livechat
期間限定特別サービス、15%割引キャンペーン実施中、02:23:56において終了。お得な割引コード:TOPJP2025
HACKER SAFEにより証明されたサイトは、99.9%以上のハッカー犯罪を防ぎます。
カート(0

EXIN EX0-105 問題集

EX0-105
EX0-105日本語版
「クリックして表示

試験コード:EX0-105

試験名称:Information Security Foundation based on ISO/IEC 27002

最近更新時間:2025-08-16

問題と解答:全128問

EX0-105 無料でデモをダウンロード:

PDF版 Demo ソフト版 Demo オンライン版 Demo

追加した商品:"PDF版"
価格: ¥6599 

無料問題集EX0-105 資格取得

質問 1:
Your organization has an office with space for twenty five (25) workstations. These workstations are all fully equipped and in use. Due to a reorganization ten (10) extra workstations are added, five (5) of which are used for a call center 24 hours per day. Five (5) workstations must always be available.
What physical security measures must be taken in order to ensure this?
A. Obtain an extra office and provide a UPS (Uninterruptible Power Supply) for the five most important workstations.
B. Obtain an extra office and set up ten (10) workstations. Ensure that there are security personnel both in the evenings and at night, so that staff can work there safely and securely.
C. Obtain an extra office and set up ten (10) workstations. You would therefore have spare equipment that can be used to replace any non-functioning equipment.
D. Obtain an extra office and connect all ten (10) new workstations to an emergency power supply and UPS (Uninterruptible Power Supply). Adjust the access control system to the working hours of the new staff. Inform the building security personnel that work will also be carried out in the evenings and at night.
正解:D

質問 2:
What is the physical equivalent of the logical information security measure Intrusion Detection System (IDS)?
A. Cooling
B. Cameras
C. Fire extinguishers
D. UPS
正解:B

質問 3:
What is the most important reason for applying segregation of duties?
A. Segregation of duties ensures that, when a person is absent, it can be investigated whether he or she has been committing fraud.
B. Tasks and responsibilities must be separated in order to minimize the opportunities for business assets to be misused or changed, whether the change be unauthorized or unintentional.
C. Segregation of duties makes it easier for a person who is ready with his or her part of the work to take time off or to take over the work of another person.
D. Segregation of duties makes it clear who is responsible for what.
正解:B

質問 4:
Logging in to a computer system is an access-granting process consisting of three steps: identification, authentication and authorization. What occurs during the first step of this process: identification?
A. The first step consists of checking if the user appears on the list of authorized users.
B. The first step consists of checking if the user is using the correct certificate.
C. The first step consists of comparing the password with the registered password.
D. The first step consists of granting access to the information to which the user is authorized.
正解:A

質問 5:
You are the owner of SpeeDelivery courier service. Because of your companys growth you have to think about information security. You know that you have to start creating a policy. Why is it so important to have an information security policy as a starting point?
A. The information security policy establishes who is responsible for which area of information security.
B. The information security policy establishes which devices will be protected.
C. The information security policy gives direction to the information security efforts.
D. The information security policy supplies instructions for the daily practice of information security.
正解:C

質問 6:
Which legislation regulates the storage and destruction of archive documents?
A. The Computer Criminality legislation
B. The Public Records legislation
C. The Personal Data Protection legislation
D. The Government Information (Public Access) legislation
正解:B

質問 7:
What is a risk analysis used for?
A. A risk analysis is used to clarify to management their responsibilities.
B. A risk analysis is used in conjunction with security measures to reduce risks to an acceptable level.
C. A risk analysis is used to express the value of information for an organization in monetary terms.
D. A risk analysis is used to ensure that security measures are deployed in a cost-effective and timely fashion.
正解:D

EX0-105 関連試験
EX0-109 - SCNA The Solution Exam
EX0-108 - SCNA Enterprise Security Implementation
EX0-101J - ITIL Foundation V 3.0 & ITIL Foundation (EX0-101日本語版)
連絡方法  
 support@topexam.jp サポート

試用版をダウンロード

人気のベンダー
Apple
Avaya
CIW
FileMaker
Lotus
Lpi
OMG
SNIA
Symantec
XML Master
Zend-Technologies
The Open Group
H3C
3COM
ACI
すべてのベンダー
TopExam問題集を選ぶ理由は何でしょうか?
 品質保証TopExamは我々の専門家たちの努力によって、過去の試験のデータが分析されて、数年以来の研究を通して開発されて、多年の研究への整理で、的中率が高くて99%の通過率を保証することができます。
 一年間の無料アップデートTopExamは弊社の商品をご購入になったお客様に一年間の無料更新サービスを提供することができ、行き届いたアフターサービスを提供します。弊社は毎日更新の情況を検査していて、もし商品が更新されたら、お客様に最新版をお送りいたします。お客様はその一年でずっと最新版を持っているのを保証します。
 全額返金弊社の商品に自信を持っているから、失敗したら全額で返金することを保証します。弊社の商品でお客様は試験に合格できると信じていますとはいえ、不幸で試験に失敗する場合には、弊社はお客様の支払ったお金を全額で返金するのを承諾します。(全額返金)
 ご購入の前の試用TopExamは無料なサンプルを提供します。弊社の商品に疑問を持っているなら、無料サンプルを体験することができます。このサンプルの利用を通して、お客様は弊社の商品に自信を持って、安心で試験を準備することができます。
a