Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium CertiProf I27001F Dumps Questions Answers

Page: 1 / 3
Total 40 questions

Certified ISO/IEC 27001:2022 Foundation Questions and Answers

Question 1

What does ISO/IEC 27001:2022 require for the control of documented information?

Options:

A.

Control documented information so that it is available and suitable for use, where and when it is needed

B.

Acquire a technological tool to control documented information effectively

C.

Have an internal auditor validate that documented information control is performed externally

D.

Hire a consultancy to determine how documented information should be controlled in order to achieve certification

Buy Now
Question 2

What details must be included in a Statement of Applicability?

Options:

A.

Justification for the exclusion of controls

B.

Justification for the inclusion of controls

C.

The controls considered necessary

D.

All of the above

Question 3

A document defining the scope of the Information Security Management System may:

Options:

A.

Take into consideration a set of security tools

B.

Consider the scope and boundaries from an organizational and technological perspective

C.

Consider processes, technology, and people

D.

All of the above

Question 4

According to ISO/IEC 27001:2022, is it necessary to ensure that the Information Security Management System can achieve its intended results?

Options:

A.

It is only an observation to keep in mind when auditing the management system

B.

It is a requirement to be fulfilled

C.

It is a recommendation, but not a requirement

D.

None of the above

Question 5

The information security policy must be known by:

Options:

A.

The quality management representative

B.

The IT Manager

C.

The IT Security Manager

D.

Everyone in the organization

Question 6

According to ISO/IEC 27001:2022 clause 4.3, what aspects must be considered when determining the scope of the Information Security Management System?

Options:

A.

Assets and resources

B.

Risks and opportunities

C.

Threats and vulnerabilities

D.

External and internal issues, and interfaces and dependencies

Question 7

What are the phases of the PDCA cycle?

Options:

A.

Plan, Validate, Verify, Act

B.

Plan, Do, Check, Act

C.

Plan, Do, Verify, Assure

D.

Propose, Do, Validate, Act

Question 8

What does ISO/IEC 27001:2022 require in order for top management to demonstrate leadership and commitment with respect to the Information Security Management System?

Options:

A.

Ensuring that the information security policy and information security objectives are established and are compatible with the strategic direction of the organization

B.

Hiring a consultancy to determine the best way to do it

C.

Appointing a volunteer to be responsible for the Information Security Management System

D.

Nothing is required

Question 9

Annex A of ISO/IEC 27001:2022 consists of:

Options:

A.

Elements necessary for a good design and implementation of the ISMS

B.

A comprehensive list of controls grouped by themes

C.

Guidelines for risk management

D.

None of the above

Question 10

What are the three main aspects of information security?

Options:

A.

Durability, auditability, confidentiality

B.

Confidentiality, integrity, availability

C.

Confidentiality, recoverability, integrity

D.

Non-repudiation, authenticity, accountability

Question 11

In ISO/IEC 27001:2022, what does the information security risk assessment process refer to?

Options:

A.

Identifying risk owners

B.

Identifying information security risks

C.

Establishing and maintaining information security risk criteria

D.

All of the above

Question 12

What does ISO/IEC 27001:2022 require for information security risk assessment?

Options:

A.

A person designated by top management

B.

A consultancy to perform the information security risk assessment professionally

C.

Acquisition of a set of information security tools to automate the assessment using artificial intelligence

D.

Applying an information security risk assessment process that establishes and maintains information security risk criteria

Page: 1 / 3
Total 40 questions