Exam Details

  • Exam Code
    :ISFS
  • Exam Name
    :Information Security Foundation based on ISO/IEC 27002
  • Certification
    :EXIN Certifications
  • Vendor
    :EXIN
  • Total Questions
    :80 Q&As
  • Last Updated
    :Jun 05, 2025

EXIN EXIN Certifications ISFS Questions & Answers

  • Question 21:

    Midwest Insurance controls access to its offices with a passkey system. We call this a preventive measure. What are some other measures?

    A. Detective, repressive and corrective measures

    B. Partial, adaptive and corrective measures

    C. Repressive, adaptive and corrective measures

  • Question 22:

    Some security measures are optional. Other security measures must always be implemented. Which measure(s) must always be implemented?

    A. Clear Desk Policy

    B. Physical security measures

    C. Logical access security measures

    D. Measures required by laws and regulations

  • Question 23:

    My user profile specifies which network drives I can read and write to. What is the name of the type of logical access management wherein my access and rights are determined centrally?

    A. Discretionary Access Control (DAC)

    B. Mandatory Access Control (MAC)

    C. Public Key Infrastructure (PKI)

  • Question 24:

    You apply for a position in another company and get the job. Along with your contract, you are asked to sign a code of conduct. What is a code of conduct?

    A. A code of conduct specifies how employees are expected to conduct themselves and is the same for all companies.

    B. A code of conduct is a standard part of a labor contract.

    C. A code of conduct differs from company to company and specifies, among other things, the rules of behavior with regard to the usage of information systems.

  • Question 25:

    You are the owner of a growing company, SpeeDelivery, which provides courier services. You decide that it is time to draw up a risk analysis for your information system. This includes an inventory of the threats and risks. What is the relation between a threat, risk and risk analysis?

    A. A risk analysis identifies threats from the known risks.

    B. A risk analysis is used to clarify which threats are relevant and what risks they involve.

    C. A risk analysis is used to remove the risk of a threat.

    D. Risk analyses help to find a balance between threats and risks.

  • Question 26:

    The consultants at Smith Consultants Inc. work on laptops that are protected by asymmetrical cryptography. To keep the management of the keys cheap, all consultants use the same key pair. What is the companys risk if they operate in this manner?

    A. If the private key becomes known all laptops must be supplied with new keys.

    B. If the Public Key Infrastructure (PKI) becomes known all laptops must be supplied with new keys.

    C. If the public key becomes known all laptops must be supplied with new keys.

  • Question 27:

    What is a repressive measure in the case of a fire?

    A. Taking out fire insurance

    B. Putting out a fire after it has been detected by a fire detector

    C. Repairing damage caused by the fire

  • Question 28:

    You are the owner of SpeeDelivery courier service. Because of your companys growth you have to think about information security. You know that you have to start creating a policy. Why is it so important to have an information security policy as a starting point?

    A. The information security policy gives direction to the information security efforts.

    B. The information security policy supplies instructions for the daily practice of information security.

    C. The information security policy establishes which devices will be protected.

    D. The information security policy establishes who is responsible for which area of information security.

  • Question 29:

    The act of taking organizational security measures is inextricably linked with all other measures that have to be taken. What is the name of the system that guarantees the coherence of information security in the organization?

    A. Information Security Management System (ISMS)

    B. Rootkit

    C. Security regulations for special information for the government

  • Question 30:

    In the organization where you work, information of a very sensitive nature is processed. Management is legally obliged to implement the highest-level security measures. What is this kind of risk strategy called?

    A. Risk bearing

    B. Risk avoiding

    C. Risk neutral

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EXIN exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ISFS exam preparations and EXIN certification application, do not hesitate to visit our Vcedump.com to find your solutions here.