Which trend in information security performance is required to be considered during a management review of the ISMS?
Which of the following is required to be considered when selecting appropriate information security risk treatment options?
Identify the missing word(s) in the following sentence.
“Information security, cybersecurity and privacy protection – [ ? ]” is the title of ISO/IEC 27005.
Which action is a required response to an identified residual risk?
Which statement is a factor that will influence the implementation of the information security management system?
Who is required to ensure that staff are supported so that they can contribute to the information security management system?
Identify the missing word(s) in the following sentence.
When planning the ISMS, the organization is specifically required to plan actions to address risks and opportunities and how to [ ? ] these actions.
Which action must top management take to provide evidence of its commitment to the establishment, operation and improvement of the ISMS?
Which attribute is NOT a required focus of continual ISMS improvement?
Identify the missing word in the following sentence.
According to ISO/IEC 27000, the definition of risk [?] is a “process to comprehend the nature of risk and to determine the level of risk.”
Which activity is a required element of information security risk identification?
Which item is required to be considered when defining the scope and boundaries of the information security management system?
Which item is required to be defined when planning the organization's risk assessment process?
Which benefit is NOT relevant by implementing an ISMS for an organization?