EXIN Information Security Foundation based on ISO/IEC 27002 exam ISFS Exam Questions in PDF

Free EXIN ISFS Dumps Questions (page: 2)

You work for a large organization. You notice that you have access to confidential information that you should not be able to access in your position. You report this security incident to the helpdesk. The incident cycle isinitiated. What are the stages of the security incident cycle?

  1. Threat, Damage, Incident, Recovery
  2. Threat, Damage, Recovery, Incident
  3. Threat, Incident, Damage, Recovery
  4. Threat, Recovery, Incident, Damage

Answer(s): C



Your organization has an office with space for 25 workstations. These workstations are all fully equipped and in use. Due to a reorganization 10 extra workstations are added, 5 of which are used for a call centre 24 hours per day. Five workstations must always be available. What physical security measures must be taken in order to ensure this?

  1. Obtain an extra office and set up 10 workstations. You would therefore have spare equipment that can be used to replace any non-functioning equipment.
  2. Obtain an extra office and set up 10 workstations. Ensure that there are security personnel both in the evenings and at night, so that staff can work there safely and securely.
  3. Obtain an extra office and connect all 10 new workstations to an emergency power supply and UPS (Uninterruptible Power Supply). Adjust the access control system to the working hours of the new staff. Inform the building security personnel that work will also be carried out in the evenings and at night.
  4. Obtain an extra office and provide a UPS (Uninterruptible Power Supply) for the five most important workstations.

Answer(s): C



Which of the following measures is a preventive measure?

  1. Installing a logging system that enables changes in a system to be recognized
  2. Shutting down all internet traffic after a hacker has gained access to the company systems
  3. Putting sensitive information in a safe
  4. Classifying a risk as acceptable because the cost of addressing the threat is higher than the value of the information at risk

Answer(s): C



What is a risk analysis used for?

  1. A risk analysis is used to express the value of information for an organization in monetary terms.
  2. A risk analysis is used to clarify to management their responsibilities.
  3. A risk analysis is used in conjunction with security measures to reduce risks to an acceptable level.
  4. A risk analysis is used to ensure that security measures are deployed in a cost-effective and timely fashion.

Answer(s): D



A well executed risk analysis provides a great deal of useful information. A risk analysis has four
main objectives. What is not one of the four main objectives of a risk analysis?

  1. Identifying assets and their value
  2. Determining the costs of threats
  3. Establishing a balance between the costs of an incident and the costs of a security measure
  4. Determining relevant vulnerabilities and threats

Answer(s): B



What is an example of a security incident?

  1. The lighting in the department no longer works.
  2. A member of staff loses a laptop.
  3. You cannot set the correct fonts in your word processing software.
  4. A file is saved under an incorrect name.

Answer(s): B



Which of the following measures is a corrective measure?

  1. Incorporating an Intrusion Detection System (IDS) in the design of a computer centre
  2. Installing a virus scanner in an information system
  3. Making a backup of the data that has been created or altered that day
  4. Restoring a backup of the correct database after a corrupt copy of the database was written over the original

Answer(s): D



We can acquire and supply information in various ways. The value of the information depends on whether it is reliable. What are the reliability aspects of information?

  1. Availability, Information Value and Confidentiality
  2. Availability, Integrity and Confidentiality
  3. Availability, Integrity and Completeness
  4. Timeliness, Accuracy and Completeness

Answer(s): B



Share your comments for EXIN ISFS exam with other users:

M
Muhammad Rawish Siddiqui
12/4/2023 12:17:00 PM

question # 108, correct answers are business growth and risk reduction.

E
Emmah
7/29/2023 9:59:00 AM

are these valid chfi questions

M
Mort
10/19/2023 7:09:00 PM

question: 162 should be dlp (b)

E
Eknath
10/4/2023 1:21:00 AM

good exam questions

N
Nizam
6/16/2023 7:29:00 AM

I have to say this is really close to real exam. Passed my exam with this.

P
poran
11/20/2023 4:43:00 AM

good analytics question

A
Antony
11/23/2023 11:36:00 AM

this looks accurate

E
Ethan
8/23/2023 12:52:00 AM

question 46, the answer should be data "virtualization" (not visualization).

N
nSiva
9/22/2023 5:58:00 AM

its useful.

R
Ranveer
7/26/2023 7:26:00 PM

Pass this exam 3 days ago. The PDF version and the Xengine App is quite useful.

S
Sanjay
8/15/2023 10:22:00 AM

informative for me.

T
Tom
12/12/2023 8:53:00 PM

question 134s answer shoule be "dlp"

A
Alex
11/7/2023 11:02:00 AM

in 72 the answer must be [sys_user_has_role] table.

F
Finn
5/4/2023 10:21:00 PM

i appreciated the mix of multiple-choice and short answer questions. i passed my exam this morning.

A
AJ
7/13/2023 8:33:00 AM

great to find this website, thanks

C
Curtis Nakawaki
6/29/2023 9:11:00 PM

examination questions seem to be relevant.

U
Umashankar Sharma
10/22/2023 9:39:00 AM

planning to take psm test

E
ED SHAW
7/31/2023 10:34:00 AM

please allow to download

A
AD
7/22/2023 11:29:00 AM

please provide dumps

A
Ayyjayy
11/6/2023 7:29:00 AM

is the answer to question 15 correct ? i feel like the answer should be b

B
Blessious Phiri
8/12/2023 11:56:00 AM

its getting more technical

J
Jeanine J
7/11/2023 3:04:00 PM

i think these questions are what i need.

A
Aderonke
10/23/2023 2:13:00 PM

helpful assessment

T
Tom
1/5/2024 2:32:00 AM

i am confused about the answers to the questions. do you know if the answers are correct?

V
Vinit N.
8/28/2023 2:33:00 AM

hi, please make the dumps available for my upcoming examination.

S
Sanyog Deshpande
9/14/2023 7:05:00 AM

good practice

T
Tyron
9/8/2023 12:12:00 AM

so far it is really informative

B
beast
7/30/2023 2:22:00 PM

hi i want it please please upload it

M
Mirex
5/26/2023 3:45:00 AM

am preparing for exam ,just nice questions

E
exampei
8/7/2023 8:05:00 AM

please upload c_tadm_23 exam

A
Anonymous
9/12/2023 12:50:00 PM

can we get tdvan4 vantage data engineering pdf?

A
Aish
10/11/2023 5:51:00 AM

want to clear the exam.

S
Smaranika
6/22/2023 8:42:00 AM

could you please upload the dumps of sap c_sac_2302

B
Blessious Phiri
8/15/2023 1:56:00 PM

asm management configuration is about storage

AI Tutor 👋 I’m here to help!