Pre-Summer Sale Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

CertiProf I27001F Certified ISO/IEC 27001:2022 Foundation Exam Practice Test

Page: 1 / 4
Total 40 questions

Certified ISO/IEC 27001:2022 Foundation Questions and Answers

Question 1

Which of the following must be included in the ISMS policy?

Options:

A.

The deadline for ISMS implementation

B.

The certificate from previous audits

C.

The result of a gap analysis

D.

A commitment to continual improvement of the ISMS

Question 2

What is the purpose of management review in ISO/IEC 27001:2022?

Options:

A.

To ensure that the information security policy matches all identified risks

B.

To ensure that employees receive information about updates to information security policies

C.

To ensure the continuing suitability, adequacy, and effectiveness of the ISMS

D.

To ensure that the information security policy covers all controls indicated in ISO/IEC 27001

Question 3

According to the terms and definitions associated with ISO 27001, authenticity is defined as:

Options:

A.

The property of consistency in behaviour and intended results

B.

The property that an entity is what it claims to be

C.

The ability to prove that a claimed event has occurred or that a claimed action was performed by the entities that originated it

D.

None of the above

Question 4

Which statement describes a critical success factor for an Information Security Management System ISMS?

Options:

A.

Hiring an information security coordinator

B.

Implementing a measurement system used to evaluate information security management performance and provide suggestions for improvement

C.

Performing a second-party audit

D.

Appointing at least two internal auditors for the information security system

Question 5

Which of the following aspects is considered a critical success factor in the implementation of an Information Security Management System?

Options:

A.

Satisfying social needs and expectations

B.

Completely avoiding all information security incidents

C.

Promoting good information security practices

D.

Increasing the confidence of interested parties in the organization

Question 6

How should top management provide evidence of its commitment to the Information Security Management System?

Options:

A.

By communicating the importance of meeting ISMS requirements

B.

By conducting an annual internal audit of the Information Security Management System

C.

By operating the Information Security Management System once it has been established

D.

By defining a risk assessment approach

Question 7

In the context of clause 6.1 actions to address risks and opportunities, what is defined as residual risk?

Options:

A.

Effect of uncertainty on objectives

B.

Informed decision to take a particular risk

C.

Risk remaining after risk treatment

D.

None of the above

Question 8

The information security policy must be known by:

Options:

A.

The quality management representative

B.

The IT Manager

C.

The IT Security Manager

D.

Everyone in the organization

Question 9

What does ISO/IEC 27001:2022 require for the control of documented information?

Options:

A.

A person designated by top management with expertise to control documented information

B.

Acquisition of a set of information security tools for effective documented information control

C.

A consultancy to accurately perform documented information control

D.

Appropriate protection, for example, against loss of confidentiality, improper use, or loss of integrity

Question 10

Within the ISMS, ensuring the integration of information security management system requirements into the organization’s processes is a responsibility of:

Options:

A.

The quality management representative

B.

The IT Security Manager

C.

The Operations Manager

D.

Top management

Question 11

According to ISO/IEC 27001:2022, is it necessary to formulate an information security risk treatment plan?

Options:

A.

It is only an observation to keep in mind when auditing the management system

B.

It is a requirement to be fulfilled

C.

It is a recommendation, but not a requirement

D.

None of the above

Question 12

Which of the following options should be included in the ISMS policy?

Options:

A.

The name of the intrusion detection system

B.

The company history and the motivation for implementing the ISMS

C.

The information security objectives

D.

The results of previous audits

Page: 1 / 4
Total 40 questions