Exam Details

  • Exam Code
    :ISFS
  • Exam Name
    :Information Security Foundation based on ISO/IEC 27002
  • Certification
    :EXIN Certifications
  • Vendor
    :EXIN
  • Total Questions
    :80 Q&As
  • Last Updated
    :Jun 05, 2025

EXIN EXIN Certifications ISFS Questions & Answers

  • Question 61:

    What is the greatest risk for an organization if no information security policy has been defined?

    A. If everyone works with the same account, it is impossible to find out who worked on what.

    B. Information security activities are carried out by only a few people.

    C. Too many measures are implemented.

    D. It is not possible for an organization to implement information security in a consistent manner.

  • Question 62:

    An employee in the administrative department of Smiths Consultants Inc. finds out that the expiry date of a contract with one of the clients is earlier than the start date. What type of measure could prevent this error?

    A. Availability measure

    B. Integrity measure

    C. Organizational measure

    D. Technical measure

  • Question 63:

    What sort of security does a Public Key Infrastructure (PKI) offer?

    A. It provides digital certificates which can be used to digitally sign documents. Such signatures irrefutably determine from whom a document was sent.

    B. Having a PKI shows customers that a web-based business is secure.

    C. By providing agreements, procedures and an organization structure, a PKI defines which person or which system belongs to which specific public key.

    D. A PKI ensures that backups of company data are made on a regular basis.

  • Question 64:

    Your company has to ensure that it meets the requirements set down in personal data protection legislation. What is the first thing you should do?

    A. Make the employees responsible for submitting their personal data.

    B. Translate the personal data protection legislation into a privacy policy that is geared to the company and the contracts with the customers.

    C. Appoint a person responsible for supporting managers in adhering to the policy.

    D. Issue a ban on the provision of personal information.

  • Question 65:

    We can acquire and supply information in various ways. The value of the information depends on whether it is reliable. What are the reliability aspects of information?

    A. Availability, Information Value and Confidentiality

    B. Availability, Integrity and Confidentiality

    C. Availability, Integrity and Completeness

    D. Timeliness, Accuracy and Completeness

  • Question 66:

    Which of the following measures is a corrective measure?

    A. Incorporating an Intrusion Detection System (IDS) in the design of a computer centre

    B. Installing a virus scanner in an information system

    C. Making a backup of the data that has been created or altered that day

    D. Restoring a backup of the correct database after a corrupt copy of the database was written over the original

  • Question 67:

    What is an example of a security incident?

    A. The lighting in the department no longer works.

    B. A member of staff loses a laptop.

    C. You cannot set the correct fonts in your word processing software.

    D. A file is saved under an incorrect name.

  • Question 68:

    A well executed risk analysis provides a great deal of useful information. A risk analysis has four main objectives. What is not one of the four main objectives of a risk analysis?

    A. Identifying assets and their value

    B. Determining the costs of threats

    C. Establishing a balance between the costs of an incident and the costs of a security measure

    D. Determining relevant vulnerabilities and threats

  • Question 69:

    What is a risk analysis used for?

    A. A risk analysis is used to express the value of information for an organization in monetary terms.

    B. A risk analysis is used to clarify to management their responsibilities.

    C. A risk analysis is used in conjunction with security measures to reduce risks to an acceptable level.

    D. A risk analysis is used to ensure that security measures are deployed in a cost-effective and timely fashion.

  • Question 70:

    Which of the following measures is a preventive measure?

    A. Installing a logging system that enables changes in a system to be recognized

    B. Shutting down all internet traffic after a hacker has gained access to the company systems

    C. Putting sensitive information in a safe

    D. Classifying a risk as acceptable because the cost of addressing the threat is higher than the value of the information at risk

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only EXIN exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ISFS exam preparations and EXIN certification application, do not hesitate to visit our Vcedump.com to find your solutions here.