Exercise - ISO27001 LEAD AUDITOR

Exercise - ISO27001 LEAD AUDITOR

1st Grade

20 Qs

quiz-placeholder

Similar activities

SKKNI 11

SKKNI 11

1st Grade

16 Qs

SKKNI 9

SKKNI 9

1st Grade

17 Qs

FMS

FMS

1st - 5th Grade

16 Qs

SKKNI 12

SKKNI 12

1st Grade

16 Qs

ISO 19011:2018

ISO 19011:2018

1st - 3rd Grade

20 Qs

Audit Comptable et Financier

Audit Comptable et Financier

1st - 2nd Grade

20 Qs

Notion d’audit financier

Notion d’audit financier

1st Grade

20 Qs

SKKNI 26

SKKNI 26

1st Grade

16 Qs

Exercise - ISO27001 LEAD AUDITOR

Exercise - ISO27001 LEAD AUDITOR

Assessment

Quiz

Social Studies

1st Grade

Medium

Created by

sudiyuwono wowo

Used 4+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Which statement below best describes the relationship between information security aspects?

  1. Threats exploit vulnerabilities to damage or destroy assets

  1. Controls protect assets by reducing threats

  1. Risk is a function of vulnerabilities that harm assets

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. A data processing tool crashed when a user added more data in the buffer than its storage capacity allows.

  2. The incident was caused by the tool's inability to bound check arrays. What kind of vulnerability is this?

  1. Integrity and availability

  1. Confidentiality and integrity

  1. Confidentiality and availability

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Which option below about the ISMS scope is correct?

  1. ISMS scope should be available as documented information

  1. ISMS scope should ensure continual improvement

  1. ISMS scope should be compatible with the strategic orientation of the organization

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What factors should an auditor consider when evaluating the conformity of documented information?

Content and format

Dates and signatures

Alignment with policies

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. A marketing agency has developed its own risk assessment approach as part of theISMS implementation. Is this acceptable?

  1. Yes, any risk assessment methodology that provides accurate and reliable results is acceptable

  1. Yes, only if the risk assessment methodology is aligned with recognized risk assessment methodologies

  1. No, when implementing an ISMS, the risk assessment methodology provided by

    ISO/IEC 27001 should be used

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Which of options below is a control to the management of personnel that aims to avoid the occurrence of incidents?

  1. The organization regularly provides security awareness and training sessions for its employees

  1. The organization always reviews the security policy after the integration of a new division to the organization

  1. The organization conducts regular user access reviews to verify that only authorized employees have access to confidential information

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The auditor issued an unfavourable report for Company 1 by strictly examining the audit evidence. He was not intimidated when Company 1, the main client of his audit firm, threatened to terminate the contract if the audit report does not suit them. Which principle of auditing has the auditor followed?

Independence

Confidentiality

Fair presentation

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?