Isfs 3-0
Isfs 3-0
Isfs 3-0
Version 3.0
QUESTION NO: 1
You are the owner of the courier company SpeeDelivery. You employ a few people who,
while waiting to make a delivery, can carry out other tasks. You notice, however, that
they use this time
to send and read their private mail and surf the Internet. In legal terms, in which way can
the use
of the Internet and e-mail facilities be best regulated?
A. Installing an application that makes certain websites no longer accessible and that
filters attachments in e-mails
B. Drafting a code of conduct for the use of the Internet and e-mail in which the rights
and obligations of both the employer and staff are set down
C. Implementing privacy regulations
D. Installing a virus scanner
Answer: B
QUESTION NO: 2
Why is air-conditioning placed in the server room?
A. In the server room the air has to be cooled and the heat produced by the equipment has
to be extracted. The air in the room is also dehumidified and filtered.
B. When a company wishes to cool its offices, the server room is the best place. This
way, no office space needs to be sacrificed for such a large piece of equipment.
C. It is not pleasant for the maintenance staff to have to work in a server room that is too
warm.
D. Backup tapes are made from thin plastic which cannot withstand high temperatures.
Therefore, if it gets too hot in a server room, they may get damaged.
Answer: A
QUESTION NO: 3
Who is authorized to change the classification of a document?
Answer: C
QUESTION NO: 4
The company Midwest Insurance has taken many measures to protect its information. It
uses an
Information Security Management System, the input and output of data in applications is
validated, confidential documents are sent in encrypted form and staff use tokens to
access information systems. Which of these is not a technical measure?
Answer: A
QUESTION NO: 5
What is an example of a physical security measure?
A. A code of conduct that requires staff to adhere to the clear desk policy, ensuring that
confidential information is not left visibly on the desk at the end of the work day
B. An access control policy with passes that have to be worn visibly
C. The encryption of confidential information
D. Special fire extinguishers with inert gas, such as Argon
Answer: D
QUESTION NO: 6
What physical security measure is necessary to control access to company information?
A. Air-conditioning
B. Username and password
C. The use of break-resistant glass and doors with the right locks, frames and hinges
D. Prohibiting the use of USB sticks
Answer: C
QUESTION NO: 7
Why do organizations have an information security policy?
Answer: C
QUESTION NO: 8
You work in the IT department of a medium-sized company. Confidential information
has got into
the wrong hands several times. This has hurt the image of the company. You have been
asked to
propose organizational security measures for laptops at your company. What is the first
step that
you should take?
A. Formulate a policy regarding mobile media (PDAs, laptops, smartphones, USB sticks)
B. Appoint security personnel
C. Encrypt the hard drives of laptops and USB sticks
D. Set up an access control policy
Answer: A
QUESTION NO: 9
You work for a large organization. You notice that you have access to confidential
information that you should not be able to access in your position. You report this
security incident to the helpdesk. The incident cycle isinitiated. What are the stages of the
security incident cycle?
Answer: C
QUESTION NO: 10
Your organization has an office with space for 25 workstations. These workstations are
all fully
equipped and in use. Due to a reorganization 10 extra workstations are added, 5 of which
are
used for a call centre 24 hours per day. Five workstations must always be available. What
physical security measures must be taken in order to ensure this?
A. Obtain an extra office and set up 10 workstations. You would therefore have spare
equipment
that can be used to replace any non-functioning equipment.
B. Obtain an extra office and set up 10 workstations. Ensure that there are security
personnel
both in the evenings and at night, so that staff can work there safely and securely.
C. Obtain an extra office and connect all 10 new workstations to an emergency power
supply and
UPS (Uninterruptible Power Supply). Adjust the access control system to the working
hours of
the new staff. Inform the building security personnel that work will also be carried out in
the
evenings and at night.
D. Obtain an extra office and provide a UPS (Uninterruptible Power Supply) for the five
most
important workstations.
Answer: C
QUESTION NO: 11
Which of the following measures is a preventive measure?
Answer: C
QUESTION NO: 12
What is a risk analysis used for?
Answer: D
QUESTION NO: 13
A well executed risk analysis provides a great deal of useful information. A risk analysis
has four
main objectives. What is not one of the four main objectives of a risk analysis?
Answer: B
QUESTION NO: 14
What is an example of a security incident?
Answer: B
QUESTION NO: 15
Which of the following measures is a corrective measure?
Answer: D
QUESTION NO: 16
We can acquire and supply information in various ways. The value of the information
depends on
whether it is reliable. What are the reliability aspects of information?
Answer: B
QUESTION NO: 17
Your company has to ensure that it meets the requirements set down in personal data
protection
legislation. What is the first thing you should do?
Answer: B
QUESTION NO: 18
What sort of security does a Public Key Infrastructure (PKI) offer?
A. It provides digital certificates which can be used to digitally sign documents. Such
signatures
irrefutably determine from whom a document was sent.
B. Having a PKI shows customers that a web-based business is secure.
C. By providing agreements, procedures and an organization structure, a PKI defines
which
person or which system belongs to which specific public key.
D. A PKI ensures that backups of company data are made on a regular basis.
Answer: C
QUESTION NO: 19
An employee in the administrative department of Smiths Consultants Inc. finds out that
the expiry
date of a contract with one of the clients is earlier than the start date. What type of
measure could
prevent this error?
A. Availability measure
B. Integrity measure
C. Organizational measure
D. Technical measure
Answer: D
QUESTION NO: 20
What is the greatest risk for an organization if no information security policy has been
defined?
A. If everyone works with the same account, it is impossible to find out who worked on
what.
B. Information security activities are carried out by only a few people.
C. Too many measures are implemented.
D. It is not possible for an organization to implement information security in a consistent
manner.
Answer: D
QUESTION NO: 21
What is the objective of classifying information?
Answer: C
QUESTION NO: 22
What do employees need to know to report a security incident?
Answer: A
QUESTION NO: 23
You have just started working at a large organization. You have been asked to sign a
code of
conduct as well as a contract. What does the organization wish to achieve with this?
Answer: A
QUESTION NO: 24
Peter works at the company Midwest Insurance. His manager, Linda, asks him to send
the terms
and conditions for a life insurance policy to Rachel, a client. Who determines the value of
the
information in the insurance terms and conditions document?
QUESTION NO: 25
When we are at our desk, we want the information system and the necessary information
to be
available. We want to be able to work with the computer and access the network and our
files.
What is the correct definition of availability?
A. The degree to which the system capacity is enough to allow all users to work with it
B. The degree to which the continuity of an organization is guaranteed
C. The degree to which an information system is available for the users
D. The total amount of time that an information system is accessible to the users
Answer: C
QUESTION NO: 26
What is an example of a non-human threat to the physical environment?
A. Fraudulent transaction
B. Corrupted file
C. Storm
D. Virus
Answer: C
QUESTION NO: 27
In most organizations, access to the computer or the network is granted only after the user
has
entered a correct username and password. This process consists of 3 steps: identification,
authentication and authorization. What is the purpose of the second step, authentication?
A. In the second step, you make your identity known, which means you are given access
to the
system.
B. The authentication step checks the username against a list of users who have access to
the
system.
C. The system determines whether access may be granted by determining whether the
token
used is authentic.
D. During the authentication step, the system gives you the rights that you need, such as
being
able to read the data in the system.
Answer: C
QUESTION NO: 28
Which of these is not malicious software?
A. Phishing
B. Spyware
C. Virus
D. Worm
Answer: A
QUESTION NO: 29
Some threats are caused directly by people, others have a natural cause. What is an
example of
an intentional human threat?
A. Lightning strike
B. Arson
C. Flood
D. Loss of a USB stick
Answer: B
QUESTION NO: 30
What is the definition of the Annual Loss Expectancy?
A. The Annual Loss Expectancy is the amount of damage that can occur as a result of an
incident
during the year.
B. The Annual Loss Expectancy is the size of the damage claims resulting from not
having
carried out risk analyses effectively.
C. The Annual Loss Expectancy is the average damage calculated by insurance
companies for
businesses in a country.
D. The Annual Loss Expectancy is the minimum amount for which an organization must
insure
itself.
Answer: A
QUESTION NO: 31
What is the most important reason for applying segregation of duties?
Answer: C
QUESTION NO: 32
A non-human threat for computer systems is a flood. In which situation is a flood always
a
relevant threat?
Answer: B
QUESTION NO: 33
Why is compliance important for the reliability of the information?
Answer: B
QUESTION NO: 34
You are the owner of the courier company SpeeDelivery. On the basis of your risk
analysis you
have decided to take a number of measures. You have daily backups made of the server,
keep
the server room locked and install an intrusion alarm system and a sprinkler system.
Which of
these measures is a detective measure?
A. Backup tape
B. Intrusion alarm
C. Sprinkler installation
D. Access restriction to special rooms
Answer: B
QUESTION NO: 35
What is the relationship between data and information?
Answer: B
QUESTION NO: 36
Which type of malware builds a network of contaminated computers?
A. Logic Bomb
B. Storm Worm or Botnet
C. Trojan
D. Virus
Answer: B
QUESTION NO: 37
You work in the office of a large company. You receive a call from a person claiming to
be from
the Helpdesk. He asks you for your password. What kind of threat is this?
A. Natural threat
B. Organizational threat
C. Social Engineering
Answer: C
NO: 38
You are a consultant and are regularly hired by the Ministry of Defense to perform
analyses.
Since the assignments are irregular, you outsource the administration of your business to
temporary workers. You dont want the temporary workers to have access to your reports.
Which
reliability aspect of the information in your reports must you protect?
A. Availability
B. Integrity
C. Confidentiality
Answer: C
QUESTION NO: 39
Your company is in the news as a result of an unfortunate action by one of your
employees. The
phones are ringing off the hook with customers wanting to cancel their contracts. What
do we call
this type of damage?
A. Direct damage
B. Indirect damage
Answer: B
QUESTION NO: 40
An airline company employee notices that she has access to one of the company’s
applications
that she has not used before. Is this an information security incident?
A. Yes
B. No
Answer: B
QUESTION NO: 41
Under which condition is an employer permitted to check if Internet and email services in
the
workplace are being used for private purposes?
A. The employer is permitted to check this if the employee is informed after each
instance of
checking.
B. The employer is permitted to check this if the employees are aware that this could
happen.
C. The employer is permitted to check this if a firewall is also installed.
D. The employer is in no way permitted to check the use of IT services by employees.
Answer: B
QUESTION NO: 42
You have a small office in an industrial areA. You would like to analyze the risks your
company
faces. The office is in a pretty remote location; therefore, the possibility of arson is not
entirely out
of the question. What is the relationship between the threat of fire and the risk of fire?
A. The risk of fire is the threat of fire multiplied by the chance that the fire may occur and
the
consequences thereof.
B. The threat of fire is the risk of fire multiplied by the chance that the fire may occur and
the
consequences thereof.
Answer: A
QUESTION NO: 43
You work for a flexible employer who doesnt mind if you work from home or on the
road. You
regularly take copies of documents with you on a USB memory stick that is not secure.
What are
the consequences for the reliability of the information if you leave your USB memory
stick behind
on the train?
A. The integrity of the data on the USB memory stick is no longer guaranteed.
B. The availability of the data on the USB memory stick is no longer guaranteed.
C. The confidentiality of the data on the USB memory stick is no longer guaranteed.
Answer: C
QUESTION NO: 44
What is the best way to comply with legislation and regulations for personal data
protection?
Answer: D
QUESTION NO: 45
There was a fire in a branch of the company Midwest Insurance. The fire department
quickly
arrived at the scene and could extinguish the fire before it spread and burned down the
entire
premises. The server, however, was destroyed in the fire. The backup tapes kept in
another room
had melted and many other documents were lost for good. What is an example of the
indirect
damage caused by this fire?
Answer: D
QUESTION NO: 46
There is a network printer in the hallway of the company where you work. Many
employees dont
pick up their printouts immediately and leave them in the printer. What are the
consequences of
this to the reliability of the information?
Answer: C
QUESTION NO: 47
What is the relationship between data and information?
Answer: B
QUESTION NO: 48
What is a human threat to the reliability of the information on your company website?
A. One of your employees commits an error in the price of a product on your website.
B. The computer hosting your website is overloaded and crashes. Your website is offline.
C. Because of a lack of maintenance, a fire hydrant springs a leak and floods the
premises. Your
employees cannot come into the office and therefore can not keep the information on the
website up to date.
Answer: A
QUESTION NO: 49
Midwest Insurance grades the monthly report of all claimed losses per insured as
confidential.
What is accomplished if all other reports from this insurance office are also assigned the
appropriate grading?
A. The costs for automating are easier to charge to the responsible departments.
B. A determination can be made as to which report should be printed first and which one
can wait
a little longer.
C. Everyone can easiliy see how sensitive the reports' contents are by consulting the
grading
label.
D. Reports can be developed more easily and with fewer errors.
Answer: C
QUESTION NO: 50
Logging in to a computer system is an access-granting process consisting of three steps:
identification, authentication and authorization. What occurs during the first step of this
process:
identification?
A. The first step consists of checking if the user is using the correct certificate.
B. The first step consists of checking if the user appears on the list of authorized users.
C. The first step consists of comparing the password with the registered password.
D. The first step consists of granting access to the information to which the user is
authorized.
Answer: B
QUESTION NO: 51
In the organization where you work, information of a very sensitive nature is processed.
Management is legally obliged to implement the highest-level security measures. What is
this
kind of risk strategy called?
A. Risk bearing
B. Risk avoiding
C. Risk neutral
Answer: B
QUESTION NO: 52
The act of taking organizational security measures is inextricably linked with all other
measures
that have to be taken. What is the name of the system that guarantees the coherence of
information security in the organization?
Answer: A
QUESTION NO: 53
You are the owner of SpeeDelivery courier service. Because of your companys growth
you have
to think about information security. You know that you have to start creating a policy.
Why is it so
important to have an information security policy as a starting point?
A. The information security policy gives direction to the information security efforts.
B. The information security policy supplies instructions for the daily practice of
information
security.
C. The information security policy establishes which devices will be protected.
D. The information security policy establishes who is responsible for which area of
information
security.
Answer: A
QUESTION NO: 54
What is a repressive measure in the case of a fire?
Answer: B
QUESTION NO: 55
The consultants at Smith Consultants Inc. work on laptops that are protected by
asymmetrical
cryptography. To keep the management of the keys cheap, all consultants use the same
key pair.
What is the companys risk if they operate in this manner?
A. If the private key becomes known all laptops must be supplied with new keys.
B. If the Public Key Infrastructure (PKI) becomes known all laptops must be supplied
with new
keys.
C. If the public key becomes known all laptops must be supplied with new keys.
Answer: A
QUESTION NO: 56
You are the owner of a growing company, SpeeDelivery, which provides courier
services. You
decide that it is time to draw up a risk analysis for your information system. This includes
an
inventory of the threats and risks. What is the relation between a threat, risk and risk
analysis?
Answer: B
QUESTION NO: 57
You apply for a position in another company and get the job. Along with your contract,
you are
asked to sign a code of conduct. What is a code of conduct?
A. A code of conduct specifies how employees are expected to conduct themselves and is
the
same for all companies.
B. A code of conduct is a standard part of a labor contract.
C. A code of conduct differs from company to company and specifies, among other
things, the
rules of behavior with regard to the usage of information systems.
Answer: C
QUESTION NO: 58
My user profile specifies which network drives I can read and write to. What is the name
of the
type of logical access management wherein my access and rights are determined
centrally?
QUESTION NO: 59
Some security measures are optional. Other security measures must always be
implemented.
Which measure(s) must always be implemented?
Answer: D
QUESTION NO: 60
Midwest Insurance controls access to its offices with a passkey system. We call this a
preventive
measure. What are some other measures?
Answer: A
QUESTION NO: 61
You are the owner of the SpeeDelivery courier service. Last year you had a firewall
installed. You
now discover that no maintenance has been performed since the installation. What is the
biggest
risk because of this?
A. The risk that hackers can do as they wish on the network without detection
B. The risk that fire may break out in the server room
C. The risk of a virus outbreak
D. The risk of undesired e-mails
Answer: A
QUESTION NO: 62
A couple of years ago you started your company which has now grown from 1 to 20
employees.
Your companys information is worth more and more and gone are the days when you
could keep
it all in hand yourself. You are aware that you have to take measures, but what should
they be?
You hire a consultant who advises you to start with a qualitative risk analysis. What is a
qualitative risk analysis?
Answer: B
QUESTION NO: 63
Susan sends an email to Paul. Who determines the meaning and the value of information
in this
email?
Answer: A
QUESTION NO: 64
Which measure assures that valuable information is not left out available for the taking?
Answer: A
QUESTION NO: 65
What is an example of a good physical security measure?
Answer: A
QUESTION NO: 66
You read in the newspapers that the ex-employee of a large company systematically
deleted files
out of revenge on his manager. Recovering these files caused great losses in time and
money.
What is this kind of threat called?
A. Human threat
B. Natural threat
C. Social Engineering
Answer: A
QUESTION NO: 67
Which is a legislative or regulatory act related to information security that can be
imposed upon
all organizations?
A. ISO/IEC 27001:2005
B. Intellectual Property Rights
C. ISO/IEC 27002:2005
D. Personal data protection legislation
Answer: D
QUESTION NO: 68
You are the first to arrive at work in the morning and notice that the CD ROM on which
you saved
contracts yesterday has disappeared. You were the last to leave yesterday. When should
you
report this information security incident?
Answer: A
QUESTION NO: 69
A Dutch company requests to be listed on the American Stock Exchange. Which
legislation within
the scope of information security is relevant in this case?
Answer: C
QUESTION NO: 70
You own a small company in a remote industrial areA. Lately, the alarm regularly goes
off in the middle of the night. It takes quite a bit of time to respond to it and it seems to
be a false alarm every time. You decide to set up a hidden camerA. What is such a
measure called?
A. Detective measure
B. Preventive measure
C. Repressive measure
Answer: A
QUESTION NO: 71
At Midwest Insurance, all information is classified. What is the goal of this classification
of information?
Answer: C
QUESTION NO: 72
Which one of the threats listed below can occur as a result of the absence of a physical
measure?
Answer: B
QUESTION NO: 73
What is the best description of a risk analysis?
QUESTION NO: 74
What is the goal of an organization's security policy?
Answer: A
QUESTION NO: 75
The Information Security Manager (ISM) at Smith Consultants Inc. introduces the
following
measures to assure information security:
- The security requirements for the network are specified.
- A test environment is set up for the purpose of testing reports coming from the database.
- The various employee functions are assigned corresponding access rights.
- RFID access passes are introduced for the building.
Which one of these measures is not a technical measure?
Answer: D
QUESTION NO: 76
A company moves into a new building. A few weeks after the move, a visitor appears
unannounced in the office of the director. An investigation shows that visitors passes
grant the same access as the passes of the companys staff. Which kind of security
measure could have prevented this?
Answer: A
QUESTION NO: 77
You have an office that designs corporate logos. You have been working on a draft for a
large
client. Just as you are going to press the <save> button, the screen goes blank. The hard
disk is
damaged and cannot be repaired. You find an early version of the design in your mail
folder and
you reproduce the draft for the customer. What is such a measure called?
A. Corrective measure
B. Preventive measure
C. Reductive measure
Answer: A
QUESTION NO: 78
You are the owner of the courier company SpeeDelivery. You have carried out a risk
analysis and
now want to determine your risk strategy. You decide to take measures for the large risks
but not
for the small risks. What is this risk strategy called?
A. Risk bearing
B. Risk avoiding
C. Risk neutral
Answer: C
QUESTION NO: 79
Three characteristics determine the reliability of information. Which characteristics are
these?
Answer: B
QUESTION NO: 80
What action is an unintentional human threat?
A. Arson
B. Theft of a laptop
C. Social engineering
D. Incorrect use of fire extinguishing equipment
Answer: D