EXIN EX0-105 Exam (page: 2)
EXIN Information Security Foundation based on ISO/IEC 27002
Updated on: 12-Feb-2026

Viewing Page 2 of 11

You work for a large organization. You notice that you have access to confidential information that you should not be able to access in your position. You report this security incident to the helpdesk. The incident cycle isinitiated.
What are the stages of the security incident cycle?

  1. Threat, Damage, Incident, Recovery
  2. Threat, Damage, Recovery, Incident
  3. Threat, Incident, Damage, Recovery
  4. Threat, Recovery, Incident, Damage

Answer(s): C



Your organization has an office with space for 25 workstations. These workstations are all fully equipped and in use. Due to a reorganization 10 extra workstations are added, 5 of which are used for a call centre 24 hours per day. Five workstations must always be available.
What physical security measures must be taken in order to ensure this?

  1. Obtain an extra office and set up 10 workstations. You would therefore have spare equipment that can be used to replace any non-functioning equipment.
  2. Obtain an extra office and set up 10 workstations. Ensure that there are security personnel both in the evenings and at night, so that staff can work there safely and securely.
  3. Obtain an extra office and connect all 10 new workstations to an emergency power supply and UPS (Uninterruptible Power Supply). Adjust the access control system to the working hours of the new staff. Inform the building security personnel that work will also be carried out in the evenings and at night.
  4. Obtain an extra office and provide a UPS (Uninterruptible Power Supply) for the five most important workstations.

Answer(s): C



Which of the following measures is a preventive measure?

  1. Installing a logging system that enables changes in a system to be recognized
  2. Shutting down all internet traffic after a hacker has gained access to the company systems
  3. Putting sensitive information in a safe
  4. Classifying a risk as acceptable because the cost of addressing the threat is higher than the value of the information at risk

Answer(s): C



What is a risk analysis used for?

  1. A risk analysis is used to express the value of information for an organization in monetary terms.
  2. A risk analysis is used to clarify to management their responsibilities.
  3. A risk analysis is used in conjunction with security measures to reduce risks to an acceptable level.
  4. A risk analysis is used to ensure that security measures are deployed in a cost-effective and timely fashion.

Answer(s): D



A well executed risk analysis provides a great deal of useful information. A risk analysis has four main objectives.
What is not one of the four main objectives of a risk analysis?

  1. Identifying assets and their value
  2. Determining the costs of threats
  3. Establishing a balance between the costs of an incident and the costs of a security measure
  4. Determining relevant vulnerabilities and threats

Answer(s): B



What is an example of a security incident?

  1. The lighting in the department no longer works.
  2. A member of staff loses a laptop.
  3. You cannot set the correct fonts in your word processing software.
  4. A file is saved under an incorrect name.

Answer(s): B



Which of the following measures is a corrective measure?

  1. Incorporating an Intrusion Detection System (IDS) in the design of a computer centre
  2. Installing a virus scanner in an information system
  3. Making a backup of the data that has been created or altered that day
  4. Restoring a backup of the correct database after a corrupt copy of the database was written over the original

Answer(s): D



We can acquire and supply information in various ways. The value of the information depends on whether it is reliable.
What are the reliability aspects of information?

  1. Availability, Information Value and Confidentiality
  2. Availability, Integrity and Confidentiality
  3. Availability, Integrity and Completeness
  4. Timeliness, Accuracy and Completeness

Answer(s): B



Viewing Page 2 of 11



Share your comments for EXIN EX0-105 exam with other users:

BK 8/11/2023 12:23:00 PM

very useful
INDIA


Deepika Narayanan 7/13/2023 11:05:00 PM

yes need this exam dumps
Anonymous


Blessious Phiri 8/15/2023 3:31:00 PM

these questions are a great eye opener
Anonymous


Jagdesh 9/8/2023 8:17:00 AM

thank you for providing these questions and answers. they helped me pass my exam. you guys are great.
CANADA


TS 7/18/2023 3:32:00 PM

good knowledge
Anonymous


Asad Khan 11/1/2023 2:44:00 AM

answer 10 should be a because only a new project will be created & the organization is the same.
Anonymous


Raj 9/12/2023 3:49:00 PM

can you please upload the dump again
UNITED STATES


Christian Klein 6/23/2023 1:32:00 PM

is it legit questions from sap certifications ?
UNITED STATES


anonymous 1/12/2024 3:34:00 PM

question 16 should be b (changing the connector settings on the monitor) pc and monitor were powered on. the lights on the pc are on indicating power. the monitor is showing an error text indicating that it is receiving power too. this is a clear sign of having the wrong input selected on the monitor. thus, the "connector setting" needs to be switched from hdmi to display port on the monitor so it receives the signal from the pc, or the other way around (display port to hdmi).
UNITED STATES


NSPK 1/18/2024 10:26:00 AM

q 10. ans is d (in the target org: open deployment settings, click edit next to the source org. select allow inbound changes and save
Anonymous


mohamed abdo 9/1/2023 4:59:00 AM

very useful
Anonymous


Tom 3/18/2022 8:00:00 PM

i purchased this exam dumps from another website with way more questions but they were all invalid and outdate. this exam dumps was right to the point and all from recent exam. it was a hard pass.
UNITED KINGDOM


Edrick GOP 10/24/2023 6:00:00 AM

it was a good experience and i got 90% in the 200-901 exam.
Anonymous


anonymous 8/10/2023 2:28:00 AM

hi please upload this
Anonymous


Bakir 7/6/2023 7:24:00 AM

please upload it
UNITED KINGDOM


Aman 6/18/2023 1:27:00 PM

really need this dump. can you please help.
UNITED KINGDOM


Neela Para 1/8/2024 6:39:00 PM

really good and covers many areas explaining the answer.
NEW ZEALAND


Karan Patel 8/15/2023 12:51:00 AM

yes, can you please upload the exam?
UNITED STATES


NISHAD 11/7/2023 11:28:00 AM

how many questions are there in these dumps?
UNITED STATES


Pankaj 7/3/2023 3:57:00 AM

hi team, please upload this , i need it.
UNITED STATES


DN 9/4/2023 11:19:00 PM

question 14 - run terraform import: this is the recommended best practice for bringing manually created or destroyed resources under terraform management. you use terraform import to associate an existing resource with a terraform resource configuration. this ensures that terraform is aware of the resource, and you can subsequently manage it with terraform.
Anonymous


Zhiguang 8/19/2023 11:37:00 PM

please upload dump. thanks in advance.
Anonymous


deedee 12/23/2023 5:51:00 PM

great great
UNITED STATES


Asad Khan 11/1/2023 3:10:00 AM

answer 16 should be b your organizational policies require you to use virtual machines directly
Anonymous


Sale Danasabe 10/24/2023 5:21:00 PM

the question are kind of tricky of you didnt get the hnag on it.
Anonymous


Luis 11/16/2023 1:39:00 PM

can anyone tell me if this is for rhel8 or rhel9?
UNITED STATES


hik 1/19/2024 1:47:00 PM

good content
UNITED STATES


Blessious Phiri 8/15/2023 2:18:00 PM

pdb and cdb are critical to the database
Anonymous


Zuned 10/22/2023 4:39:00 AM

till 104 questions are free, lets see how it helps me in my exam today.
UNITED STATES


Muhammad Rawish Siddiqui 12/3/2023 12:11:00 PM

question # 56, answer is true not false.
SAUDI ARABIA


Amaresh Vashishtha 8/27/2023 1:33:00 AM

i would be requiring dumps to prepare for certification exam
Anonymous


Asad 9/8/2023 1:01:00 AM

very helpful
PAKISTAN


Blessious Phiri 8/13/2023 3:10:00 PM

control file is the heart of rman backup
Anonymous


Senthil 9/19/2023 5:47:00 AM

hi could you please upload the ibm c2090-543 dumps
Anonymous