
Activity 2 - ISMS
Authored by security itrc
Information Technology (IT)
Professional Development
Used 6+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
10 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the main focus of ISO 27001?
Financial risk management
Information security management
Environmental management
Quality management
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following standards is focused on information security risk management?
ISO 27001
ISO 27003
ISO 27005
ISO 27004
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is ISO 27003 primarily concerned with?
Information security risk assessment methodology
Guidance on implementing an Information Security Management System (ISMS)
Security controls for data protection
Metrics and reporting of ISMS effectiveness
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is a concept introduced in ISO 27001:2022 related to leadership?
The requirement for a full-time Chief Information Security Officer (CISO)
A stronger emphasis on the involvement of top management in the ISMS
Introduction of a dedicated security department
Mandating employee cybersecurity awareness training
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What does ISO 27004 focus on?
Information security management framework
Guidance on security control testing
Monitoring and measurement of the ISMS
Implementation of cryptographic controls
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
What is the purpose of conducting a risk assessment?
To identify, evaluate, and treat information security risks
To monitor the effectiveness of security policies
To measure the financial impact of security incidents
To define the organizational structure for information security
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Which of the following is the main objective of an Information Security Management System (ISMS)?
To create backup systems for information storage
To safeguard personal data from unauthorized access
To ensure ongoing confidentiality, integrity, and availability of data
To ensure compliance with local regulations only
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?