Summer Special 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 591klB651

Note! The ISFS Exam is no longer available.

ISFS Information Security Foundation based on ISO/IEC 27002 Questions and Answers

Questions 4

You are the owner of the courier company SpeeDelivery. You have carried out a risk analysis and

now want to determine your risk strategy. You decide to take measures for the large risks but not

for the small risks. What is this risk strategy called?

Options:

A.

Risk bearing

B.

Risk avoiding

C.

Risk neutral

Buy Now
Questions 5

There was a fire in a branch of the company Midwest Insurance. The fire department quickly

arrived at the scene and could extinguish the fire before it spread and burned down the entire

premises. The server, however, was destroyed in the fire. The backup tapes kept in another room

had melted and many other documents were lost for good. What is an example of the indirect

damage caused by this fire?

Options:

A.

Melted backup tapes

B.

Burned computer systems

C.

Burned documents

D.

Water damage due to the fire extinguishers

Buy Now
Questions 6

You work for a flexible employer who doesnt mind if you work from home or on the road. You

regularly take copies of documents with you on a USB memory stick that is not secure. What are

the consequences for the reliability of the information if you leave your USB memory stick behind

on the train?

Options:

A.

The integrity of the data on the USB memory stick is no longer guaranteed.

B.

The availability of the data on the USB memory stick is no longer guaranteed.

C.

The confidentiality of the data on the USB memory stick is no longer guaranteed.

Buy Now
Questions 7

Which of the following measures is a corrective measure?

Options:

A.

Incorporating an Intrusion Detection System (IDS) in the design of a computer centre

B.

Installing a virus scanner in an information system

C.

Making a backup of the data that has been created or altered that day

D.

Restoring a backup of the correct database after a corrupt copy of the database was written

over the original

Buy Now
Questions 8

Midwest Insurance controls access to its offices with a passkey system. We call this a preventive

measure. What are some other measures?

Options:

A.

Detective, repressive and corrective measures

B.

Partial, adaptive and corrective measures

C.

Repressive, adaptive and corrective measures

Buy Now
Questions 9

What is the best way to comply with legislation and regulations for personal data protection?

Options:

A.

Performing a threat analysis

B.

Maintaining an incident register

C.

Performing a vulnerability analysis

D.

Appointing the responsibility to someone

Buy Now
Questions 10

You work for a large organization. You notice that you have access to confidential information that you should not be able to access in your position. You report this security incident to the helpdesk. The incident cycle isinitiated. What are the stages of the security incident cycle?

Options:

A.

Threat, Damage, Incident, Recovery

B.

Threat, Damage, Recovery, Incident

C.

Threat, Incident, Damage, Recovery

D.

Threat, Recovery, Incident, Damage

Buy Now
Questions 11

Which one of the threats listed below can occur as a result of the absence of a physical measure?

Options:

A.

A user can view the files belonging to another user.

B.

A server shuts off because of overheating.

C.

A confidential document is left in the printer.

D.

Hackers can freely enter the computer network.

Buy Now
Questions 12

Logging in to a computer system is an access-granting process consisting of three steps:

identification, authentication and authorization. What occurs during the first step of this process:

identification?

Options:

A.

The first step consists of checking if the user is using the correct certificate.

B.

The first step consists of checking if the user appears on the list of authorized users.

C.

The first step consists of comparing the password with the registered password.

D.

The first step consists of granting access to the information to which the user is authorized.

Buy Now
Exam Code: ISFS
Exam Name: Information Security Foundation based on ISO/IEC 27002
Last Update: Nov 27, 2023
Questions: 80
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 20 Apr 2024