Search Header Logo
ISO 27001- 2022 Organizational controls

ISO 27001- 2022 Organizational controls

Assessment

Interactive Video

Information Technology (IT), Architecture

University

Practice Problem

Hard

Created by

Wayground Content

FREE Resource

The video tutorial provides a comprehensive overview of information security controls, highlighting newly introduced controls in the updated standard. It covers organizational controls, information classification, access and identity management, supplier and cloud security, incident management, and compliance with legal and regulatory requirements. Each section delves into specific controls, offering examples and implementation strategies to ensure the protection of information assets.

Read more

10 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the significance of the controls highlighted in green in the updated standard?

They are controls that have been removed.

They are newly introduced controls.

They are controls that have been simplified.

They are the most important controls.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is an example of a policy for information security?

A policy for office cleanliness.

A policy for employee dress code.

A policy for using company vehicles.

A password management policy.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the role of a Chief Information Security Officer (CISO)?

To manage the company's financial assets.

To lead the organization's information security program.

To oversee the company's marketing strategies.

To handle the company's legal affairs.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of segregation of duties in an organization?

To reduce the number of employees needed.

To increase the workload of employees.

To prevent conflicts of interest and minimize fraud risk.

To simplify the organizational structure.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is an example of threat intelligence?

Implementing a new marketing strategy.

Subscribing to security intelligence feeds.

Developing a new product line.

Conducting employee performance reviews.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is the purpose of classifying information based on sensitivity?

To apply appropriate security measures.

To decide which information can be deleted.

To determine the cost of information storage.

To organize information alphabetically.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is a key aspect of identity management?

Managing company financial records.

Managing unique identifiers like usernames and passwords.

Managing user access to social media.

Managing employee work schedules.

Access all questions and much more by creating a free account

Create resources

Host any resource

Get auto-graded reports

Google

Continue with Google

Email

Continue with Email

Classlink

Continue with Classlink

Clever

Continue with Clever

or continue with

Microsoft

Microsoft

Apple

Apple

Others

Others

Already have an account?