exin ISFS Exam Questions

Questions for the ISFS were updated on : Nov 21 ,2025

Page 1 out of 6. Viewing questions 1-15 out of 80

Question 1

What action is an unintentional human threat?

  • A. Arson
  • B. Theft of a laptop
  • C. Social engineering
  • D. Incorrect use of fire extinguishing equipment
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 2

Three characteristics determine the reliability of information. Which characteristics are these?

  • A. Availability, Integrity and Correctness
  • B. Availability, Integrity and Confidentiality
  • C. Availability, Nonrepudiation and Confidentiality
Answer:

B

User Votes:
A
50%
B
50%
C
50%

Discussions
vote your answer:
A
B
C
0 / 1000

Question 3

You are the owner of the courier company SpeeDelivery. You have carried out a risk analysis and
now want to determine your risk strategy. You decide to take measures for the large risks but not
for the small risks. What is this risk strategy called?

  • A. Risk bearing
  • B. Risk avoiding
  • C. Risk neutral
Answer:

C

User Votes:
A
50%
B
50%
C
50%

Discussions
vote your answer:
A
B
C
0 / 1000

Question 4

You have an office that designs corporate logos. You have been working on a draft for a large
client. Just as you are going to press the <save> button, the screen goes blank. The hard disk is
damaged and cannot be repaired. You find an early version of the design in your mail folder and
you reproduce the draft for the customer. What is such a measure called?

  • A. Corrective measure
  • B. Preventive measure
  • C. Reductive measure
Answer:

A

User Votes:
A
50%
B
50%
C
50%

Discussions
vote your answer:
A
B
C
0 / 1000

Question 5

A company moves into a new building. A few weeks after the move, a visitor appears unannounced
in the office of the director. An investigation shows that visitors passes grant the same access as the
passes of the companys staff. Which kind of security measure could have prevented this?

  • A. A physical security measure
  • B. An organizational security measure
  • C. A technical security measure
Answer:

A

User Votes:
A
50%
B
50%
C
50%

Discussions
vote your answer:
A
B
C
0 / 1000

Question 6

The Information Security Manager (ISM) at Smith Consultants Inc. introduces the following
measures to assure information security:
- The security requirements for the network are specified.
- A test environment is set up for the purpose of testing reports coming from the database.
- The various employee functions are assigned corresponding access rights.
- RFID access passes are introduced for the building.
Which one of these measures is not a technical measure?

  • A. The specification of requirements for the network
  • B. Setting up a test environment
  • C. Introducing a logical access policy
  • D. Introducing RFID access passes
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

What is the goal of an organization's security policy?

  • A. To provide direction and support to information security
  • B. To define all threats to and measures for ensuring information security
  • C. To document all incidents that threaten the reliability of information
  • D. To document all procedures required to maintain information security
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

What is the best description of a risk analysis?

  • A. A risk analysis is a method of mapping risks without looking at company processes.
  • B. A risk analysis helps to estimate the risks and develop the appropriate security measures.
  • C. A risk analysis calculates the exact financial consequences of damages.
Answer:

B

User Votes:
A
50%
B
50%
C
50%

Discussions
vote your answer:
A
B
C
0 / 1000

Question 9

Which one of the threats listed below can occur as a result of the absence of a physical measure?

  • A. A user can view the files belonging to another user.
  • B. A server shuts off because of overheating.
  • C. A confidential document is left in the printer.
  • D. Hackers can freely enter the computer network.
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

At Midwest Insurance, all information is classified. What is the goal of this classification of
information?

  • A. To create a manual about how to handle mobile devices
  • B. Applying labels making the information easier to recognize
  • C. Structuring information according to its sensitivity
Answer:

C

User Votes:
A
50%
B
50%
C
50%

Discussions
vote your answer:
A
B
C
0 / 1000

Question 11

You own a small company in a remote industrial are

  • A. Detective measure
  • B. Preventive measure
  • C. Repressive measure
Answer:

A

User Votes:
A
50%
B
50%
C
50%

Discussions
vote your answer:
A
B
C
0 / 1000

Question 12

A Dutch company requests to be listed on the American Stock Exchange. Which legislation within
the scope of information security is relevant in this case?

  • A. Public Records Act
  • B. Dutch Tax Law
  • C. Sarbanes-Oxley Act
  • D. Security regulations for the Dutch government
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 13

You are the first to arrive at work in the morning and notice that the CD ROM on which you saved
contracts yesterday has disappeared. You were the last to leave yesterday. When should you
report this information security incident?

  • A. This incident should be reported immediately.
  • B. You should first investigate this incident yourself and try to limit the damage.
  • C. You should wait a few days before reporting this incident. The CD ROM can still reappear and, in that case, you will have made a fuss for nothing.
Answer:

A

User Votes:
A
50%
B
50%
C
50%

Discussions
vote your answer:
A
B
C
0 / 1000

Question 14

Which is a legislative or regulatory act related to information security that can be imposed upon
all organizations?

  • A. ISO/IEC 27001:2005
  • B. Intellectual Property Rights
  • C. ISO/IEC 27002:2005
  • D. Personal data protection legislation
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

You read in the newspapers that the ex-employee of a large company systematically deleted files
out of revenge on his manager. Recovering these files caused great losses in time and money.
What is this kind of threat called?

  • A. Human threat
  • B. Natural threat
  • C. Social Engineering
Answer:

A

User Votes:
A
50%
B
50%
C
50%

Discussions
vote your answer:
A
B
C
0 / 1000
To page 2