All Modules Flashcards

1
Q

Owns information security, approves the policy?

A

Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Are responsible for their own processes, risks and countermeasures

A

Departments

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Has a role with respect to the organisation’s information security stance

A

Everyone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Coordinates tasks to deliver project

A

Project Team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Identify and evaluate risks

A

Risk assessors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Coordinate controls to mitigate risks and accept residual risk.

A

Risk owners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Set of interrelated or interacting activities that use inputs to deliver an intended result

A

process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Specified way to carry out an activity or a process

A

Procedure (can be documented or not)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Document stating results achieved or providing evidence of activities performed

A

Record

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Mandatory requirements of what does need to be documented in ISO 27001

A
  • Scope (4.3)
  • Information security policy (5.2 e)
  • Information security risk assessment process (6.1.2)
  • Statement of Applicability.
  • Information security objectives. (6.2)
  • Evidence of competence (7.2)
  • Results of information security risk assessments (8.2)
  • Results of information security risk treatment (8.3)
  • Evidence of the information security performance monitoring and measurement results (9.1)
  • Internal audit programme(s) and the audit results (9.2.2)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Action taken to eliminate the cause of a nonconformity.

A

Corrective action

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Immediate action to eliminate a detected nonconformity

A

Correction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Size and complexity of an ISMS should be customised to the organisation?
True or false

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Management system documentation should include the company names of the service providers?
True or False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Documents go through five stages as part of their lifecycle
True or False

A

True

Written
Reviewed and reworked
Approved
Distributed
Archived

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Processes can be split into as many different documents as needed
True or False?

17
Q

Documents should require more than one person to authorise amendments.
True or False

18
Q

You should wait to publish management system documents just before an audit
True or False

A

False
Publish as soon as signed off

19
Q

Every process and procedure should include who does what, where and when.
True or False

20
Q

What are the parts of the RACI matrix?

A

Responsible
Accountable
Consulted
Informed

The RACI matrix applies to all processes

21
Q

Policies and objectives should be consistent with organisational objectives
True or False

22
Q

The management system should be integrated into business processes.
True or False

23
Q

Policies should never be shared with people outside the organisation
True or False

24
Q

The scope doesn’t need to include remote workers.
True or False

25
CEO support is crucial to having an effective ISMS. True or False
True
26
The information security policy must include information security objectives. True or False
True
27
Which of these should be determined in the scope? (select all that apply.) A - Supplers B - Outsourced functions or processes C - External and Internal issues for the organisation and its context. D - Requirements of interested parties.
B C D
28
SMART
29
The four options for risk decision are?
Terminate Tolerate Treat Transfer
30
ISMS Principals (9)
1 Awareness 2 Assignment of responsibility 3 Incorporating management commitment and the interests of stakeholders 4 Enhancing societal values 5 Controls proportional to risks 6 Security as an essential element of networks and systems 7 Active prevention and detection of incidents 8 Comprehensive approach to information security management 9 continual reassessment and improvement
31
Standard
A specification to which something can conform