Cyber Monday Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which item is required to be included in an information security policy?

A.

A commitment to satisfy applicable requirements related to information security

B.

A plan for the continual improvement of the information security management system

C.

A framework enabling concerns with the information security policy to be addressed

D.

A Statement of Applicability which defines the necessary controls to be implemented

Which of the following statements about the differences between an internal audit and a certification audit is true?

An internal audit is conducted at planned intervals and a certification audit is conducted annually

An internal audit is known as a 1st party audit and a certification audit is known as a 3rd party audit

A.

Only 1 is true

B.

Only 2 is true

C.

Both 1 and 2 are true

D.

Neither 1 or 2 is true

Which statement describes a requirement for information security objectives?

A.

They shall be consistent with the information security policy

B.

They shall all be measurable

C.

They shall be contractually transferred to third parties

D.

They shall be reviewed at least annually

Which attribute is NOT a required focus of continual ISMS improvement?

A.

Adequacy

B.

Effectiveness

C.

Suitability

D.

Importance

Which of the following is required to be considered when selecting appropriate information security risk treatment options?

A.

Criteria for accepting identified risks

B.

Criteria for performing risk assessments

C.

Only risk controls in Annex A of ISO/IEC 27001

D.

Only risk controls in ISO/IEC 27002

Which ISMS documentation is part of the minimum scope of documented information required to be managed and controlled?

A.

Records of management decisions related to continual improvement

B.

Third party information security awareness materials

C.

The budget assigned to operate the ISMS and its related allocations

D.

A statement of correspondence between other ISO standards and the ISMS

To whom are the information security policies required to be communicated, according to the control in Annex A of ISO/IEC 27001?

A.

Top management

B.

Only staff with accountability for ISMS operation

C.

Employees within the scope of the ISMS

D.

Relevant personnel and relevant interested parties

In an audit, what is the definition of an observation?

A.

A non-fulfilment of a requirement of ISO/IEC 27001

B.

A conformity to the standard where there is an opportunity for improvement

C.

An issue excluded from the scope of the standard

D.

An issue raised by an interested party

Who determines the number of days required for a certification audit?

A.

The management representative from the organization to be audited

B.

The external auditor from the Certification Body who will undertake the audit

C.

The lead internal auditor from the organization to be audited

D.

Both the management representative and the external auditor together

Which action is a required response to an identified residual risk?

A.

By default, it shall be controlled by information security awareness and training

B.

Top management shall delegate its treatment to risk owners

C.

It shall be reviewed by the risk owner to consider acceptance

D.

The organization shall change practices to avoid the risk occurring