[Free] 2019(Nov) EnsurePass Exin ISFS Dumps with VCE and PDF 11-20

Get Full Version of the Exam

Question No.11

Which of the following measures is a preventive measure?

  1. Installing a logging system that enables changes in a system to be recognized

  2. Shutting down all internet traffic after a hacker has gained access to the company systems

  3. Putting sensitive information in a safe

  4. Classifying a risk as acceptable because the cost of addressing the threat is higher than the value of the information at risk

Correct Answer: C

Question No.12

What is a risk analysis used for?

  1. A risk analysis is used to express the value of information for an organization in monetary terms.

  2. A risk analysis is used to clarify to management their responsibilities.

  3. A risk analysis is used in conjunction with security measures to reduce risks to an acceptable level.

  4. A risk analysis is used to ensure that security measures are deployed in a cost-effective and timely fashion.

Correct Answer: D

Question No.13

A well executed risk analysis provides a great deal of useful information. A risk analysis has four main objectives. What is not one of the four main objectives of a risk analysis?

  1. Identifying assets and their value

  2. Determining the costs of threats

  3. Establishing a balance between the costs of an incident and the costs of a security measure

  4. Determining relevant vulnerabilities and threats

Correct Answer: B

Question No.14

What is an example of a security incident?

  1. The lighting in the department no longer works.

  2. A member of staff loses a laptop.

  3. You cannot set the correct fonts in your word processing software.

  4. A file is saved under an incorrect name.

Correct Answer: B

Question No.15

Which of the following measures is a corrective measure?

  1. Incorporating an Intrusion Detection System (IDS) in the design of a computer centre

  2. Installing a virus scanner in an information system

  3. Making a backup of the data that has been created or altered that day

  4. Restoring a backup of the correct database after a corrupt copy of the database was written over the original

Correct Answer: D

Question No.16

We can acquire and supply information in various ways. The value of the information depends on whether it is reliable. What are the reliability aspects of information?

  1. Availability, Information Value and Confidentiality

  2. Availability, Integrity and Confidentiality

  3. Availability, Integrity and Completeness

  4. Timeliness, Accuracy and Completeness

Correct Answer: B

Question No.17

Your company has to ensure that it meets the requirements set down in personal data protection legislation. What is the first thing you should do?

  1. Make the employees responsible for submitting their personal data.

  2. Translate the personal data protection legislation into a privacy policy that is geared to the company and the contracts with the customers.

  3. Appoint a person responsible for supporting managers in adhering to the policy.

  4. Issue a ban on the provision of personal information.

Correct Answer: B

Question No.18

What sort of security does a Public Key Infrastructure (PKI) offer?

  1. It provides digital certificates which can be used to digitally sign documents. Such signatures irrefutably determine from whom a document was sent.

  2. Having a PKI shows customers that a web-based business is secure.

  3. By providing agreements, procedures and an organization structure, a PKI defines which person or which system belongs to which specific public key.

  4. A PKI ensures that backups of company data are made on a regular basis.

Correct Answer: C

Question No.19

An employee in the administrative department of Smiths Consultants Inc. finds out that the expiry date of a contract with one of the clients is earlier than the start date. What type of measure could prevent this error?

  1. Availability measure

  2. Integrity measure

  3. Organizational measure

  4. Technical measure

Correct Answer: D

Question No.20

What is the greatest risk for an organization if no information security policy has been defined?

  1. If everyone works with the same account, it is impossible to find out who worked on what.

  2. Information security activities are carried out by only a few people.

  3. Too many measures are implemented.

  4. It is not possible for an organization to implement information security in a consistent manner.

Correct Answer: D

Get Full Version of the Exam
ISFS Dumps