Download Information Security Foundation based on ISO-IEC 27002.EX0-105.CertDumps.2016-05-04.79q.vcex

Vendor: Exin
Exam Code: EX0-105
Exam Name: Information Security Foundation based on ISO/IEC 27002
Date: May 04, 2016
File Size: 40 KB

How to open VCEX files?

Files with VCEX extension can be opened by ProfExam Simulator.

Demo Questions

Question 1
You are the owner of the courier company SpeeDelivery. You employ a few people who, while waiting to make a delivery, can carry out other tasks. You notice, however, that they use this time to send and read their private mail and surf the Internet. In legal terms, in which way can the use of the Internet and e-mail facilities be best regulated?
  1. Installing an application that makes certain websites no longer accessible and that filters attachments in e-mails
  2. Drafting a code of conduct for the use of the Internet and e-mail in which the rights and obligations of both the employer and staff are set down
  3. Implementing privacy regulations
  4. Installing a virus scanner
Correct answer: B
Question 2
Why is air-conditioning placed in the server room?
  1. In the server room the air has to be cooled and the heat produced by the equipment has to be extracted.
    The air in the room is also dehumidified and filtered.
  2. When a company wishes to cool its offices, the server room is the best place. This way, no office space needs to be sacrificed for such a large piece of equipment.
  3. It is not pleasant for the maintenance staff to have to work in a server room that is too warm.
  4. Backup tapes are made from thin plastic which cannot withstand high temperatures.
    Therefore, if it gets too hot in a server room, they may get damaged.
Correct answer: A
Question 3
Who is authorized to change the classification of a document?
  1. The author of the document
  2. The administrator of the document
  3. The owner of the document
  4. The manager of the owner of the document
Correct answer: C
Question 4
The company Midwest Insurance has taken many measures to protect its information. It uses an Information Security Management System, the input and output of data in applications is validated, confidential documents are sent in encrypted form and staff use tokens to access information systems. Which of these is not a technical measure?
  1. Information Security Management System
  2. The use of tokens to gain access to information systems
  3. Validation of input and output data in applications
  4. Encryption of information
Correct answer: A
Question 5
What is an example of a physical security measure?
  1. A code of conduct that requires staff to adhere to the clear desk policy, ensuring that confidential information is not left visibly on the desk at the end of the work day
  2. An access control policy with passes that have to be worn visibly
  3. The encryption of confidential information
  4. Special fire extinguishers with inert gas, such as Argon
Correct answer: D
HOW TO OPEN VCE FILES

Use VCE Exam Simulator to open VCE files
Avanaset

HOW TO OPEN VCEX AND EXAM FILES

Use ProfExam Simulator to open VCEX and EXAM files
ProfExam Screen

ProfExam
ProfExam at a 20% markdown

You have the opportunity to purchase ProfExam at a 20% reduced price

Get Now!