Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dpm65

ISFS Questions and Answers

Question # 4

A Dutch company requests to be listed on the American Stock Exchange. Which legislation within

the scope of information security is relevant in this case?

A.

Public Records Act

B.

Dutch Tax Law

C.

Sarbanes-Oxley Act

D.

Security regulations for the Dutch government

Full Access
Question # 5

Which of the following measures is a corrective measure?

A.

Incorporating an Intrusion Detection System (IDS) in the design of a computer centre

B.

Installing a virus scanner in an information system

C.

Making a backup of the data that has been created or altered that day

D.

Restoring a backup of the correct database after a corrupt copy of the database was written

over the original

Full Access
Question # 6

Midwest Insurance controls access to its offices with a passkey system. We call this a preventive

measure. What are some other measures?

A.

Detective, repressive and corrective measures

B.

Partial, adaptive and corrective measures

C.

Repressive, adaptive and corrective measures

Full Access
Question # 7

A couple of years ago you started your company which has now grown from 1 to 20 employees.

Your companys information is worth more and more and gone are the days when you could keep

it all in hand yourself. You are aware that you have to take measures, but what should they be?

You hire a consultant who advises you to start with a qualitative risk analysis. What is a

qualitative risk analysis?

A.

This analysis follows a precise statistical probability calculation in order to calculate exact loss

caused by damage.

B.

This analysis is based on scenarios and situations and produces a subjective view of the

possible threats.

Full Access
Question # 8

You work in the office of a large company. You receive a call from a person claiming to be from

the Helpdesk. He asks you for your password. What kind of threat is this?

A.

Natural threat

B.

Organizational threat

C.

Social Engineering

Full Access
Question # 9

My user profile specifies which network drives I can read and write to. What is the name of the

type of logical access management wherein my access and rights are determined centrally?

A.

Discretionary Access Control (DAC)

B.

Mandatory Access Control (MAC)

C.

Public Key Infrastructure (PKI)

Full Access
Question # 10

The consultants at Smith Consultants Inc. work on laptops that are protected by asymmetrical

cryptography. To keep the management of the keys cheap, all consultants use the same key pair.

What is the companys risk if they operate in this manner?

A.

If the private key becomes known all laptops must be supplied with new keys.

B.

If the Public Key Infrastructure (PKI) becomes known all laptops must be supplied with new

keys.

C.

If the public key becomes known all laptops must be supplied with new keys.

Full Access
Question # 11

At Midwest Insurance, all information is classified. What is the goal of this classification of information?

A.

To create a manual about how to handle mobile devices

B.

Applying labels making the information easier to recognize

C.

Structuring information according to its sensitivity

Full Access
Question # 12

Why is compliance important for the reliability of the information?

A.

Compliance is another word for reliability. So, if a company indicates that it is compliant, it

means that the information is managed properly.

B.

By meeting the legislative requirements and the regulations of both the government and

internal management, an organization shows that it manages its information in a sound

manner.

C.

When an organization employs a standard such as the ISO/IEC 27002 and uses it

everywhere, it is compliant and therefore it guarantees the reliability of its information.

D.

When an organization is compliant, it meets the requirements of privacy legislation and, in

doing so, protects the reliability of its information.

Full Access
dumpsmate guaranteed to pass
24/7 Customer Support

DumpsMate's team of experts is always available to respond your queries on exam preparation. Get professional answers on any topic of the certification syllabus. Our experts will thoroughly satisfy you.

Site Secure

mcafee secure

TESTED 26 Sep 2022