Black Friday Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

Note! ISFS has been withdrawn.

Practice Free ISFS Information Security Foundation based on ISO/IEC 27002 Exam Questions Answers With Explanation

We at Crack4sure are committed to giving students who are preparing for the Exin ISFS Exam the most current and reliable questions . To help people study, we've made some of our Information Security Foundation based on ISO/IEC 27002 exam materials available for free to everyone. You can take the Free ISFS Practice Test as many times as you want. The answers to the practice questions are given, and each answer is explained.

Question # 6

When we are at our desk, we want the information system and the necessary information to be

available. We want to be able to work with the computer and access the network and our files.

What is the correct definition of availability?

A.

The degree to which the system capacity is enough to allow all users to work with it

B.

The degree to which the continuity of an organization is guaranteed

C.

The degree to which an information system is available for the users

D.

The total amount of time that an information system is accessible to the users

Question # 7

What is an example of a non-human threat to the physical environment?

A.

Fraudulent transaction

B.

Corrupted file

C.

Storm

D.

Virus

Question # 8

You apply for a position in another company and get the job. Along with your contract, you are

asked to sign a code of conduct. What is a code of conduct?

A.

A code of conduct specifies how employees are expected to conduct themselves and is the

same for all companies.

B.

A code of conduct is a standard part of a labor contract.

C.

A code of conduct differs from company to company and specifies, among other things, the

rules of behavior with regard to the usage of information systems.

Question # 9

Which one of the threats listed below can occur as a result of the absence of a physical measure?

A.

A user can view the files belonging to another user.

B.

A server shuts off because of overheating.

C.

A confidential document is left in the printer.

D.

Hackers can freely enter the computer network.

Question # 10

Who is authorized to change the classification of a document?

A.

The author of the document

B.

The administrator of the document

C.

The owner of the document

D.

The manager of the owner of the document

Question # 11

What action is an unintentional human threat?

A.

Arson

B.

Theft of a laptop

C.

Social engineering

D.

Incorrect use of fire extinguishing equipment

Question # 12

We can acquire and supply information in various ways. The value of the information depends on

whether it is reliable. What are the reliability aspects of information?

A.

Availability, Information Value and Confidentiality

B.

Availability, Integrity and Confidentiality

C.

Availability, Integrity and Completeness

D.

Timeliness, Accuracy and Completeness