Exam Details

  • Exam Code
    :ISFS
  • Exam Name
    :Information Security Foundation based on ISO/IEC 27002
  • Certification
    :EXIN Certifications
  • Vendor
    :EXIN
  • Total Questions
    :80 Q&As
  • Last Updated
    :Jun 05, 2025

EXIN EXIN Certifications ISFS Questions & Answers

  • Question 51:

    What is the definition of the Annual Loss Expectancy?

    A. The Annual Loss Expectancy is the amount of damage that can occur as a result of an incident during the year.

    B. The Annual Loss Expectancy is the size of the damage claims resulting from not having carried out risk analyses effectively.

    C. The Annual Loss Expectancy is the average damage calculated by insurance companies for businesses in a country.

    D. The Annual Loss Expectancy is the minimum amount for which an organization must insure itself.

  • Question 52:

    Some threats are caused directly by people, others have a natural cause. What is an example of an intentional human threat?

    A. Lightning strike

    B. Arson

    C. Flood

    D. Loss of a USB stick

  • Question 53:

    In most organizations, access to the computer or the network is granted only after the user has entered a correct username and password. This process consists of 3 steps: identification, authentication and authorization. What is the purpose of the second step, authentication?

    A. In the second step, you make your identity known, which means you are given access to the system.

    B. The authentication step checks the username against a list of users who have access to the system.

    C. The system determines whether access may be granted by determining whether the token used is authentic.

    D. During the authentication step, the system gives you the rights that you need, such as being able to read the data in the system.

  • Question 54:

    Which of these is not malicious software?

    A. Phishing

    B. Spyware

    C. Virus

    D. Worm

  • Question 55:

    What is an example of a non-human threat to the physical environment?

    A. Fraudulent transaction

    B. Corrupted file

    C. Storm

    D. Virus

  • Question 56:

    When we are at our desk, we want the information system and the necessary information to be available. We want to be able to work with the computer and access the network and our files. What is the correct definition of availability?

    A. The degree to which the system capacity is enough to allow all users to work with it

    B. The degree to which the continuity of an organization is guaranteed

    C. The degree to which an information system is available for the users

    D. The total amount of time that an information system is accessible to the users

  • Question 57:

    Peter works at the company Midwest Insurance. His manager, Linda, asks him to send the terms and conditions for a life insurance policy to Rachel, a client. Who determines the value of the information in the insurance terms and conditions document?

    A. The recipient, Rachel

    B. The person who drafted the insurance terms and conditions

    C. The manager, Linda

    D. The sender, Peter

  • Question 58:

    You have just started working at a large organization. You have been asked to sign a code of conduct as well as a contract. What does the organization wish to achieve with this?

    A. A code of conduct helps to prevent the misuse of IT facilities.

    B. A code of conduct is a legal obligation that organizations have to meet.

    C. A code of conduct prevents a virus outbreak.

    D. A code of conduct gives staff guidance on how to report suspected misuses of IT facilities.

  • Question 59:

    What do employees need to know to report a security incident?

    A. How to report an incident and to whom.

    B. Whether the incident has occurred before and what was the resulting damage.

    C. The measures that should have been taken to prevent the incident in the first place.

    D. Who is responsible for the incident and whether it was intentional.

  • Question 60:

    What is the objective of classifying information?

    A. Authorizing the use of an information system

    B. Creating a label that indicates how confidential the information is

    C. Defining different levels of sensitivity into which information may be arranged

    D. Displaying on the document who is permitted access

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EXIN exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ISFS exam preparations and EXIN certification application, do not hesitate to visit our Vcedump.com to find your solutions here.