Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

Note! ISFS has been withdrawn.

ISFS Practice Exam Questions with Answers Information Security Foundation based on ISO/IEC 27002 Certification

Question # 6

When we are at our desk, we want the information system and the necessary information to be

available. We want to be able to work with the computer and access the network and our files.

What is the correct definition of availability?

A.

The degree to which the system capacity is enough to allow all users to work with it

B.

The degree to which the continuity of an organization is guaranteed

C.

The degree to which an information system is available for the users

D.

The total amount of time that an information system is accessible to the users

Full Access
Question # 7

What is an example of a non-human threat to the physical environment?

A.

Fraudulent transaction

B.

Corrupted file

C.

Storm

D.

Virus

Full Access
Question # 8

You apply for a position in another company and get the job. Along with your contract, you are

asked to sign a code of conduct. What is a code of conduct?

A.

A code of conduct specifies how employees are expected to conduct themselves and is the

same for all companies.

B.

A code of conduct is a standard part of a labor contract.

C.

A code of conduct differs from company to company and specifies, among other things, the

rules of behavior with regard to the usage of information systems.

Full Access
Question # 9

Which one of the threats listed below can occur as a result of the absence of a physical measure?

A.

A user can view the files belonging to another user.

B.

A server shuts off because of overheating.

C.

A confidential document is left in the printer.

D.

Hackers can freely enter the computer network.

Full Access
Question # 10

Who is authorized to change the classification of a document?

A.

The author of the document

B.

The administrator of the document

C.

The owner of the document

D.

The manager of the owner of the document

Full Access
Question # 11

What action is an unintentional human threat?

A.

Arson

B.

Theft of a laptop

C.

Social engineering

D.

Incorrect use of fire extinguishing equipment

Full Access
Question # 12

We can acquire and supply information in various ways. The value of the information depends on

whether it is reliable. What are the reliability aspects of information?

A.

Availability, Information Value and Confidentiality

B.

Availability, Integrity and Confidentiality

C.

Availability, Integrity and Completeness

D.

Timeliness, Accuracy and Completeness

Full Access