최신 ISFS 무료덤프 - EXIN Information Security Foundation based on ISO/IEC 27001

Which of these is not malicious software?

정답: D
Which is a legislative or regulatory act related to information security that can be imposed upon all organizations?

정답: D
Three characteristics determine the reliability of information. Which characteristics are these?

정답: C
What is an example of a good physical security measure?

정답: B
You are the owner of the SpeeDelivery courier service. Last year you had a firewall installed. You now discover that no maintenance has been performed since the installation. What is the biggest risk because of this?

정답: B
You are the owner of the courier company SpeeDelivery. You employ a few people who, while waiting to make a delivery, can carry out other tasks. You notice, however, that they use this time to send and read their private mail and surf the Internet. In legal terms, in which way can the use of the Internet and e-mail facilities be best regulated?

정답: A
Who is authorized to change the classification of a document?

정답: C
Logging in to a computer system is an access-granting process consisting of three steps: identification, authentication and authorization. What occurs during the first step of this process: identification?

정답: D

우리와 연락하기

문의할 점이 있으시면 메일을 보내오세요. 12시간이내에 답장드리도록 하고 있습니다.

근무시간: ( UTC+9 ) 9:00-24:00
월요일~토요일

서포트: 바로 연락하기