Search Header Logo

Exercise - ISO27001 LEAD AUDITOR

Authored by sudiyuwono wowo

Social Studies

1st Grade

Used 4+ times

Exercise - ISO27001 LEAD AUDITOR
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Which statement below best describes the relationship between information security aspects?

  1. Threats exploit vulnerabilities to damage or destroy assets

  1. Controls protect assets by reducing threats

  1. Risk is a function of vulnerabilities that harm assets

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. A data processing tool crashed when a user added more data in the buffer than its storage capacity allows.

  2. The incident was caused by the tool's inability to bound check arrays. What kind of vulnerability is this?

  1. Integrity and availability

  1. Confidentiality and integrity

  1. Confidentiality and availability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Which option below about the ISMS scope is correct?

  1. ISMS scope should be available as documented information

  1. ISMS scope should ensure continual improvement

  1. ISMS scope should be compatible with the strategic orientation of the organization

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What factors should an auditor consider when evaluating the conformity of documented information?

Content and format

Dates and signatures

Alignment with policies

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. A marketing agency has developed its own risk assessment approach as part of theISMS implementation. Is this acceptable?

  1. Yes, any risk assessment methodology that provides accurate and reliable results is acceptable

  1. Yes, only if the risk assessment methodology is aligned with recognized risk assessment methodologies

  1. No, when implementing an ISMS, the risk assessment methodology provided by

    ISO/IEC 27001 should be used

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Which of options below is a control to the management of personnel that aims to avoid the occurrence of incidents?

  1. The organization regularly provides security awareness and training sessions for its employees

  1. The organization always reviews the security policy after the integration of a new division to the organization

  1. The organization conducts regular user access reviews to verify that only authorized employees have access to confidential information

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The auditor issued an unfavourable report for Company 1 by strictly examining the audit evidence. He was not intimidated when Company 1, the main client of his audit firm, threatened to terminate the contract if the audit report does not suit them. Which principle of auditing has the auditor followed?

Independence

Confidentiality

Fair presentation

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?