Information Security Isfs Foundation Based On Iso Iec 27002 Practice Test - Set 1

Test your knowledge with this Information Security Isfs Foundation Based On Iso Iec 27002 mock exam. Get real-world IT questions and prepare for certification success.

ISFS: Information Security Foundation based on ISO/IEC 27002 - Exam Information

Exam Information

Exam Code

Information Security Isfs Foundation Based On Iso Iec 27002

Exam Title

ISFS: Information Security Foundation based on ISO/IEC 27002

Vendor

Axelos

Difficulty

Beginner

Duration

1.5 Hours

Question Format

Multiple Choice

Last Updated

March 7, 2025

Introduces foundational information security concepts.

Practice Test

Shop Best ISFS: Information Security Foundation based on ISO/IEC 27002 Resources Worldwide Amazon

1. What does ISFS focus on?

Foundational information security concepts
Cloud security only
Agile development
Network administration

2. Which principle ensures that only authorized users have access to information?

Confidentiality
Integrity
Availability
Authentication

3. What is the primary goal of ISO/IEC 27002?

Providing guidelines for information security management
Developing software applications
Monitoring physical security
Configuring hardware devices

4. Which security principle ensures that data is not altered or tampered with?

Integrity
Confidentiality
Availability
Accountability

5. What is the purpose of risk assessment in information security?

Identifying and mitigating potential threats
Eliminating all risks
Removing firewalls
Ensuring unrestricted access to data

6. Which of the following is an example of physical security control?

Access control badges
Firewall rules
Encryption algorithms
Software patches

7. What is the purpose of an information security policy?

Defining security objectives and guidelines
Eliminating security risks
Allowing unrestricted access
Providing software licenses

8. Which of the following is considered a technical security measure?

Firewalls
Security awareness training
Locked doors
Incident response planning

9. What is social engineering in cybersecurity?

Manipulating individuals to gain unauthorized access
Using advanced encryption methods
Developing secure applications
Blocking IP addresses

10. Which security measure ensures that users are who they claim to be?

Authentication
Confidentiality
Availability
Firewalls

11. What is the role of access control in information security?

Restricting unauthorized access to data and systems
Allowing open access to all employees
Eliminating firewalls
Encrypting all data

12. Which of the following best describes a security incident?

An event that compromises information security
A scheduled security audit
A regular software update
An increase in server capacity

13. What is the purpose of encryption in cybersecurity?

Protecting data by converting it into unreadable format
Deleting all sensitive data
Blocking all network traffic
Monitoring employee activity

14. Which security principle ensures that information is available when needed?

Availability
Confidentiality
Integrity
Authentication

15. What is the purpose of a security awareness program?

Educating employees about security risks and best practices
Developing new security software
Providing encryption services
Removing security controls

16. Which type of malware encrypts files and demands payment for decryption?

Ransomware
Trojan
Spyware
Adware

17. What is the role of a firewall in information security?

Filtering and monitoring network traffic
Providing physical security
Managing encryption keys
Conducting vulnerability scans

18. What is the purpose of an incident response plan?

Guiding organizations in handling security breaches
Preventing all cyberattacks
Blocking all internet traffic
Eliminating the need for security training

19. Which security measure helps protect against phishing attacks?

Employee training and awareness
Using weak passwords
Disabling antivirus software
Granting unrestricted access

20. Which international standard provides guidelines for information security management?

ISO/IEC 27002
ISO 9001
COBIT 5
ITIL

21. What is the primary purpose of an Information Security Policy?

Define organizational security expectations
Replace technical controls
Eliminate all risks
Reduce need for training

22. Which security control helps prevent unauthorized physical access?

Badge entry systems
Open doors
Shared keys
No visitor logs

23. What is the main purpose of security classification?

Determine appropriate protection levels
Eliminate all encryption
Replace access controls
Reduce need for policies

24. Which principle ensures that actions can be traced to individuals?

Accountability
Confidentiality
Integrity
Availability

25. What is the primary purpose of a clean desk policy?

Prevent unauthorized access to information
Eliminate all paperwork
Replace locks
Reduce need for shredders

26. Which security control helps verify system integrity?

File integrity monitoring
No logging
Shared admin accounts
Open access

27. What is the main purpose of a security awareness program?

Educate personnel about security risks
Replace technical controls
Eliminate all threats
Reduce need for policies

28. Which practice helps protect against social engineering?

Security training
Sharing passwords
No verification procedures
Open door policies

29. What is the primary purpose of access control?

Restrict resource access to authorized users
Eliminate all authentication
Replace encryption
Reduce need for monitoring

30. Which security control helps detect intrusions?

Intrusion Detection System
No monitoring
Open networks
Shared accounts

31. What is the main purpose of encryption?

Protect data confidentiality
Increase system performance
Replace firewalls
Eliminate backups

32. Which principle ensures systems are available when needed?

Availability
Confidentiality
Integrity
Non-repudiation

33. What is the primary purpose of a Business Continuity Plan?

Maintain critical operations during disruptions
Replace all security controls
Eliminate all risks
Reduce need for testing

34. Which security control helps prevent malware infections?

Antivirus software
Opening all email attachments
Disabling updates
No firewalls

35. What is the main purpose of patch management?

Address known vulnerabilities
Eliminate all risks
Replace security testing
Reduce need for updates

36. Which practice helps protect sensitive data in transit?

Transport encryption
Plain text transmission
Shared networks
No authentication

37. What is the primary purpose of a firewall?

Control network traffic
Prevent all attacks
Replace antivirus
Eliminate need for patching

38. Which security control helps ensure non-repudiation?

Digital signatures
Shared accounts
No logging
Open access

39. What is the main purpose of logging and monitoring?

Detect security incidents
Eliminate all threats
Replace access controls
Reduce need for policies

40. Which practice helps prevent password attacks?

Password complexity requirements
Simple passwords
Password sharing
No expiration

41. What is the primary purpose of a Disaster Recovery Plan?

Restore systems after major incidents
Prevent all disasters
Replace backups
Eliminate need for testing

42. Which security control helps prevent data leaks?

Data Loss Prevention systems
Open file sharing
No encryption
Shared accounts

43. What is the main purpose of security baselines?

Define minimum security configurations
Eliminate all customization
Replace risk assessments
Reduce need for patching

44. Which principle ensures data is not altered improperly?

Integrity
Confidentiality
Availability
Accountability

45. What is the primary purpose of a security operations center?

Monitor and respond to security events
Eliminate all threats
Replace all controls
Reduce need for policies

46. Which security control helps verify system configurations?

Configuration management
No documentation
Ad-hoc changes
Shared access

47. What is the main purpose of penetration testing?

Identify exploitable vulnerabilities
Eliminate all risks
Replace audits
Reduce need for monitoring

48. Which practice helps protect against phishing?

User education
Opening all emails
Disabling filters
No authentication

49. What is the primary purpose of security certifications?

Validate security knowledge
Eliminate all risks
Replace experience
Reduce need for training

50. Which security control helps prevent unauthorized changes?

Change management
Ad-hoc modifications
Shared credentials
No approval process

51. What is the main purpose of security metrics?

Measure security program effectiveness
Eliminate all reporting
Replace audits
Reduce need for monitoring

52. Which practice helps protect mobile devices?

Mobile Device Management
No encryption
Shared devices
Open networks

53. What is the primary purpose of a security architecture?

Design secure systems
Eliminate all risks
Replace policies
Reduce need for controls

54. Which security control helps prevent insider threats?

Privileged access management
Shared admin accounts
No monitoring
Open access

55. What is the main purpose of security governance?

Align security with business objectives
Eliminate all risks
Replace technical controls
Reduce need for policies

56. Which practice helps protect cloud environments?

Cloud Access Security Broker
Shared credentials
No encryption
Open APIs

57. What is the primary purpose of threat intelligence?

Understand potential attacks
Eliminate all threats
Replace monitoring
Reduce need for controls

58. Which security control helps prevent data breaches?

Encryption
Plain text storage
Shared databases
No access controls

59. What is the main purpose of security standards?

Provide consistent security practices
Eliminate all customization
Replace risk assessments
Reduce need for training

60. Which practice helps ensure secure software development?

Secure SDLC
No testing
Rushed releases
Ignoring vulnerabilities

The Information Security Isfs Foundation Based On Iso Iec 27002 certification is a globally recognized credential for IT professionals. This practice test helps you prepare by covering key topics like hardware, networking, troubleshooting, and security.

Want more practice? Check out our other mock exams:

© 2025 ITCertRocket.com - Hands-On IT Lab Exercises & Certification Prep. All rights reserved.