최신 ISFS 무료덤프 - EXIN Information Security Foundation based on ISO/IEC 27001
A well executed risk analysis provides a great deal of useful information. A risk analysis has four main objectives. What is not one of the four main objectives of a risk analysis?
정답: A
In the organization where you work, information of a very sensitive nature is processed. Management is legally obliged to implement the highest-level security measures. What is this kind of risk strategy called?
정답: C
When we are at our desk, we want the information system and the necessary information to be available. We want to be able to work with the computer and access the network and our files. What is the correct definition of availability?
정답: D
What is the relationship between data and information?
정답: A
Under which condition is an employer permitted to check if Internet and email services in the workplace are being used for private purposes?
정답: C
You work for a large organization. You notice that you have access to confidential information that you should not be able to access in your position. You report this security incident to the helpdesk. The incident cycle isinitiated. What are the stages of the security incident cycle?
정답: A
Your company has to ensure that it meets the requirements set down in personal data protection legislation. What is the first thing you should do?
정답: C
Midwest Insurance controls access to its offices with a passkey system. We call this a preventive measure. What are some other measures?
정답: B