
A. ISO 27001:2022 Lead Implementer
Authored by Yohana Gracia Naomi
others
Professional Development
Used 15+ times

AI Actions
Add similar questions
Adjust reading levels
Convert to real-world scenario
Translate activity
More...
Content View
Student View
40 questions
Show all answers
1.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Based on CertiProf's ISO/IEC 27001:2022 Lead Implementer program training guide. Part of the information security management system includes organizational structure, policies, plans, responsibilities, procedures, processes and resources. How could the documented information structure be defined?
2.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are working on implementing ISO/IEC 27001:2022. Some specific policies you should consider are: 1. Physical security policy. 2. Desktop policy. 3. Access Control Policy. 4. Remote Work Policy. 5. Software Use Policy.
3.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are working as an ISMS Lead Implementer, under your experience what could be an order to consider in the implementation?
1. Define policy, define scope, assess risks, select controls, prepare a SOA (Statement of Application).
2. Prepare a SOA (Statement of Application), define scope, define policy, assess risks, select controls.
3. Define scope, assess risks, define policy, select controls, prepare a SOA (Statement of Application).
4. Define scope, define policy, eliminate risks, prepare a SOA (Statement of Application), select controls.
Under a PDCA approach, what would be the best steps to follow?
4.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
To comply with the requirement of the ISO/IEC 27001:2022 standard, we must establish an internal audit plan that allows us to review the ISMS management system. What is the purpose of the internal audit?
5.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
You are working as an ISO/IEC 27001:2022 lead implementer. You state that the organization must make a statement of applicability (SOA). The statement of applicability shall contain:
6.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
The person responsible for information security wants to establish a list of security controls as part of his work on actions to address risks and opportunities. What does he have to do first, before security risk treatment options can be selected?
7.
MULTIPLE CHOICE QUESTION
30 sec • 1 pt
Control 5.9 Inventory of information and other associated assets has been redesigned considering as part of management: 1. Inventory. 2. Ownership of assets. 3. Duties.
Access all questions and much more by creating a free account
Create resources
Host any resource
Get auto-graded reports

Continue with Google

Continue with Email

Continue with Classlink

Continue with Clever
or continue with

Microsoft
%20(1).png)
Apple
Others
Already have an account?