Weekend Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dumps65

APMG-International ISO-IEC-27001-Foundation Dumps

ISO/IEC 27001 (2022) Foundation Exam Questions and Answers

Question 1

Which action is a required response to an identified residual risk?

Options:

A.

By default, it shall be controlled by information security awareness and training

B.

Top management shall delegate its treatment to risk owners

C.

It shall be reviewed by the risk owner to consider acceptance

D.

The organization shall change practices to avoid the risk occurring

Question 2

Which activity is a required element of information security risk identification?

Options:

A.

Determine the risk owners

B.

Consider the likelihood of the occurrence

C.

Prioritize the risk for treatment

D.

Determine the level of risk

Question 3

Which factor is required to be determined when understanding the organization and its context?

Options:

A.

Internal issues affecting the purpose of the ISMS

B.

The information security objectives relevant to the ISMS

C.

The processes that will be required to operate the ISMS

D.

The ISO/IEC 27001 clauses which apply to the management system

Question 4

Which International Standard can be used to implement an integrated management system with ISO/IEC 27001?

Options:

A.

ISO/IEC 27003

B.

ISO/IEC 27013

C.

ISO 9001

D.

None of the above

Question 5

To whom are the information security policies required to be communicated, according to the control in Annex A of ISO/IEC 27001?

Options:

A.

Top management

B.

Only staff with accountability for ISMS operation

C.

Employees within the scope of the ISMS

D.

Relevant personnel and relevant interested parties

Question 6

Which statement describes a requirement of an internal audit programme?

Options:

A.

The programme must use third party auditors to ensure impartiality

B.

Previous audit results are disregarded to ensure objectivity

C.

The programme must consider the importance of the target processes

D.

All processes must be audited within a 3-year cycle

Question 7

Which item is required to be considered when defining the scope and boundaries of the information security management system?

Options:

A.

The dependencies between activities performed by the organization

B.

The level of quality to which the ISMS must adhere

C.

The lessons learned from the information security experiences of other organizations

D.

The regular activities necessary to maintain and improve the ISMS

Question 8

Identify the missing word(s) in the following sentence.

When planning the ISMS, the organization is specifically required to plan actions to address risks and opportunities and how to [ ? ] these actions.

Options:

A.

communicate

B.

apply competent resources to

C.

improve the effectiveness of

D.

evaluate the effectiveness of

Question 9

What is the definition of a threat according to ISO/IEC 27000?

Options:

A.

A potential cause of an unwanted incident which can result in harm to a system or organization

B.

A single or a series of unwanted or unexpected information security events

C.

A weakness of an asset or a control that can be exploited

D.

The risk remaining after risk treatment

Question 10

Identify the missing words in the following sentence.

The organization shall establish, implement, maintain and [ ? ] an information security management system, including the processes needed and their interactions, in accordance with the requirements of this document.

Options:

A.

report on

B.

continually improve

C.

communicate the importance of

D.

enforce standards for

Question 11

Which statement is a factor that will influence the implementation of the information security management system?

Options:

A.

The ISMS will be separate from the organization's overall management structure

B.

The ISMS will encompass all controls specified within ISO/IEC 27001

C.

The ISMS will be scaled to the controls according to the needs of the organization

D.

The ISMS will be operated as an independent process within the organization

Question 12

Which ISMS documentation is part of the minimum scope of documented information required to be managed and controlled?

Options:

A.

Records of management decisions related to continual improvement

B.

Third party information security awareness materials

C.

The budget assigned to operate the ISMS and its related allocations

D.

A statement of correspondence between other ISO standards and the ISMS

Question 13

Identify the missing word(s) in the following sentence.

“Information security, cybersecurity and privacy protection – [ ? ]” is the title of ISO/IEC 27005.

Options:

A.

Guidelines for information security management systems auditing

B.

Information security management systems – Requirements

C.

Guidance on managing information security risks

D.

Information security controls

Question 14

Which attribute is NOT a required focus of continual ISMS improvement?

Options:

A.

Adequacy

B.

Effectiveness

C.

Suitability

D.

Importance

Question 15

Which statement describes Annex A of ISO/IEC 27001?

Options:

A.

Defines the criteria for accepting risks

B.

Provides a reference list of information security controls and their requirements

C.

Defines a mandatory list of controls that shall be implemented

D.

Provides measures to determine risk treatment effectiveness

Page: 1 / 5
Total 50 questions