Summer Special Flat 65% Limited Time Discount offer - Ends in 0d 00h 00m 00s - Coupon code: suredis

APMG-International ISO-IEC-27001-Foundation ISO/IEC 27001 (2022) Foundation Exam Exam Practice Test

ISO/IEC 27001 (2022) Foundation Exam Questions and Answers

Question 1

Which of the following is required to be considered when selecting appropriate information security risk treatment options?

Options:

A.

Criteria for accepting identified risks

B.

Criteria for performing risk assessments

C.

Only risk controls in Annex A of ISO/IEC 27001

D.

Only risk controls in ISO/IEC 27002

Question 2

When are the information security policies required to be reviewed, according to the Policies for information security control?

Options:

A.

Every six months

B.

Annually

C.

According to a schedule defined by the Certification Body

D.

At planned intervals and if significant changes occur

Question 3

In an audit, what is the definition of an observation?

Options:

A.

A non-fulfilment of a requirement of ISO/IEC 27001

B.

A conformity to the standard where there is an opportunity for improvement

C.

An issue excluded from the scope of the standard

D.

An issue raised by an interested party

Question 4

Which action is a required response to an identified residual risk?

Options:

A.

By default, it shall be controlled by information security awareness and training

B.

Top management shall delegate its treatment to risk owners

C.

It shall be reviewed by the risk owner to consider acceptance

D.

The organization shall change practices to avoid the risk occurring

Question 5

Which statement is a factor that will influence the implementation of the information security management system?

Options:

A.

The ISMS will be separate from the organization's overall management structure

B.

The ISMS will encompass all controls specified within ISO/IEC 27001

C.

The ISMS will be scaled to the controls according to the needs of the organization

D.

The ISMS will be operated as an independent process within the organization

Question 6

Who determines the number of days required for a certification audit?

Options:

A.

The management representative from the organization to be audited

B.

The external auditor from the Certification Body who will undertake the audit

C.

The lead internal auditor from the organization to be audited

D.

Both the management representative and the external auditor together

Question 7

What is the definition of a threat according to ISO/IEC 27000?

Options:

A.

A potential cause of an unwanted incident which can result in harm to a system or organization

B.

A single or a series of unwanted or unexpected information security events

C.

A weakness of an asset or a control that can be exploited

D.

The risk remaining after risk treatment

Question 8

What is the name of the control clause used to control information security breaches within Annex A of ISO/IEC 27001?

Options:

A.

Information security event reporting

B.

Information security event management

C.

Response to information security events

D.

Reporting information security incidents

Question 9

Which attribute is NOT a required focus of continual ISMS improvement?

Options:

A.

Adequacy

B.

Effectiveness

C.

Suitability

D.

Importance

Question 10

Which action must top management take to provide evidence of its commitment to the establishment, operation and improvement of the ISMS?

Options:

A.

Communicating feedback from interested parties to the organization

B.

Ensuring information security objectives are established

C.

Producing a risk assessment report

D.

Implementing the actions from internal audits

Question 11

Which item is required to be considered when defining the scope and boundaries of the information security management system?

Options:

A.

The dependencies between activities performed by the organization

B.

The level of quality to which the ISMS must adhere

C.

The lessons learned from the information security experiences of other organizations

D.

The regular activities necessary to maintain and improve the ISMS

Question 12

Which statement describes a requirement for information security objectives?

Options:

A.

They shall be consistent with the information security policy

B.

They shall all be measurable

C.

They shall be contractually transferred to third parties

D.

They shall be reviewed at least annually

Question 13

Which activity is a required element of information security risk identification?

Options:

A.

Determine the risk owners

B.

Consider the likelihood of the occurrence

C.

Prioritize the risk for treatment

D.

Determine the level of risk

Question 14

Which statement describes a requirement of an internal audit programme?

Options:

A.

The programme must use third party auditors to ensure impartiality

B.

Previous audit results are disregarded to ensure objectivity

C.

The programme must consider the importance of the target processes

D.

All processes must be audited within a 3-year cycle

Question 15

Identify the missing word(s) in the following sentence.

“Information security, cybersecurity and privacy protection – [ ? ]” is the title of ISO/IEC 27005.

Options:

A.

Guidelines for information security management systems auditing

B.

Information security management systems – Requirements

C.

Guidance on managing information security risks

D.

Information security controls