exin isfs practice test

Exam Title: Information Security Foundation (based on ISO/IEC 27002) (EX0-105)

Last update: Nov 27 ,2025
Question 1

Which of the following measures is a preventive measure?

  • A. Installing a logging system that enables changes in a system to be recognized
  • B. Shutting down all internet traffic after a hacker has gained access to the company systems
  • C. Putting sensitive information in a safe
  • D. Classifying a risk as acceptable because the cost of addressing the threat is higher than the value of the information at risk
Answer:

C


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 2

What is a risk analysis used for?

  • A. A risk analysis is used to express the value of information for an organization in monetary terms.
  • B. A risk analysis is used to clarify to management their responsibilities.
  • C. A risk analysis is used in conjunction with security measures to reduce risks to an acceptable level.
  • D. A risk analysis is used to ensure that security measures are deployed in a cost-effective and timely fashion.
Answer:

D


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 3

A well executed risk analysis provides a great deal of useful information. A risk analysis has four
main objectives. What is not one of the four main objectives of a risk analysis?

  • A. Identifying assets and their value
  • B. Determining the costs of threats
  • C. Establishing a balance between the costs of an incident and the costs of a security measure
  • D. Determining relevant vulnerabilities and threats
Answer:

B


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 4

What is an example of a security incident?

  • A. The lighting in the department no longer works.
  • B. A member of staff loses a laptop.
  • C. You cannot set the correct fonts in your word processing software.
  • D. A file is saved under an incorrect name.
Answer:

B


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 5

Which of the following measures is a corrective measure?

  • A. Incorporating an Intrusion Detection System (IDS) in the design of a computer centre
  • B. Installing a virus scanner in an information system
  • C. Making a backup of the data that has been created or altered that day
  • D. Restoring a backup of the correct database after a corrupt copy of the database was written over the original
Answer:

D


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 6

We can acquire and supply information in various ways. The value of the information depends on
whether it is reliable. What are the reliability aspects of information?

  • A. Availability, Information Value and Confidentiality
  • B. Availability, Integrity and Confidentiality
  • C. Availability, Integrity and Completeness
  • D. Timeliness, Accuracy and Completeness
Answer:

B


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 7

Your company has to ensure that it meets the requirements set down in personal data protection
legislation. What is the first thing you should do?

  • A. Make the employees responsible for submitting their personal data.
  • B. Translate the personal data protection legislation into a privacy policy that is geared to the company and the contracts with the customers.
  • C. Appoint a person responsible for supporting managers in adhering to the policy.
  • D. Issue a ban on the provision of personal information.
Answer:

B


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 8

What sort of security does a Public Key Infrastructure (PKI) offer?

  • A. It provides digital certificates which can be used to digitally sign documents. Such signatures irrefutably determine from whom a document was sent.
  • B. Having a PKI shows customers that a web-based business is secure.
  • C. By providing agreements, procedures and an organization structure, a PKI defines which person or which system belongs to which specific public key.
  • D. A PKI ensures that backups of company data are made on a regular basis.
Answer:

C


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 9

An employee in the administrative department of Smiths Consultants Inc. finds out that the expiry
date of a contract with one of the clients is earlier than the start date. What type of measure could
prevent this error?

  • A. Availability measure
  • B. Integrity measure
  • C. Organizational measure
  • D. Technical measure
Answer:

D


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 10

What is the greatest risk for an organization if no information security policy has been defined?

  • A. If everyone works with the same account, it is impossible to find out who worked on what.
  • B. Information security activities are carried out by only a few people.
  • C. Too many measures are implemented.
  • D. It is not possible for an organization to implement information security in a consistent manner.
Answer:

D


vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Page 1 out of 7
Viewing questions 1-10 out of 80
Go To
page 2