Spring Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

CertiProf I27001F Dumps

Page: 1 / 4
Total 40 questions

Certified ISO/IEC 27001:2022 Foundation Questions and Answers

Question 1

What does ISO/IEC 27001:2022 require for the control of documented information?

Options:

A.

Control documented information so that it is available and suitable for use, where and when it is needed

B.

Acquire a technological tool to control documented information effectively

C.

Have an internal auditor validate that documented information control is performed externally

D.

Hire a consultancy to determine how documented information should be controlled in order to achieve certification

Question 2

What details must be included in a Statement of Applicability?

Options:

A.

A list of the risks applicable to the organization

B.

Evidence of top management authorization of the controls

C.

The necessary controls with justification for inclusion and exclusion

D.

The information security policy

Question 3

Which statement describes a critical success factor for an Information Security Management System ISMS?

Options:

A.

Hiring an information security coordinator

B.

Implementing a measurement system used to evaluate information security management performance and provide suggestions for improvement

C.

Performing a second-party audit

D.

Appointing at least two internal auditors for the information security system

Question 4

Within the ISMS, establishing, approving, and supporting compliance with the information security policy is a responsibility of:

Options:

A.

The quality management representative

B.

Top management

C.

The implementation leader

D.

The IT Security Manager

Question 5

The information security policy must be known by:

Options:

A.

The quality management representative

B.

The IT Manager

C.

The IT Security Manager

D.

Everyone in the organization

Question 6

How should top management provide evidence of its commitment to the Information Security Management System?

Options:

A.

By communicating the importance of meeting ISMS requirements

B.

By conducting an annual internal audit of the Information Security Management System

C.

By operating the Information Security Management System once it has been established

D.

By defining a risk assessment approach

Question 7

What are the phases of the PDCA cycle?

Options:

A.

Plan, Validate, Verify, Act

B.

Plan, Do, Check, Act

C.

Plan, Do, Verify, Assure

D.

Propose, Do, Validate, Act

Question 8

What does ISO/IEC 27001:2022 require for the control of documented information?

Options:

A.

A person designated by top management with expertise to control documented information

B.

Acquisition of a set of information security tools for effective documented information control

C.

A consultancy to accurately perform documented information control

D.

Appropriate protection, for example, against loss of confidentiality, improper use, or loss of integrity

Question 9

What does ISO/IEC 27001:2022 require in order to evaluate information security performance and the effectiveness of the Information Security Management System?

Options:

A.

Information security tools to evaluate information security performance and system effectiveness

B.

A consultancy to accurately perform the evaluation of information security performance and validate the effectiveness of the management system

C.

The organization must determine what needs to be monitored and measured, including information security processes and controls

D.

A person designated by top management with expertise to evaluate information security performance and system effectiveness

Question 10

What does ISO/IEC 27001:2022 require in order for top management to demonstrate leadership and commitment with respect to the Information Security Management System?

Options:

A.

Ensuring that the information security policy and information security objectives are established and are compatible with the strategic direction of the organization

B.

Hiring a consultancy to determine the best way to do it

C.

Appointing a volunteer to be responsible for the Information Security Management System

D.

Nothing is required

Question 11

According to ISO/IEC 27001:2022 clause 4.3, what aspects must be considered when determining the scope of the Information Security Management System?

Options:

A.

Assets and resources

B.

Risks and opportunities

C.

Threats and vulnerabilities

D.

External and internal issues, and interfaces and dependencies

Question 12

What does ISO/IEC 27001:2022 require for information security risk treatment?

Options:

A.

A consultancy to accurately perform information security risk treatment

B.

Performing an information security risk treatment process to select appropriate risk treatment options, taking into account the results of the risk assessment

C.

A person designated by top management with expertise to perform information security risk treatment

D.

Acquiring a set of information security tools to automate risk treatment

Page: 1 / 4
Total 40 questions