ISFS Exam Question 6
Susan sends an email to Paul. Who determines the meaning and the value of information in this email?
ISFS Exam Question 7
Why do organizations have an information security policy?
ISFS Exam Question 8
There is a network printer in the hallway of the company where you work. Many employees dont pick up their printouts immediately and leave them in the printer. What are the consequences of this to the reliability of the information?
ISFS Exam Question 9
An airline company employee notices that she has access to one of the company's applications that she has not used before. Is this an information security incident?
ISFS Exam Question 10
Logging in to a computer system is an access-granting process consisting of three steps: identification, authentication and authorization.
What occurs during the first step of this process: identification?
What occurs during the first step of this process: identification?
