Search Header Logo

PRE TEST - ISO 27001

Authored by Ricky Firdaus

Professional Development

Professional Development

Used 3+ times

PRE TEST - ISO 27001
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is ISMS stands for?

Information Safety Management System

Integrated Security Management System

Integrated Safety Management System

Information Security Management System

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which control focuses on creating awareness and providing education and training to employees about information security practices?

Return of assets

Monitoring, review, and change management of supplier services

Information security awareness, education, and training

Installation of software on operational systems

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of the "Policies for information security" control (Annex 5,1) in ISO 27001:2022?

To ensure clear labeling of sensitive information

To define the rules and guidelines for information security within an organization

To establish physical security perimeters

To manage technical vulnerabilities

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of "Threat intelligence" control in ISO 27001:2022?

To collect and analyze information about potential security threats

To monitor physical security

To classify information

To manage technical vulnerabilities

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does "Secure authentication" (Annex 8,5) control in ISO 27001:2022 aim to achieve?

Protecting against malware

Protecting information during audit testing

Managing technical vulnerabilities

Ensuring strong passwords are used

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What term refers to the process of determining the classification level of information based on its sensitivity and importance?

Data masking

Inventory of information and other associated asset

Classification of information

Protection of PII

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

In which documents is it stated that the implementation of all 93 controls concerning information security should be thoroughly documented?

Risk Management Policy

Statement of Applicability

ISMS Policy

Organization Context and Scope of Implementation ISMS

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Professional Development