Search Header Logo

ISO 27001 Lead Implementer - Part C

Authored by Yohana Gracia Naomi

others

Professional Development

Used 26+ times

 ISO 27001 Lead Implementer - Part C
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

40 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are going to play the role an ISO/IEC 27001:2022 lead implementer, during a business meeting you are asked, how many approaches can be user for the identification of information security risks?

Detection approach and risk mitigation approach

Event-based approach and approach based on the identification of assets, threats, and vulnerabilities

It is advisable to use only an asset detection approach

All approaches are correct

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The objectives of an ISMS are associated with confidentiality, integrity, and availability of information. Availability is the property that refers to:

The information maintains the same data as in its last access

Information property which keeps the information accesible when needed

That the information is not stolen by a cybercriminal

All of the above

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

According to ISO/IEC 27001:2022 and as explained in the CertiProf's certification program material, scope approval shall be a responsibility and authority assigned by:

The IT Manager

The Top Management

The management representative

The company's Internal Auditor

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of an Information Security policy?

An information security policy makes the security plan concrete by providing the necessary details

An information security policy provides insught into threats and the possible consequences

An information security policy provides direction and support to the management regarding information security

An information security policy documents the analysis of risks and the search for countermeasures

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following does a lack of adequate security controls represent?

Asset

Vulnerability

Impact

Threat

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

You are working on implementing ISO/IEC 27001:2022. Some specific policies you should consider are:

1. Physical security policy

2. Desktop policy

3. Access Control Policy

4. Remote Work Policy

5. Software Use Policy

2, 3, and 4

1 and 2

ISO/IEC 27001:2022 defines that you should only have one IS Policy and not so many specific policies

1 to 5

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is definition of compliance?

Laws, considered collectively or the process of making or enacting laws

The state or fact of accoring with or meeting rules or standards

An official or authoritative instruction

A rule of directive made and maintained by an authority

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?