
ISO 27001 Lead Implementer - Part C
Authored by Yohana Gracia Naomi
others
Professional Development
Used 26+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
40 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are going to play the role an ISO/IEC 27001:2022 lead implementer, during a business meeting you are asked, how many approaches can be user for the identification of information security risks?
Detection approach and risk mitigation approach
Event-based approach and approach based on the identification of assets, threats, and vulnerabilities
It is advisable to use only an asset detection approach
All approaches are correct
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The objectives of an ISMS are associated with confidentiality, integrity, and availability of information. Availability is the property that refers to:
The information maintains the same data as in its last access
Information property which keeps the information accesible when needed
That the information is not stolen by a cybercriminal
All of the above
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
According to ISO/IEC 27001:2022 and as explained in the CertiProf's certification program material, scope approval shall be a responsibility and authority assigned by:
The IT Manager
The Top Management
The management representative
The company's Internal Auditor
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of an Information Security policy?
An information security policy makes the security plan concrete by providing the necessary details
An information security policy provides insught into threats and the possible consequences
An information security policy provides direction and support to the management regarding information security
An information security policy documents the analysis of risks and the search for countermeasures
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following does a lack of adequate security controls represent?
Asset
Vulnerability
Impact
Threat
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are working on implementing ISO/IEC 27001:2022. Some specific policies you should consider are:
1. Physical security policy
2. Desktop policy
3. Access Control Policy
4. Remote Work Policy
5. Software Use Policy
2, 3, and 4
1 and 2
ISO/IEC 27001:2022 defines that you should only have one IS Policy and not so many specific policies
1 to 5
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is definition of compliance?
Laws, considered collectively or the process of making or enacting laws
The state or fact of accoring with or meeting rules or standards
An official or authoritative instruction
A rule of directive made and maintained by an authority
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?