Information Security Ex0 105 Foundation Based On Iso Iec 27002 Practice Test - Set 1

Test your knowledge with this Information Security Ex0 105 Foundation Based On Iso Iec 27002 mock exam. Get real-world IT questions and prepare for certification success.

EX0-105: Information Security Foundation based on ISO/IEC 27002 - Exam Information

Exam Information

Exam Code

Information Security Ex0 105 Foundation Based On Iso Iec 27002

Exam Title

EX0-105: Information Security Foundation based on ISO/IEC 27002

Vendor

Axelos

Difficulty

Intermediate

Duration

1.5 Hours

Question Format

Multiple Choice

Last Updated

March 7, 2025

Examines core concepts of information security based on ISO standards.

Practice Test

Shop Best EX0-105: Information Security Foundation based on ISO/IEC 27002 Resources Worldwide Amazon

1. What is the purpose of ISO/IEC 27002?

Information security management
Cloud architecture
Software testing
Network topology

2. What is the primary goal of information security?

Protect confidentiality, integrity, and availability of information
Increase network speed
Reduce hardware costs
Enhance software development

3. Which of the following is a key principle of information security?

Confidentiality
Scalability
Elasticity
Redundancy

4. What is the purpose of a risk assessment in information security?

Identify and evaluate risks
Increase network speed
Reduce hardware costs
Enhance software development

5. What is the purpose of an Information Security Management System (ISMS)?

Manage and protect information assets
Increase network speed
Reduce hardware costs
Enhance software development

6. Which of the following is a common information security control?

Access control
Data compression
Network routing
Software testing

7. What is the purpose of encryption in information security?

Protect data confidentiality
Increase network speed
Reduce hardware costs
Enhance software development

8. What is the purpose of a firewall in information security?

Control network traffic
Increase network speed
Reduce hardware costs
Enhance software development

9. What is the purpose of a security policy?

Define rules for information security
Increase network speed
Reduce hardware costs
Enhance software development

10. What is the purpose of a vulnerability assessment?

Identify security weaknesses
Increase network speed
Reduce hardware costs
Enhance software development

11. What is the purpose of a security audit?

Evaluate compliance with security policies
Increase network speed
Reduce hardware costs
Enhance software development

12. What is the purpose of a backup in information security?

Ensure data availability
Increase network speed
Reduce hardware costs
Enhance software development

13. What is the purpose of a security incident response plan?

Manage and mitigate security incidents
Increase network speed
Reduce hardware costs
Enhance software development

14. What is the purpose of a security awareness program?

Educate employees about security risks
Increase network speed
Reduce hardware costs
Enhance software development

15. What is the purpose of a security control framework?

Provide guidelines for implementing security controls
Increase network speed
Reduce hardware costs
Enhance software development

16. What is the purpose of a security risk assessment?

Identify and evaluate security risks
Increase network speed
Reduce hardware costs
Enhance software development

17. What is the purpose of a security policy?

Define rules for information security
Increase network speed
Reduce hardware costs
Enhance software development

18. What is the purpose of a security awareness program?

Educate employees about security risks
Increase network speed
Reduce hardware costs
Enhance software development

19. What is the purpose of a security control framework?

Provide guidelines for implementing security controls
Increase network speed
Reduce hardware costs
Enhance software development

20. What is the purpose of a security risk assessment?

Identify and evaluate security risks
Increase network speed
Reduce hardware costs
Enhance software development

21. What is the primary purpose of a security incident response plan?

Provide structured approach to handle security breaches
Eliminate all security risks
Replace security controls
Reduce need for monitoring

22. Which security control helps prevent unauthorized access to systems?

Multi-factor authentication
Open networks
Shared accounts
No password policies

23. What is the main purpose of security awareness training?

Educate employees about security risks
Replace technical controls
Eliminate all threats
Reduce need for policies

24. Which principle ensures that systems are available when needed?

Availability
Confidentiality
Integrity
Non-repudiation

25. What is the primary purpose of encryption?

Protect data confidentiality
Increase system performance
Replace firewalls
Eliminate backups

26. Which security control helps detect intrusions?

Intrusion Detection System
No monitoring
Open ports
Shared credentials

27. What is the main purpose of a Business Continuity Plan?

Ensure critical operations continue during disruptions
Replace all security controls
Eliminate all risks
Reduce need for testing

28. Which practice helps prevent social engineering attacks?

Security awareness training
Open door policies
Shared passwords
No verification procedures

29. What is the primary purpose of a vulnerability assessment?

Identify security weaknesses
Eliminate all risks
Replace penetration testing
Reduce need for patching

30. Which security control helps verify user identities?

Authentication
Authorization
Accounting
Auditing

31. What is the main purpose of data classification?

Apply appropriate protection based on sensitivity
Eliminate all encryption
Replace access controls
Reduce need for policies

32. Which principle ensures that data is not altered improperly?

Integrity
Confidentiality
Availability
Accountability

33. What is the primary purpose of a firewall?

Control network traffic
Prevent all attacks
Replace antivirus
Eliminate need for patching

34. Which security control helps track user activities?

Logging and monitoring
No auditing
Shared accounts
Open access

35. What is the main purpose of patch management?

Fix known vulnerabilities
Eliminate all risks
Replace security testing
Reduce need for updates

36. Which practice helps protect against malware?

Antivirus software
Opening all email attachments
Disabling updates
No firewalls

37. What is the primary purpose of access control lists?

Define who can access what resources
Eliminate all authentication
Replace encryption
Reduce need for policies

38. Which security control helps ensure non-repudiation?

Digital signatures
Shared accounts
No logging
Open access

39. What is the main purpose of a security policy?

Define organizational security expectations
Eliminate all risks
Replace technical controls
Reduce need for training

40. Which practice helps protect sensitive data in transit?

Encryption
Plain text transmission
Shared networks
No authentication

41. What is the primary purpose of a Disaster Recovery Plan?

Restore systems after major incidents
Prevent all disasters
Replace backups
Eliminate need for testing

42. Which security control helps prevent data leaks?

Data Loss Prevention systems
Open file sharing
No encryption
Shared accounts

43. What is the main purpose of security baselines?

Define minimum security configurations
Eliminate all customization
Replace risk assessments
Reduce need for patching

44. Which principle ensures actions can be traced to individuals?

Accountability
Confidentiality
Integrity
Availability

45. What is the primary purpose of a security operations center?

Monitor and respond to security events
Eliminate all threats
Replace all controls
Reduce need for policies

46. Which security control helps verify system configurations?

Configuration management
No documentation
Ad-hoc changes
Shared access

47. What is the main purpose of penetration testing?

Identify exploitable vulnerabilities
Eliminate all risks
Replace audits
Reduce need for monitoring

48. Which practice helps protect against phishing?

User education
Opening all emails
Disabling filters
No authentication

49. What is the primary purpose of security certifications?

Validate security knowledge
Eliminate all risks
Replace experience
Reduce need for training

50. Which security control helps prevent unauthorized changes?

Change management
Ad-hoc modifications
Shared credentials
No approval process

51. What is the main purpose of security metrics?

Measure security program effectiveness
Eliminate all reporting
Replace audits
Reduce need for monitoring

52. Which practice helps protect mobile devices?

Mobile Device Management
No encryption
Shared devices
Open networks

53. What is the primary purpose of a security architecture?

Design secure systems
Eliminate all risks
Replace policies
Reduce need for controls

54. Which security control helps prevent insider threats?

Privileged access management
Shared admin accounts
No monitoring
Open access

55. What is the main purpose of security governance?

Align security with business objectives
Eliminate all risks
Replace technical controls
Reduce need for policies

56. Which practice helps protect cloud environments?

Cloud Access Security Broker
Shared credentials
No encryption
Open APIs

57. What is the primary purpose of threat intelligence?

Understand potential attacks
Eliminate all threats
Replace monitoring
Reduce need for controls

58. Which security control helps prevent data breaches?

Encryption
Plain text storage
Shared databases
No access controls

59. What is the main purpose of security standards?

Provide consistent security practices
Eliminate all customization
Replace risk assessments
Reduce need for training

60. Which practice helps ensure secure software development?

Secure SDLC
No testing
Rushed releases
Ignoring vulnerabilities

The Information Security Ex0 105 Foundation Based On Iso Iec 27002 certification is a globally recognized credential for IT professionals. This practice test helps you prepare by covering key topics like hardware, networking, troubleshooting, and security.

Want more practice? Check out our other mock exams:

© 2025 ITCertRocket.com - Hands-On IT Lab Exercises & Certification Prep. All rights reserved.