Search Header Logo

(Additional) CERTIPROF ISO27K Foundation

Authored by sudiyuwono wowo

Professional Development

1st Grade

Used 6+ times

(Additional) CERTIPROF ISO27K Foundation
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following should be included in the ISMS policy?

  • The deadline for the implementation of the ISMS.

  • The certificate of previous audits.

  • The result of a gap analysis.

  • A commitment to continual improvement of the ISMS.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

ISO/IEC 27001 requires that you must comply with Risk Management:

  • Establish and maintain criteria on information security risks.

  • Identify risks associated with the loss of confidentiality, integrity and availability of information.

  • Select appropriate information security risk treatment options taking into account the results of the risk assessment.

  • All of the above.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What aspects should be considered to determine the scope of the ISMS?

  • External and internal issues.

  • Assets and resources.

  • Risks and opportunities.

Threats and vulnerabilities.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement describes the critical success factors of an information security management system (ISMS)?

  • Conduct a second party audit.

  • Hire an information security coordinator.

  • Implementing a measurement system used to evaluate information security management performance that can provide suggestions for improvement.

  • Appoint at least two internal auditors for the information security system.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the ISO 27001 standard require for the treatment of information security risks?

  • Perform an information security risk treatment process to select appropriate information security risk treatment options taking into account the results of the risk assessment.

  • A consultancy to carry out precisely the treatment of information security risks.

  • A manager appointed by the top management to carry out the information security risk treatment under his expertise.

  • To acquire a set of information security tools to automate the treatment of risks.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does ISO 27001 require for the control of documented information?

  • A responsible person designated by the top management to carry out the control of documented information under his expertise.

  • Acquire a set of information security tools to control documented information effectively.

  • A consultancy to accurately perform the control of documented information.

  • Adequate protection, e.g., against loss of confidentiality, misuse, or loss of integrity.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does ISO 27001 require for scoping the information security management system?

  • Acquire a set of security tools.

  • Consider organizational boundaries, information systems boundaries and physical boundaries.

  • Processes, Technology, People.

  • All of the above.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?