[Free] 2019(Nov) EnsurePass Exin ISFS Dumps with VCE and PDF 41-50

Get Full Version of the Exam
http://www.EnsurePass.com/ISFS.html

Question No.41

Under which condition is an employer permitted to check if Internet and email services in the workplace are being used for private purposes?

  1. The employer is permitted to check this if the employee is informed after each instance of checking.

  2. The employer is permitted to check this if the employees are aware that this could happen.

  3. The employer is permitted to check this if a firewall is also installed.

  4. The employer is in no way permitted to check the use of IT services by employees.

Correct Answer: B

Question No.42

You have a small office in an industrial areA. You would like to analyze the risks your company faces. The office is in a pretty remote location; therefore, the possibility of arson is not entirely out of the question. What is the relationship between the threat of fire and the risk of fire?

  1. The risk of fire is the threat of fire multiplied by the chance that the fire may occur and the consequences thereof.

  2. The threat of fire is the risk of fire multiplied by the chance that the fire may occur and the consequences thereof.

Correct Answer: A

Question No.43

You work for a flexible employer who doesnt mind if you work from home or on the road. You regularly take copies of documents with you on a USB memory stick that is not secure. What are the consequences for the reliability of the information if you leave your USB memory stick behind on the train?

  1. The integrity of the data on the USB memory stick is no longer guaranteed.

  2. The availability of the data on the USB memory stick is no longer guaranteed.

  3. The confidentiality of the data on the USB memory stick is no longer guaranteed.

  4. none of the above

Correct Answer: C

Question No.44

What is the best way to comply with legislation and regulations for personal data protection?

  1. Performing a threat analysis

  2. Maintaining an incident register

  3. Performing a vulnerability analysis

  4. Appointing the responsibility to someone

Correct Answer: D

Question No.45

There was a fire in a branch of the company Midwest Insurance. The fire department quickly arrived at the scene and could extinguish the fire before it spread and burned down the entire premises. The server, however, was destroyed in the fire. The backup tapes kept in another room had melted and many other documents were lost for good. What is an example of the indirect damage caused by this fire?

  1. Melted backup tapes

  2. Burned computer systems

  3. Burned documents

  4. Water damage due to the fire extinguishers

Correct Answer: D

Question No.46

There is a network printer in the hallway of the company where you work. Many employees dont pick up their printouts immediately and leave them in the printer. What are the consequences of this to the reliability of the information?

  1. The integrity of the information is no longer guaranteed.

  2. The availability of the information is no longer guaranteed.

  3. The confidentiality of the information is no longer guaranteed.

  4. none of the above

Correct Answer: C

Question No.47

What is the relationship between data and information?

  1. Data is structured information.

  2. Information is the meaning and value assigned to a collection of data.

Correct Answer: B

Question No.48

What is a human threat to the reliability of the information on your company website?

  1. One of your employees commits an error in the price of a product on your website.

  2. The computer hosting your website is overloaded and crashes. Your website is offline.

  3. Because of a lack of maintenance, a fire hydrant springs a leak and floods the premises. Your employees cannot come into the office and therefore can not keep the information on the website up to date.

  4. none of the above

Correct Answer: A

Question No.49

Midwest Insurance grades the monthly report of all claimed losses per insured as confidential. What is accomplished if all other reports from this insurance office are also assigned the

appropriate grading?

  1. The costs for automating are easier to charge to the responsible departments.

  2. A determination can be made as to which report should be printed first and which one can waita little longer.

  3. Everyone can easiliy see how sensitive the reports#39; contents are by consulting the grading label.

  4. Reports can be developed more easily and with fewer errors.

Correct Answer: C

Question No.50

Logging in to a computer system is an access-granting process consisting of three steps: identification, authentication and authorization.

What occurs during the first step of this process: identification?

  1. The first step consists of checking if the user is using the correct certificate.

  2. The first step consists of checking if the user appears on the list of authorized users.

  3. The first step consists of comparing the password with the registered password.

  4. The first step consists of granting access to the information to which the user is authorized.

Correct Answer: B

Get Full Version of the Exam
ISFS Dumps
ISFS VCE and PDF

Leave a Reply