Spring Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > CertiProf > ISO 27000 > I27001F

I27001F Certified ISO/IEC 27001:2022 Foundation Question and Answers

Question # 4

Which of the following must be included in the ISMS policy?

A.

The deadline for ISMS implementation

B.

The certificate from previous audits

C.

The result of a gap analysis

D.

A commitment to continual improvement of the ISMS

Full Access
Question # 5

What are the three main aspects of information security?

A.

Durability, auditability, confidentiality

B.

Confidentiality, integrity, availability

C.

Confidentiality, recoverability, integrity

D.

Non-repudiation, authenticity, accountability

Full Access
Question # 6

According to ISO/IEC 27001:2022, who is required to carry out the ISMS review to ensure its suitability, adequacy, and effectiveness?

A.

Process owners

B.

The internal audit team

C.

The external certification audit company

D.

Top management

Full Access
Question # 7

According to the terms and definitions associated with ISO 27001, authenticity is defined as:

A.

The property of consistency in behaviour and intended results

B.

The property that an entity is what it claims to be

C.

The ability to prove that a claimed event has occurred or that a claimed action was performed by the entities that originated it

D.

None of the above

Full Access
Question # 8

The information security policy must be known by:

A.

The quality management representative

B.

The IT Manager

C.

The IT Security Manager

D.

Everyone in the organization

Full Access
Question # 9

Management review must include consideration of:

A.

Changes in external and internal issues that are relevant to the ISMS

B.

The status of actions from previous management reviews

C.

Opportunities for continual improvement

D.

All of the above

Full Access
Question # 10

Annex A of ISO/IEC 27001:2022 consists of:

A.

Elements necessary for a good design and implementation of the ISMS

B.

A comprehensive list of controls grouped by themes

C.

Guidelines for risk management

D.

None of the above

Full Access
Question # 11

A document defining the scope of the Information Security Management System may:

A.

Take into consideration a set of security tools

B.

Consider the scope and boundaries from an organizational and technological perspective

C.

Consider processes, technology, and people

D.

All of the above

Full Access
Question # 12

What does ISO/IEC 27001:2022 require for the control of documented information?

A.

Control documented information so that it is available and suitable for use, where and when it is needed

B.

Acquire a technological tool to control documented information effectively

C.

Have an internal auditor validate that documented information control is performed externally

D.

Hire a consultancy to determine how documented information should be controlled in order to achieve certification

Full Access