ISFS (Information Security Foundation based on ISO/IEC 27002)

Welcome to your ISFS (Information Security Foundation based on ISO/IEC 27002)

1) What do employees need to know to report a security incident?
2) Midwest Insurance grades the monthly report of all claimed losses per insured as confidential.
What is accomplished if all other reports from this insurance office are also assigned the appropriate grading/classification level?
3) To which ISO security standard, organizations seek certifications against?
4) Midwest Insurance controls access to its offices with a passkey system. We call this a preventive measure. What are some other measures?
5) What physical security measure is necessary to control access to company information?
6) The Information Security Officer (ISO) of insurance company Euregio wishes to have a list of security measures put together.
What does she first have to do before security measures can be selected?
7) The backups of the central server are kept locked in the same enclosed room as the server.
What risk does the organization face?
8) An employee in the administrative department of Smiths Consultants Inc. finds out that the expiry date of a contract with one of the clients is earlier than the start date. What type of measure could prevent this error?
9) In the incident cycle there are four successive steps. What is the order of these steps?
10) Which type of malware builds a network of contaminated computers?
11) Our access to information is becoming increasingly easy. Still, information has to be reliable in order to be usable.
What is not a reliability aspect of information?
12) ”Completeness” is part of which aspect of reliability of information?
13) You work for a flexible employer who doesnt mind if you work from home or on the road. You regularly take copies of documents with you on a USB memory stick that is not secure. What are the consequences for the reliability of the information if you leave your USB memory stick behind on the train?
14) In the reception hall of an administration office, there is a printer which all staff can use in case of emergency. The arrangement is that the printouts are to be collected immediately so that they cannot be taken away by a visitor.
What other risk for the company information does this situation have?
15) In order to reduce risks, a company decides to opt for a strategy of a mix of measures. One of the measures is that a stand-by arrangement is organized for the company. To which category of measures does a stand-by arrangement belong?
16) What is the purpose of ISO/CEI 27002 security code of practice (previously BS7799-1) ?
17) Which important statutory norm in the area of information security does the government have to meet?
18) A fire breaks out in a branch office of a health insurance company. The personnel are transferred to neighboring branches to continue their work.
Where in the incident lifecycle are such stand-by arrangements found?
19) Strong authentication is needed to access highly protected areas. In case of strong authentication the identity of a person is verified by using three factors.

Which factor is verified when we must enter a personal identification number (PIN)?
20) Which of the below technologies is malicious?
21) Integrity is the degree to which the information is up to date and without errors. What are integrity characteristics?
22) What is an example of a security incident?
23) You are the first to arrive at work in the morning and notice that the CD ROM on which you saved contracts yesterday has disappeared. You were the last to leave yesterday. When should you report this information security incident?
24) You have a small office in an industrial areA. You would like to analyze the risks your company faces. The office is in a pretty remote location; therefore, the possibility of arson is not entirely out of the question. What is the relationship between the threat of fire and the risk of fire?
25) What is an example of a good physical security measure?
26) An administration office is going to determine the dangers to which it is exposed.
What do we call a possible event that can have a disruptive effect on the reliability of information?
27) Which one of the threats listed below can occur as a result of the absence of a physical measure?
28) A possible risk for a company is fire damage. If this threat occurs, that is to say that a fire actually breaks out, direct and indirect damage may result. What is an example of direct damage?
29) The Information Security Manager (ISM) at Smith Consultants Inc. introduces the following measures to assure information security:
-The security requirements for the network are specified.
-A test environment is set up for the purpose of testing reports coming from the database.
-The various employee functions are assigned corresponding access rights.
-RFID access passes are introduced for the building.
Which one of these measures is NOT a technical measure?
30) What is the relationship between data and information?
31) A worker from insurance company Euregio discovers that the expiration date of a policy has been changed without her knowledge. She is the only person authorized to do this. She reports this security incident to the Helpdesk. The Helpdesk worker records the following information
regarding this incident:
• date and time
• description of the incident
• possible consequences of the incident
What important information about the incident is missing here?
32) What is the most important reason for applying Segregation of Duties (SoD)?
33) We can acquire and supply information in various ways. The value of the information depends on whether it is reliable. What are the reliability aspects of information?
34) A non-human threat for computer systems is a flood. In which situation is a flood always a relevant threat?
35) You have received a draft of your tax return from the accountant and you check whether the data is correct.

Which characteristic of reliability of information are you checking?
36) An airline company employee notices that she has access to one of the company's applications that she has not used before. Is this an information security incident?
37) Which of the following measures is a corrective measure?
38) You work in the office of a large company. You receive a call from a person claiming to be from the Helpdesk who asks you for your password. What kind of threat is this?
39) What is an example of an organizational measure?
40) Some security measures are optional. Other security measures must always be implemented.
Which measure(s) must always be implemented?