Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

ISO-IEC-27001-Foundation Exam Dumps - ISO/IEC 27001 (2022) Foundation Exam

Go to page:
Question # 9

Which of the following statements about the relationship between ISO/IEC 27001 and ISO/IEC 27002 is true?

    ISO/IEC 27002 provides implementation advice on the controls selected during the ISO/IEC 27001 information security risk management process

    ISO/IEC 27002 provides a process for information security risk management which implements the requirements of ISO/IEC 27001

A.

Only 1 is true

B.

Only 2 is true

C.

Both 1 and 2 are true

D.

Neither 1 or 2 is true

Full Access
Question # 10

What is the name of the control clause used to control information security breaches within Annex A of ISO/IEC 27001?

A.

Information security event reporting

B.

Information security event management

C.

Response to information security events

D.

Reporting information security incidents

Full Access
Question # 11

Which item is required to be considered when defining the scope and boundaries of the information security management system?

A.

The dependencies between activities performed by the organization

B.

The level of quality to which the ISMS must adhere

C.

The lessons learned from the information security experiences of other organizations

D.

The regular activities necessary to maintain and improve the ISMS

Full Access
Question # 12

Which statement describes a requirement for information security objectives?

A.

They shall be consistent with the information security policy

B.

They shall all be measurable

C.

They shall be contractually transferred to third parties

D.

They shall be reviewed at least annually

Full Access
Question # 13

Which statement describes a purpose of monitoring, measurement, analysis and evaluation according to ISO/IEC 27001?

A.

To evaluate information security performance

B.

To ensure that employees and contractors are competent

C.

To monitor the use of information assets

D.

To track the use of outsourced processes

Full Access
Question # 14

Which statement describes Annex A of ISO/IEC 27001?

A.

Defines the criteria for accepting risks

B.

Provides a reference list of information security controls and their requirements

C.

Defines a mandatory list of controls that shall be implemented

D.

Provides measures to determine risk treatment effectiveness

Full Access
Question # 15

Which audit activity related to ISO/IEC 27001 may be carried out by a practitioner?

A.

Conduct a surveillance audit of their own area of the organization

B.

Conduct an internal audit of the organization

C.

Conduct an audit of an Accredited Training Organization

D.

Conduct an audit of a Certification Body

Full Access
Go to page: