Search Header Logo

Activity 2 - ISMS

Authored by security itrc

Information Technology (IT)

Professional Development

Used 6+ times

Activity 2 - ISMS
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the main focus of ISO 27001?

Financial risk management

Information security management

Environmental management

Quality management

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following standards is focused on information security risk management?

ISO 27001

ISO 27003

ISO 27005

ISO 27004

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is ISO 27003 primarily concerned with?

Information security risk assessment methodology

Guidance on implementing an Information Security Management System (ISMS)

Security controls for data protection

Metrics and reporting of ISMS effectiveness

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is a concept introduced in ISO 27001:2022 related to leadership?

The requirement for a full-time Chief Information Security Officer (CISO)

A stronger emphasis on the involvement of top management in the ISMS

Introduction of a dedicated security department

Mandating employee cybersecurity awareness training

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does ISO 27004 focus on?

Information security management framework

Guidance on security control testing

Monitoring and measurement of the ISMS

Implementation of cryptographic controls

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of conducting a risk assessment?

To identify, evaluate, and treat information security risks

To monitor the effectiveness of security policies

To measure the financial impact of security incidents

To define the organizational structure for information security

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is the main objective of an Information Security Management System (ISMS)?

To create backup systems for information storage

To safeguard personal data from unauthorized access

To ensure ongoing confidentiality, integrity, and availability of data

To ensure compliance with local regulations only

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?