

New EXIN,Inc ISFS Exam Dumps Collection (Question 3 - Question 12)

Question No: 3

Peter works at the company Midwest Insurance. His manager, Linda, asks him to send the terms and conditions for a life insurance policy to Rachel, a client. Who determines the value of the information in the insurance terms and conditions document?

A. The recipient, Rachel

B. The person who drafted the insurance terms and conditions

C. The manager, Linda

D. The sender, Peter

Answer: A


Question No: 4

Which of the following measures is a corrective measure?

A. Incorporating an Intrusion Detection System (IDS) in the design of a computer centre

B. Installing a virus scanner in an information system

C. Making a backup of the data that has been created or altered that day

D. Restoring a backup of the correct database after a corrupt copy of the database was written over the original

Answer: D


Question No: 5

Which of these is not malicious software?

A. Phishing

B. Spyware

C. Virus

D. Worm

Answer: A


Question No: 6

You work for a large organization. You notice that you have access to confidential information that you should not be able to access in your position. You report this security

incident to the helpdesk. The incident cycle isinitiated. What are the stages of the security incident cycle?

A. Threat, Damage, Incident, Recovery

B. Threat, Damage, Recovery, Incident

C. Threat, Incident, Damage, Recovery

D. Threat, Recovery, Incident, Damage

Answer: C


Question No: 7

You are the owner of SpeeDelivery courier service. Because of your companys growth you have to think about information security. You know that you have to start creating a policy. Why is it so important to have an information security policy as a starting point?

A. The information security policy gives direction to the information security efforts.

B. The information security policy supplies instructions for the daily practice of information security.

C. The information security policy establishes which devices will be protected.

D. The information security policy establishes who is responsible for which area of information security.

Answer: A


Question No: 8

What action is an unintentional human threat?

A. Arson

B. Theft of a laptop

C. Social engineering

D. Incorrect use of fire extinguishing equipment

Answer: D


Question No: 9

You work for a flexible employer who doesnt mind if you work from home or on the road.

You regularly take copies of documents with you on a USB memory stick that is not secure. What are the consequences for the reliability of the information if you leave your USB memory stick behind on the train?

A. The integrity of the data on the USB memory stick is no longer guaranteed.

B. The availability of the data on the USB memory stick is no longer guaranteed.

C. The confidentiality of the data on the USB memory stick is no longer guaranteed.

Answer: C


Question No: 10

An employee in the administrative department of Smiths Consultants Inc. finds out that the expiry date of a contract with one of the clients is earlier than the start date. What type of measure could prevent this error?

A. Availability measure

B. Integrity measure

C. Organizational measure

D. Technical measure

Answer: D


Question No: 11

What is an example of a non-human threat to the physical environment?

A. Fraudulent transaction

B. Corrupted file

C. Storm

D. Virus

Answer: C


Question No: 12

Your organization has an office with space for 25 workstations. These workstations are all fully

equipped and in use. Due to a reorganization 10 extra workstations are added, 5 of which are

used for a call centre 24 hours per day. Five workstations must always be available. What physical security measures must be taken in order to ensure this?

A. Obtain an extra office and set up 10 workstations. You would therefore have spare equipment

that can be used to replace any non-functioning equipment.

B. Obtain an extra office and set up 10 workstations. Ensure that there are security personnel

both in the evenings and at night, so that staff can work there safely and securely.

C. Obtain an extra office and connect all 10 new workstations to an emergency power supply and

UPS (Uninterruptible Power Supply). Adjust the access control system to the working hours of

the new staff. Inform the building security personnel that work will also be carried out in the evenings and at night.

D. Obtain an extra office and provide a UPS (Uninterruptible Power Supply) for the five most

important workstations.

Answer: C


100% Far out EXIN,Inc ISFS Questions & Answers shared by Certifytools, Get HERE: https://www.certifytools.com/ISFS-exam.html (New Q&As)