Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > APMG-International > ISO/IEC 27001 > ISO-IEC-27001-Foundation

ISO-IEC-27001-Foundation ISO/IEC 27001 (2022) Foundation Exam Question and Answers

Question # 4

What is the definition of the term ‘integrity’ according to ISO/IEC 27000?

A.

The property of being accessible and usable

B.

The property that information is NOT made available inappropriately

C.

The property of accuracy and completeness

D.

The property of availability and confidentiality

Full Access
Question # 5

Which action is an organization required to take to ensure that personnel are competent to perform their assigned tasks within the ISMS?

A.

Identify products which could be used in the organization to improve ISMS performance and effectiveness

B.

Ensure all personnel are trained to ISO/IEC 27001 Foundation level

C.

Ensure that the controls for compliance with legal and contractual requirements are implemented

D.

Hold up-to-date records on training, skills, experience and qualifications

Full Access
Question # 6

Which output is a required result from risk analysis?

A.

Risk acceptance criteria

B.

Determined levels of risk

C.

Risk treatment control options

D.

Prioritized risks for treatment

Full Access
Question # 7

Which International Standard can be used to implement an integrated management system with ISO/IEC 27001?

A.

ISO/IEC 27003

B.

ISO/IEC 27013

C.

ISO 9001

D.

None of the above

Full Access
Question # 8

Which audit activity related to ISO/IEC 27001 may be carried out by a practitioner?

A.

Conduct a surveillance audit of their own area of the organization

B.

Conduct an internal audit of the organization

C.

Conduct an audit of an Accredited Training Organization

D.

Conduct an audit of a Certification Body

Full Access
Question # 9

What is required to be reported by the Information security event reporting control?

A.

Information disclosure

B.

Unauthorized access

C.

Asset disposal

D.

Observed or suspected events

Full Access
Question # 10

In which clause would the requirements for internal audit be found?

A.

Planning

B.

Operation

C.

Performance Evaluation

D.

Improvement

Full Access
Question # 11

Which statement describes a requirement for information security objectives?

A.

They shall be consistent with the information security policy

B.

They shall all be measurable

C.

They shall be contractually transferred to third parties

D.

They shall be reviewed at least annually

Full Access
Question # 12

Which information is required to be included in the Statement of Applicability?

A.

The scope and boundaries of the ISMS

B.

The risk assessment approach of the organization

C.

The criteria against which risk will be evaluated

D.

The justification for including each information security control

Full Access
Question # 13

Which item is required to be included in an information security policy?

A.

A commitment to satisfy applicable requirements related to information security

B.

A plan for the continual improvement of the information security management system

C.

A framework enabling concerns with the information security policy to be addressed

D.

A Statement of Applicability which defines the necessary controls to be implemented

Full Access
Question # 14

Which statement describes a requirement of an internal audit programme?

A.

The programme must use third party auditors to ensure impartiality

B.

Previous audit results are disregarded to ensure objectivity

C.

The programme must consider the importance of the target processes

D.

All processes must be audited within a 3-year cycle

Full Access
Question # 15

Which action must top management take to provide evidence of its commitment to the establishment, operation and improvement of the ISMS?

A.

Communicating feedback from interested parties to the organization

B.

Ensuring information security objectives are established

C.

Producing a risk assessment report

D.

Implementing the actions from internal audits

Full Access