Search Header Logo

ISO 27001 Quiz

Authored by Catharina Stam

Other

Professional Development

Used 111+ times

ISO 27001 Quiz
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

14 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

ISO/IEC 27002:2013 does not specify technology

TRUE

FALSE

2.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

One of the best methods for reducing risks to the data of an organization is to implement a program that establishes an information security governance framework.

TRUE

FALSE

3.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

ISO/IEC 27001:2013 is a methodology that includes requirements for the assessment and treatment of information security risks tailored to the needs of the organization.

TRUE

FALSE

4.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

According to ISO/IEC 27001:2013, the four main steps in an ISMS implementation are: 1- Understanding organization’s needs, 2- implementing and operating controls and measures, 3- monitoring and reviewing performance of the ISMS, 4- continuously improving the ISMS

TRUE

FALSE

5.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What is an information security policy?

A. A document presenting results to be achieved in information security

B. Intentions and direction of an organization about information security, as formally expressed by its top management

C. A high level document that affects the whole organization and defines security roles and responsibilities

D. A set of information security procedures that work together to address risks

6.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

Risk assessment consists of the following activities:

A. Identification, Evaluation, Analysis, Treatment

B. Identification, Analysis, Evaluation

C. Identification, Response, Evaluation

D. Identification, Analysis, Evaluation, Treatment

7.

MULTIPLE CHOICE QUESTION

1 min • 1 pt

What do you need to get strongly authenticated on a logical access control system?

A. A strong password compliant with NIST’s recommendations

B. A passphrase in more than 22 characters

C. Something biometric, no matter what

D. A password and your finger, for instance

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?