Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

According to ISO/IEC 27001:2022, who is required to carry out the ISMS review to ensure its suitability, adequacy, and effectiveness?

A.

Process owners

B.

The internal audit team

C.

The external certification audit company

D.

Top management

In the context of clause 6.1 actions to address risks and opportunities, the weakness of an asset or control that can be exploited by a threat is known as:

A.

Threat

B.

Risk

C.

Vulnerability

D.

Impact

Annex A of ISO/IEC 27001:2022 consists of:

A.

Elements necessary for a good design and implementation of the ISMS

B.

A comprehensive list of controls grouped by themes

C.

Guidelines for risk management

D.

None of the above

What does ISO/IEC 27001:2022 require in order for top management to demonstrate leadership and commitment with respect to the Information Security Management System?

A.

Ensuring that the information security policy and information security objectives are established and are compatible with the strategic direction of the organization

B.

Hiring a consultancy to determine the best way to do it

C.

Appointing a volunteer to be responsible for the Information Security Management System

D.

Nothing is required

What is the purpose of management review in ISO/IEC 27001:2022?

A.

To ensure that the information security policy matches all identified risks

B.

To ensure that employees receive information about updates to information security policies

C.

To ensure the continuing suitability, adequacy, and effectiveness of the ISMS

D.

To ensure that the information security policy covers all controls indicated in ISO/IEC 27001

Management review must include consideration of:

A.

Changes in external and internal issues that are relevant to the ISMS

B.

The status of actions from previous management reviews

C.

Opportunities for continual improvement

D.

All of the above

Within the ISMS, communicating the importance of effective information security management and of conforming to the ISMS requirements is a responsibility of:

A.

The IT Security Manager

B.

Top management

C.

The IT Manager

D.

The quality management representative

Which statement describes a critical success factor for an Information Security Management System ISMS?

A.

Hiring an information security coordinator

B.

Implementing a measurement system used to evaluate information security management performance and provide suggestions for improvement

C.

Performing a second-party audit

D.

Appointing at least two internal auditors for the information security system

The information security policy must be known by:

A.

The quality management representative

B.

The IT Manager

C.

The IT Security Manager

D.

Everyone in the organization

According to ISO/IEC 27001:2022 clause 4.3, what aspects must be considered when determining the scope of the Information Security Management System?

A.

Assets and resources

B.

Risks and opportunities

C.

Threats and vulnerabilities

D.

External and internal issues, and interfaces and dependencies