Weekend Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium APMG-International ISO-IEC-27001-Foundation Dumps Questions Answers

ISO/IEC 27001 (2022) Foundation Exam Questions and Answers

Question 1

Which statement describes a requirement for information security objectives?

Options:

A.

They shall be consistent with the information security policy

B.

They shall all be measurable

C.

They shall be contractually transferred to third parties

D.

They shall be reviewed at least annually

Buy Now
Question 2

Which trend in information security performance is required to be considered during a management review of the ISMS?

Options:

A.

Achievement of information security objectives

B.

Validity of information continuity controls

C.

Relevant external and internal requirements changes

D.

Decisions related to continual improvement opportunities

Question 3

Which of the following is required to be considered when selecting appropriate information security risk treatment options?

Options:

A.

Criteria for accepting identified risks

B.

Criteria for performing risk assessments

C.

Only risk controls in Annex A of ISO/IEC 27001

D.

Only risk controls in ISO/IEC 27002

Question 4

Identify the missing word(s) in the following sentence.

“Information security, cybersecurity and privacy protection – [ ? ]” is the title of ISO/IEC 27005.

Options:

A.

Guidelines for information security management systems auditing

B.

Information security management systems – Requirements

C.

Guidance on managing information security risks

D.

Information security controls

Question 5

Which action is a required response to an identified residual risk?

Options:

A.

By default, it shall be controlled by information security awareness and training

B.

Top management shall delegate its treatment to risk owners

C.

It shall be reviewed by the risk owner to consider acceptance

D.

The organization shall change practices to avoid the risk occurring

Question 6

Which statement is a factor that will influence the implementation of the information security management system?

Options:

A.

The ISMS will be separate from the organization's overall management structure

B.

The ISMS will encompass all controls specified within ISO/IEC 27001

C.

The ISMS will be scaled to the controls according to the needs of the organization

D.

The ISMS will be operated as an independent process within the organization

Question 7

Who is required to ensure that staff are supported so that they can contribute to the information security management system?

Options:

A.

Top management of the organization

B.

Management responsible for each area of operation

C.

Auditors who audit each area of operation

D.

ISO/IEC 27001 practitioners within the organization

Question 8

Identify the missing word(s) in the following sentence.

When planning the ISMS, the organization is specifically required to plan actions to address risks and opportunities and how to [ ? ] these actions.

Options:

A.

communicate

B.

apply competent resources to

C.

improve the effectiveness of

D.

evaluate the effectiveness of

Question 9

Which action must top management take to provide evidence of its commitment to the establishment, operation and improvement of the ISMS?

Options:

A.

Communicating feedback from interested parties to the organization

B.

Ensuring information security objectives are established

C.

Producing a risk assessment report

D.

Implementing the actions from internal audits

Question 10

Which attribute is NOT a required focus of continual ISMS improvement?

Options:

A.

Adequacy

B.

Effectiveness

C.

Suitability

D.

Importance

Question 11

Identify the missing word in the following sentence.

According to ISO/IEC 27000, the definition of risk [?] is a “process to comprehend the nature of risk and to determine the level of risk.”

Options:

A.

Evaluation

B.

Analysis

C.

Assessment

D.

Management

Question 12

Which activity is a required element of information security risk identification?

Options:

A.

Determine the risk owners

B.

Consider the likelihood of the occurrence

C.

Prioritize the risk for treatment

D.

Determine the level of risk

Question 13

Which item is required to be considered when defining the scope and boundaries of the information security management system?

Options:

A.

The dependencies between activities performed by the organization

B.

The level of quality to which the ISMS must adhere

C.

The lessons learned from the information security experiences of other organizations

D.

The regular activities necessary to maintain and improve the ISMS

Question 14

Which item is required to be defined when planning the organization's risk assessment process?

Options:

A.

The parts of the ISMS scope which are excluded from the risk assessment

B.

How the effectiveness of the method will be measured

C.

The criteria for acceptable levels of risk

D.

There are NO specific information requirements

Question 15

Which benefit is NOT relevant by implementing an ISMS for an organization?

Options:

A.

Information security compliance will increase stakeholder trust in the organization

B.

Information security staff will be qualified to ISO/IEC 27001 Foundation level

C.

Information security controls are tailored to suit the organization's specific circumstances

D.

Information security risks are assessed and the probability and/or impact reduced