ISMS Assessment

ISMS Assessment

Professional Development

20 Qs

quiz-placeholder

Similar activities

CySa+ PT5: 2 of 3

CySa+ PT5: 2 of 3

9th Grade - Professional Development

20 Qs

BCS Systems & Architecture Quiz 4

BCS Systems & Architecture Quiz 4

University - Professional Development

24 Qs

Cloud migration prerequisite

Cloud migration prerequisite

University - Professional Development

15 Qs

Google Professional Architect 8 - 141 to 160

Google Professional Architect 8 - 141 to 160

Professional Development

20 Qs

Module 1 - Modern Management

Module 1 - Modern Management

Professional Development

20 Qs

Android Quiz

Android Quiz

10th Grade - Professional Development

25 Qs

Team Quiz 1

Team Quiz 1

Professional Development

15 Qs

AWS SAA - 16

AWS SAA - 16

Professional Development

20 Qs

ISMS Assessment

ISMS Assessment

Assessment

Quiz

Instructional Technology

Professional Development

Easy

Created by

Alaine Ng

Used 11+ times

FREE Resource

20 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Your organization has noticed an increase in phishing attacks. What is the most effective initial response?

  1. Block all emails from external sources.

  1. Conduct security awareness and phishing training for employees.

  1. Purchase a new anti-phishing tool.

  1. Restrict access to email for most employees.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. A critical software used by your organization is reaching end-of-life. What should you do?

  1. Keep using it while restricting access.

  1. Negotiate with the vendor for extended support.

  1. Immediately replace it with an alternative.

Plan a migration to supported software.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Following a data breach, what is the first action the company should take?

Revise the incident response plan.

Conduct a post-incident review.

  1. Penalize responsible employees.

Immediately notify customers.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the first step in implementing an ISMS in a small company?

Buy cybersecurity tools.

Define the ISMS scope and objectives.

  1. Start employee training on cybersecurity.

Hire a security team.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. Sensitive data was accessed by an unauthorized department. What do you do first?

Restrict access and review controls.

Delete the data.

  1. Ignore, since it was internal.

  1. Report to law enforcement.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. During a risk assessment, it's discovered that a critical piece of software used by the organization is nearing end-of-life and will no longer receive security updates. What is the BEST course of action?

  1. Continue using the software while restricting access to it.

  1. Seek an extension of support from the software vendor.

  1. Immediately switch to an alternative without a risk analysis.

  1. Plan and execute a migration to a supported software solution.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

  1. An employee loses a company-issued laptop containing unencrypted personally identifiable information (PII) of clients. Which of the following actions should be taken FIRST?

  1. Assess the impact of the lost data and determine the breach's severity.

  1. Ignore the incident if the laptop is password protected.

  1. Immediately inform all clients about the potential data breach.

  1. Suspend the responsible employee.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?