최신 ISFS 무료덤프 - EXIN Information Security Foundation based on ISO/IEC 27001
Which of these is not malicious software?
정답: D
Which is a legislative or regulatory act related to information security that can be imposed upon all organizations?
정답: D
Three characteristics determine the reliability of information. Which characteristics are these?
정답: C
What is an example of a good physical security measure?
정답: B
You are the owner of the SpeeDelivery courier service. Last year you had a firewall installed. You now discover that no maintenance has been performed since the installation. What is the biggest risk because of this?
정답: B
You are the owner of the courier company SpeeDelivery. You employ a few people who, while waiting to make a delivery, can carry out other tasks. You notice, however, that they use this time to send and read their private mail and surf the Internet. In legal terms, in which way can the use of the Internet and e-mail facilities be best regulated?
정답: A
Who is authorized to change the classification of a document?
정답: C
Logging in to a computer system is an access-granting process consisting of three steps: identification, authentication and authorization. What occurs during the first step of this process: identification?
정답: D