Search Header Logo

Scenario Based#2

Authored by sudiyuwono wowo

Professional Development

1st Grade

Scenario Based#2
AI

AI Actions

Add similar questions

Adjust reading levels

Convert to real-world scenario

Translate activity

More...

    Content View

    Student View

5 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

DetSearch established the ISMS project team comprising only information security experts. Is this a good practice to follow?

No, while establishing the ISMS project team comprising of only experts in the information security could bring valuable knowledge in the information security and technology to DetSearch, it is not a good practice in its entirety

Yes, including individuals from different background in the ISMS project team would only slow down the decision-making process for DetSearch, leading to a less efficient implementation of security measures

Yes, having a team of only experts in the information security would ensure that the ISMS would be implemented smoothly

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Clara identified the resources for the ISMS implementation. Is this a good practice?

Yes, the ISMS project manager is responsible for determining the necessary resources for the ISMS implementation

No, everyone affected by the ISMS should take part in identifying the necessary resources for the ISMS implementation

No, the ISMS team should identify the necessary resources for the ISMS implementation

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Did the ISMS team correctly follow the systematic approach of conducting the gap analysis?

No, the ISMS team should have firstly focused on setting specific targets for each information security control before conducting the gap analysis to ensure a more accurate assessment

No, the ISMS team should have skipped the gap analysis as it is an unnecessary step t only adds complexity to the ISMS implementation

Yes, the ISMS team correctly followed the systematic approach of conducting the gap analysis

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

During the process of drafting the information security policy, did Carla follow all the essential steps?

No, Carla did not validate the policy with the interested parties

No, Carla failed to consider the integration of the operational specifications and references to specific products in the policy

Yes, Carla followed all the essential steps to draft the policy

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which risk analysis technique did the ISMS team use?

Qualitative risk analysis

Semi-qualitative risk analysis

Quantitative risk analysis

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?

Discover more resources for Professional Development