You own a small company in a remote industrial areA. Lately, the alarm regularly goes off in the middle of the night. It takes quite a bit of time to respond to it and it seems to be a false alarm every time. You decide to set up a hidden camerA. What is such a measure called?
A. Detective measure
B. Preventive measure
C. Repressive measure
A Dutch company requests to be listed on the American Stock Exchange. Which legislation within the scope of information security is relevant in this case?
A. Public Records Act
B. Dutch Tax Law
C. Sarbanes-Oxley Act
D. Security regulations for the Dutch government
Which is a legislative or regulatory act related to information security that can be imposed upon all organizations?
A. ISO/IEC 27001:2005
B. Intellectual Property Rights
C. ISO/IEC 27002:2005
D. Personal data protection legislation
You are the first to arrive at work in the morning and notice that the CD ROM on which you saved contracts yesterday has disappeared. You were the last to leave yesterday. When should you report this information security incident?
A. This incident should be reported immediately.
B. You should first investigate this incident yourself and try to limit the damage.
C. You should wait a few days before reporting this incident. The CD ROM can still reappear and, in that case, you will have made a fuss for nothing.
You read in the newspapers that the ex-employee of a large company systematically deleted files out of revenge on his manager. Recovering these files caused great losses in time and money. What is this kind of threat called?
A. Human threat
B. Natural threat
C. Social Engineering
What is an example of a good physical security measure?
A. All employees and visitors carry an access pass.
B. Printers that are defective or have been replaced are immediately removed and given away as garbage for recycling.
C. Maintenance staff can be given quick and unimpeded access to the server area in the event of disaster.
Which measure assures that valuable information is not left out available for the taking?
A. Clear desk policy
B. Infra-red detection
C. Access passes
Susan sends an email to Paul. Who determines the meaning and the value of information in this email?
A. Paul, the recipient of the information.
B. Paul and Susan, the sender and the recipient of the information.
C. Susan, the sender of the information.
A couple of years ago you started your company which has now grown from 1 to 20 employees. Your companys information is worth more and more and gone are the days when you could keep it all in hand yourself. You are aware that you have to take measures, but what should they be? You hire a consultant who advises you to start with a qualitative risk analysis. What is a qualitative risk analysis?
A. This analysis follows a precise statistical probability calculation in order to calculate exact loss caused by damage.
B. This analysis is based on scenarios and situations and produces a subjective view of the possible threats.
You are the owner of the SpeeDelivery courier service. Last year you had a firewall installed. You now discover that no maintenance has been performed since the installation. What is the biggest risk because of this?
A. The risk that hackers can do as they wish on the network without detection
B. The risk that fire may break out in the server room
C. The risk of a virus outbreak
D. The risk of undesired e-mails
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EXIN exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ISFS exam preparations and EXIN certification application, do not hesitate to visit our Vcedump.com to find your solutions here.