ISMS

ISMS

University

15 Qs

quiz-placeholder

Similar activities

Network Security Quiz 3CS2 01

Network Security Quiz 3CS2 01

University

15 Qs

 MCQs on IT Security Risk Management

MCQs on IT Security Risk Management

University

19 Qs

Huawei Security

Huawei Security

University

15 Qs

Data Security

Data Security

12th Grade - University

17 Qs

Seguridad RLS en Postgrest

Seguridad RLS en Postgrest

University

15 Qs

Week 5 Cybersecurity Governance & Law Quiz

Week 5 Cybersecurity Governance & Law Quiz

University

19 Qs

ISMS

ISMS

Assessment

Quiz

Information Technology (IT)

University

Medium

Created by

Anish Pudasaini

Used 1+ times

FREE Resource

15 questions

Show all answers

1.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

What is Information Security Management System?

A method for storing data in a database.
A set of rules for software development.
A process for creating marketing strategies.
An Information Security Management System (ISMS) is a framework for managing and protecting sensitive information.

2.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following can be classified as information?

Raw data without context
Unprocessed numbers
Random facts without relevance
Processed data that provides meaning or context.

3.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

The High level structure of the management standards include:-

Operation ; Performance evaluation ; Improvement ; Management responsibility

Context of the organization; Leadership ; Planning ; Support

Leadership ; Establish the ISMS ; Planning ; Support

Management responsibility ; Planning ; Support; Context of the organization

4.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Identify the option below that states the correct logical sequence of the Deming’s improvement cycle

CDPA

CPDA

PDCA

DPCA

5.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Data Privacy is

Business data that is valuable to the organization

Availability of personal data to unauthorized entities

Set of measures that ensure protection of PII from unauthorized access, disclosure, modification, or destruction.

All the above are correct

6.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Following is NOT an information security incident:

Nonavailability of Email server owing to monthly maintenance

Unavailability of network due to bandwidth bottlenecks

Accidental deletion of program files by a software programmer

All the above are security incidents

7.

MULTIPLE CHOICE QUESTION

30 sec • 1 pt

Which of the following is NOT a critical success factor for information security in an organization?

A good understanding of the information security requirements, risk assessment, and risk management

Visible support and commitment from all levels of management

Information security policy, objectives, and activities that reflect business objectives

External security consultants or technical experts

Create a free account and access millions of resources

Create resources
Host any resource
Get auto-graded reports
or continue with
Microsoft
Apple
Others
By signing up, you agree to our Terms of Service & Privacy Policy
Already have an account?