2014年1月1日星期三

EXINのISFS認定試験に出題される可能性が高い問題は何だろう

IT-Passports.comはIT認定試験に関連する資料の専門の提供者として、受験生の皆さんに最も優秀な試験ISFS参考書を提供することを目標としています。他のサイトと比較して、IT-Passports.comは皆さんにもっと信頼されています。なぜでしょうか。それはIT-Passports.comは長年の経験を持っていて、ずっとIT認定試験の研究に取り組んでいて、試験についての多くの規則を総括しましたから。そうすると、IT-Passports.comのISFS教材は高い的中率を持つことができます。これはまた試験の合格率を保証します。従って、IT-Passports.comは皆の信頼を得ました。

弊社のEXINのISFS勉強資料を利用したら、きっと試験を受けるための時間とお金を節約できます。IT-Passports.comのEXINのISFS問題集を買う前に、一部の問題と解答を無料にダウンロードすることができます。PDFのバージョンとソフトウェアのバージョンがありますから、ソフトウェアのバージョンを必要としたら、弊社のカスタマーサービススタッフから取得してください。

今の競争の激しいのIT業界の中にEXIN ISFS認定試験に合格して、自分の社会地位を高めることができます。弊社のIT業で経験豊富な専門家たちが正確で、合理的なEXIN ISFS認証問題集を作り上げました。 弊社の勉強の商品を選んで、多くの時間とエネルギーを節約こともできます。

IT-Passports.comのISFS参考書は間違いなくあなたが一番信頼できるISFS試験に関連する資料です。まだそれを信じていないなら、すぐに自分で体験してください。そうすると、きっと私の言葉を信じるようになります。IT-Passports.comのサイトをクリックして問題集のデモをダウンロードすることができますから、ご利用ください。PDF版でもソフト版でも提供されていますから、先ず体験して下さい。問題集の品質を自分自身で確かめましょう。

IT-Passports.comは多くの人に便利を与えるとともに、多くの人の夢が実現させるサイトでございます。もし君はまだIT試験で心配すれば、私達IT-Passports.comの問題集を選んでください。IT-Passports.comは長年の研究をわたって研ITの認証試験に関する品質が高く、範囲は広い教育資料が開発しました。それは確かに君の試験に役に立つとみられます。

EXINのISFS試験はIT領域で人気がある重要な試験です。我々はIT領域の人々にショートカットを提供するために、最高のスタディガイドと最高のオンラインサービスを用意して差し上げます。IT-Passports.comの EXINのISFS試験問題集は全ての試験の内容と答案に含まれています。IT-Passports.comの模擬テストを利用したら、これはあなたがずっと全力を尽くてもらいたいもののことが分かって、しかもそれは正に試験の準備をすることを意識します。

試験番号:ISFS問題集
試験科目:EXIN 「Information Security Foundation based on ISO/IEC 27002」
問題と解答:全80問

購入前にお試し,私たちの試験の質問と回答のいずれかの無料サンプルをダウンロード:http://www.it-passports.com/ISFS.html

NO.1 You are the owner of the courier company SpeeDelivery. You employ a few people who, while waiting to
make a delivery, can carry out other tasks. You notice, however, that they use this time to send and read
their private mail and surf the Internet. In legal terms, in which way can the use of the Internet and e-mail
facilities be best regulated?
A. Installing an application that makes certain websites no longer accessible and that filters attachments
in e-mails
B. Drafting a code of conduct for the use of the Internet and e-mail in which the rights and
obligations of both the employer and staff are set down
C. Implementing privacy regulations
D. Installing a virus scanner
Answer: B

EXIN練習問題   ISFS   ISFS   ISFS

NO.2 Your organization has an office with space for 25 workstations. These workstations are all fully
equipped and in use. Due to a reorganization 10 extra workstations are added, 5 of which are used for a
call centre 24 hours per day. Five workstations must always be available. What physical security
measures must be taken in order to ensure this?
A. Obtain an extra office and set up 10 workstations. You would therefore have spare equipment that can
be used to replace any non-functioning equipment.
B. Obtain an extra office and set up 10 workstations. Ensure that there are security personnel both in the
evenings and at night, so that staff can work there safely and securely.
C. Obtain an extra office and connect all 10 new workstations to an emergency power supply and UPS
(Uninterruptible Power Supply). Adjust the access control system to the working hours of the new staff.
Inform the building security personnel that work will also be carried out in the evenings and at night.
D. Obtain an extra office and provide a UPS (Uninterruptible Power Supply) for the five most important
workstations.
Answer: C

EXIN   ISFS認証試験   ISFS   ISFS過去問   ISFS認定試験

NO.3 Why is air-conditioning placed in the server room.?
A. In the server room the air has to be cooled and the heat produced by the equipment has to be
extracted. The air in the room is also dehumidified and filtered.
B. When a company wishes to cool its offices, the server room is the best place. This way, no office space
needs to be sacrificed for such a large piece of equipment.
C. It is not pleasant for the maintenance staff to have to work in a server room that is too warm.
D. Backup tapes are made from thin plastic which cannot withstand high temperatures.
Therefore, if it gets too hot in a server room, they may get damaged.
Answer: A

EXIN認定証   ISFS   ISFS   ISFS認定資格

NO.4 You work for a large organization. You notice that you have access to confidential information that you
should not be able to access in your position. You report this security incident to the helpdesk. The
incident cycle isinitiated. What are the stages of the security incident cycle?
A. Threat, Damage, Incident, Recovery
B. Threat, Damage, Recovery, Incident
C. Threat, Incident, Damage, Recovery
D. Threat, Recovery, Incident, Damage
Answer: C

EXIN問題集   ISFS   ISFS認定資格   ISFS   ISFS認証試験   ISFS認定証

NO.5 What physical security measure is necessary to control access to company information?
A. Air-conditioning
B. Username and password
C. The use of break-resistant glass and doors with the right locks, frames and hinges
D. Prohibiting the use of USB sticks
Answer: C

EXIN練習問題   ISFS   ISFS   ISFS

NO.6 Who is authorized to change the classification of a document?
A. The author of the document
B. The administrator of the document
C. The owner of the document
D. The manager of the owner of the document
Answer: C

EXIN   ISFS   ISFS   ISFS   ISFS

NO.7 What is an example of a physical security measure?
A. A code of conduct that requires staff to adhere to the clear desk policy, ensuring that
confidential information is not left visibly on the desk at the end of the work day
B. An access control policy with passes that have to be worn visibly
C. The encryption of confidential information
D. Special fire extinguishers with inert gas, such as Argon
Answer: D

EXIN参考書   ISFS過去問   ISFS過去問   ISFS   ISFS   ISFS

NO.8 Why do organizations have an information security policy?
A. In order to demonstrate the operation of the Plan-Do-Check-Act cycle within an organization.
B. In order to ensure that staff do not break any laws.
C. In order to give direction to how information security is set up within an organization.
D. In order to ensure that everyone knows who is responsible for carrying out the backup
procedures.
Answer: C

EXIN認定資格   ISFS認定試験   ISFS過去問

NO.9 The company Midwest Insurance has taken many measures to protect its information. It uses an
Information Security Management System, the input and output of data in applications is validated,
confidential documents are sent in encrypted form and staff use tokens to access information systems.
Which of these is not a technical measure?
A. Information Security Management System
B. The use of tokens to gain access to information systems
C. Validation of input and output data in applications
D. Encryption of information
Answer: A

EXIN認定資格   ISFS認証試験   ISFS   ISFS参考書   ISFS

NO.10 You work in the IT department of a medium-sized company. Confidential information has got into the
wrong hands several times. This has hurt the image of the company. You have been asked to propose
organizational security measures for laptops at your company. What is the first step that you should take?
A. Formulate a policy regarding mobile media (PDAs, laptops, smartphones, USB sticks)
B. Appoint security personnel
C. Encrypt the hard drives of laptops and USB sticks
D. Set up an access control policy
Answer: A

EXIN   ISFS   ISFS認定証   ISFS

IT-Passports.comは客様の要求を満たせていい評判をうけいたします。たくさんのひとは弊社の商品を使って、試験に順調に合格しました。

没有评论:

发表评论