DumpsFiles
 Request Exam  Contact
  • Home
  • PRACTICE EXAMS
    Oracle
    Fortinet
    Juniper
    Microsoft
    Cisco
    Citrix
    CompTIA
    VMware
    SAP
    EMC
    PMI
    HP
    Salesforce
    Other
  • View All Exams
  • New Dumps Files
  • Upload
  • Oracle
    Oracle
  • Fortinet
    Fortinet
  • Juniper
    Juniper
  • Microsoft
    Microsoft
  • Cisco
    Cisco
  • Citrix
    Citrix
  • CompTIA
    CompTIA
  • VMware
    VMware
  • SAP
    SAP
  • EMC
    EMC
  • PMI
    PMI
  • HP
    HP
  • Salesforce
    Salesforce
  1. Home
  2. EXIN
  3. Information Security Foundation based on ISO/IEC 27001
  4. EXIN.ISFS.v2023-05-01.q35
  5. Question 1

Join the discussion

Question 1/35

You work in the office of a large company. You receive a call from a person claiming to be from the Helpdesk. He asks you for your password. What kind of threat is this?

Correct Answer: B

Add Comments

Your email address will not be published. Required fields are marked *

insert code
Type the characters from the picture.
Rating:
Other Question (35q)
Q1. You work in the office of a large company. You receive a call from a person claiming to be...
Q2. What is the best way to comply with legislation and regulations for personal data protecti...
Q3. You are the owner of a growing company, SpeeDelivery, which provides courier services. You...
Q4. Some security measures are optional. Other security measures must always be implemented. W...
Q5. A couple of years ago you started your company which has now grown from 1 to 20 employees....
Q6. Peter works at the company Midwest Insurance. His manager, Linda, asks him to send the ter...
Q7. You are a consultant and are regularly hired by the Ministry of Defense to perform analysi...
Q8. At Midwest Insurance, all information is classified. What is the goal of this classificati...
Q9. You work for a large organization. You notice that you have access to confidential informa...
Q10. An employee in the administrative department of Smiths Consultants Inc. finds out that the...
Q11. Who is authorized to change the classification of a document?...
Q12. Why do organizations have an information security policy?...
Q13. You work in the office of a large company. You receive a call from a person claiming to be...
Q14. What is an example of a good physical security measure?...
Q15. Your organization has an office with space for 25 workstations. These workstations are all...
Q16. What is an example of a non-human threat to the physical environment?...
Q17. What is the goal of an organization's security policy?...
Q18. Your company has to ensure that it meets the requirements set down in personal data protec...
Q19. Why is air-conditioning placed in the server room?...
Q20. What physical security measure is necessary to control access to company information?...
Q21. You apply for a position in another company and get the job. Along with your contract, you...
Q22. You have an office that designs corporate logos. You have been working on a draft for a la...
Q23. What is the most important reason for applying segregation of duties?...
Q24. A non-human threat for computer systems is a flood. In which situation is a flood always a...
Q25. You are the owner of SpeeDelivery courier service. Because of your companys growth you hav...
Q26. What sort of security does a Public Key Infrastructure (PKI) offer?...
Q27. What is a human threat to the reliability of the information on your company website?...
Q28. You own a small company in a remote industrial areA. Lately, the alarm regularly goes off ...
Q29. Why is compliance important for the reliability of the information?...
Q30. You are the owner of the courier company SpeeDelivery. You have carried out a risk analysi...
Q31. Which type of malware builds a network of contaminated computers?...
Q32. Three characteristics determine the reliability of information. Which characteristics are ...
Q33. Under which condition is an employer permitted to check if Internet and email services in ...
Q34. You read in the newspapers that the ex-employee of a large company systematically deleted ...
Q35. When we are at our desk, we want the information system and the necessary information to b...
[×]

Download PDF File

Enter your email address to download EXIN.ISFS.v2023-05-01.q35.pdf

Email:

DumpsFiles

Our website provides the Largest and the most Latest vendors Certification Exam materials around the world.

Using dumps we provide to Pass the Exam, we has the Valid Dumps with passing guranteed just which you need.

  • DMCA
  • About
  • Contact Us
  • Privacy Policy
  • Terms & Conditions
©2025 DumpsFiles

www.dumpsfiles.com materials do not contain actual questions and answers from Cisco's certification exams.