Useful Study Guide & Exam Questions to Pass the EXIN ISFS Exam Solve ISFS Practice Tests to Score High! www.CertFun.com Get complete detail on ISFS exam guide to crack EXIN Information Security Foundation based on ISO IEC 27001. You can collect all information on ISFS tutorial, practice test, books, study material, exam questions, and syllabus. Firm your knowledge on EXIN Information Security Foundation based on ISO IEC 27001 and get ready to crack ISFS certification. Explore all information on ISFS exam with number of questions, passing percentage and time duration to complete test. WWW.CERTFUN.COM PDF ISFS: EXIN Information Security Foundation based on ISO IEC 27001 1 How to Earn the EXIN ISFS Certification on Your First Attempt? Earning the EXIN ISFS certification is a dream for many candidates. But, the preparation journey feels difficult to many of them. Here we have gathered all the necessary details like the syllabus and essential ISFS sample questions to get to the EXIN Information Security Foundation based on ISO IEC 27001 certification on the first attempt. EXIN ISFS Summary: ● Exam Name: EXIN Information Security Foundation based on ISO IEC 27001 ● Exam Code: ISFS ● Exam Price: $262 (USD) ● Duration: 60 mins ● Number of Questions: 40 ● Passing Score: 65% ● Books / Training: EXIN and e-CF Competences ● Schedule Exam: Pearson VUE ● Sample Questions: EXIN ISFS Sample Questions ● Recommended Practice: EXIN ISFS Certification Practice Exam WWW.CERTFUN.COM PDF ISFS: EXIN Information Security Foundation based on ISO IEC 27001 2 Let ’ s Explore the EXIN ISFS Exam Syllabus in Detail: Topic Details Weights Information and security - 27.5% Concepts relating to information The candidate can ... - explain the difference between data and information. - explain information security management concepts. 10% Reliability aspects The candidate can ... - explain the value of the CIA-triangle. - describe the concepts accountability and auditability. 7.5% Securing information in the organization The candidate can ... - outline the objectives and the content of an information security policy. - explain how to ensure information security when working with suppliers. - outline roles and responsibilities relating to information security. 10% Threats and risks - 12.5% Threats and risks The candidate can ... - explain threat, risk, and risk management. - describe types of damage. - describe risk strategies. - describe risk analysis. 12.5% Security controls - 52.5% Outlining security controls The candidate can ... - give examples of each type of security control. 2.5% Organizational controls The candidate can ... - explain how to classify information assets. - describe controls to manage access to information. - explain threat and vulnerability management, project management, and incident management in information security. 15% WWW.CERTFUN.COM PDF ISFS: EXIN Information Security Foundation based on ISO IEC 27001 3 Topic Details Weights - explain the value of business continuity. - describe the value of audits and reviews. People controls The candidate can ... - explain how to enhance information security through contracts and agreements. - explain how to attain awareness regarding information security. 7.5% Physical controls The candidate can ... - describe entry controls. - describe how to protect information inside secure areas. - explain how protection rings work. 10% Technical controls The candidate can ... - outline how to manage information assets. - describe how to develop systems with information security in mind. - name controls that ensure network security. - describe technical controls to manage access. - describe how to protect information systems against malware, phishing, and spam. - explain how recording and monitoring contribute to information security. 17.5% Legislation, regulations, and standards - 7.5% Legislation and regulations The candidate can ... - give examples of legislation and regulations relating to information security. 2.5% Standards The candidate can ... - outline the ISO/IEC 27000, ISO/IEC 27001, and ISO/IEC 27002 standards. - outline other standards relating to information security. 5% WWW.CERTFUN.COM PDF ISFS: EXIN Information Security Foundation based on ISO IEC 27001 4 Experience the Actual Exam Structure with ISFS Sample Questions: Before jumping into the actual exam, it is crucial to get familiar with the EXIN Information Security Foundation based on ISO IEC 27001 exam structure. For this purpose, we have designed real exam-like sample questions. Solving these questions is highly beneficial to getting an idea about the exam structure and question patterns. For more understanding of your preparation level, go through the ISFS practice test questions. Find out the beneficial sample questions below- 01. When an employee detects an incident, to whom should it typically be reported first? a) The help desk b) The information security manager (ISM) c) The information security officer (ISO) d) The manager 02. In physical security, multiple protection rings can be applied in which different measures can be taken. What is not a protection ring? a) Building ring b) Middle ring c) Secure room ring d) Outer ring 03. What is the focus of information management? a) Allowing business activities and processes to continue without interruption b) Preventing unauthorized persons from having access to automated systems c) Ensuring that the value of information is identified and exploited d) Understanding how information flows through an organization 04. Who is responsible for the translation of the business strategy and objectives to security strategy and objectives? a) Chief information security officer (CISO) b) General management c) Information security officer (ISO) d) Information security policy officer 05. Besides integrity and confidentiality, what is the third reliability aspect of information? WWW.CERTFUN.COM PDF ISFS: EXIN Information Security Foundation based on ISO IEC 27001 5 a) Accuracy b) Availability c) Completeness d) Value 06. Sara has been tasked with ensuring that the organization complies with personal data legislation. What is the first thing she should do? a) Appoint a person responsible for supporting managers in adhering to the policy b) Issue a ban on collecting and storing personal information c) Make employees responsible for submitting their personal data d) Translate the personal data protection legislation into a privacy policy 07. A database system does not have the latest security patches applied to it and was hacked. The hackers were able to access the data and delete it. What information security concept describes the lack of security patches? a) Impact b) Risk c) Threat d) Vulnerability 08. An organization must understand the risks it is facing before it can take appropriate measures. What should be understood to determine risk? a) The likelihood of something happening and its consequences to the organization b) The most common dangers and how to mitigate these as defined in best practices c) The threats an organization faces and how vulnerable the organization is to them d) The unplanned events an organization faces and what to do in case of such an event 09. What is the difference between data and information? a) Data can be any facts or figures. Information is data that has meaning. b) Data consists of unstructured figures. Information consists of structured figures. c) Data does not require security. Information requires security. d) Data has no value. Information, which is processed data, has value. 10. How is the purpose of an information security policy best described? a) An information security policy documents the analysis of risks and the search for appropriate controls. b) An information security policy gives direction and support to the organization regarding information security. c) An information security policy makes the security plan concrete by providing it with the necessary details. WWW.CERTFUN.COM PDF ISFS: EXIN Information Security Foundation based on ISO IEC 27001 6 d) An information security policy provides insight into threats and the possible consequences. Answers for ISFS Sample Questions Answer 01:- a Answer 02:- b Answer 03:- c Answer 04:- a Answer 05:- b Answer 06:- d Answer 07:- d Answer 08:- a Answer 09:- a Answer 10:- b