(Additional) CERTIPROF ISO27K Foundation

(Additional) CERTIPROF ISO27K Foundation

1st Grade

12 Qs

quiz-placeholder

Similar activities

Career Clusters

Career Clusters

7th - 12th Grade

16 Qs

Sixteen Career Clusters

Sixteen Career Clusters

7th - 8th Grade

16 Qs

Database

Database

1st - 5th Grade

15 Qs

ISO 27001

ISO 27001

1st - 10th Grade

7 Qs

Hotel Personnel

Hotel Personnel

University

10 Qs

Day#1B - Quiz 456

Day#1B - Quiz 456

1st Grade

16 Qs

Day#3A: Quiz 14-15-16

Day#3A: Quiz 14-15-16

1st Grade

16 Qs

DDASI 3 & 4: ISACA Framework and IT Audit Drivers

DDASI 3 & 4: ISACA Framework and IT Audit Drivers

University

8 Qs

(Additional) CERTIPROF ISO27K Foundation

(Additional) CERTIPROF ISO27K Foundation

Assessment

Quiz

Professional Development

1st Grade

Easy

Created by

sudiyuwono wowo

Used 6+ times

FREE Resource

12 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following should be included in the ISMS policy?

  • The deadline for the implementation of the ISMS.

  • The certificate of previous audits.

  • The result of a gap analysis.

  • A commitment to continual improvement of the ISMS.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

ISO/IEC 27001 requires that you must comply with Risk Management:

  • Establish and maintain criteria on information security risks.

  • Identify risks associated with the loss of confidentiality, integrity and availability of information.

  • Select appropriate information security risk treatment options taking into account the results of the risk assessment.

  • All of the above.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What aspects should be considered to determine the scope of the ISMS?

  • External and internal issues.

  • Assets and resources.

  • Risks and opportunities.

Threats and vulnerabilities.

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which statement describes the critical success factors of an information security management system (ISMS)?

  • Conduct a second party audit.

  • Hire an information security coordinator.

  • Implementing a measurement system used to evaluate information security management performance that can provide suggestions for improvement.

  • Appoint at least two internal auditors for the information security system.

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does the ISO 27001 standard require for the treatment of information security risks?

  • Perform an information security risk treatment process to select appropriate information security risk treatment options taking into account the results of the risk assessment.

  • A consultancy to carry out precisely the treatment of information security risks.

  • A manager appointed by the top management to carry out the information security risk treatment under his expertise.

  • To acquire a set of information security tools to automate the treatment of risks.

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does ISO 27001 require for the control of documented information?

  • A responsible person designated by the top management to carry out the control of documented information under his expertise.

  • Acquire a set of information security tools to control documented information effectively.

  • A consultancy to accurately perform the control of documented information.

  • Adequate protection, e.g., against loss of confidentiality, misuse, or loss of integrity.

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What does ISO 27001 require for scoping the information security management system?

  • Acquire a set of security tools.

  • Consider organizational boundaries, information systems boundaries and physical boundaries.

  • Processes, Technology, People.

  • All of the above.

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?