Exam 2017-03-20 Flashcards
(73 cards)
What is defined as ”a systematic approach for establishing, implementing, operating,
monitoring, reviewing, maintaining and improving an organization’s information security to
achieve business objectives”?
a) Risk assessment process
b) Information security management system (ISMS)
c) Information security policy document
d) Monitoring and Measuring
b) Information security management system (ISMS)
Which of the following is not one of the ”fundamental principles” that ”also contribute to the successful implementation of an ISMS”?
a) incorporating management commitment and the interests of stakeholders
b) assignment of responsibility for information security
c) security incorporated as an essential element of information networks and systems
d) active prevention and detection of stakeholder deviations
d) active prevention and detection of stakeholder deviations
Information can be stored in many forms. Which forms are mentioned in ISO/IEC 27000?
a) material form
b) digital form
c) digital and material forms
d) digital and material forms as well as knowledge of the employees.
d) digital and material forms as well as knowledge of the employees.
Which term means ”informed decision to take a particular risk”?
a) Risk avoidance
b) Risk criteria
c) Risk acceptance
d) Risk analysis
c) Risk acceptance
The standard ISO/IEC 27003 is concerned with what?
a) Explaining what the text in ISO/IEC 27001 means
b) Explaining certification issues
c) Risk assessment methodology
d) Explaining cyber resilience
a) Explaining what the text in ISO/IEC 27001 means
According to ISO/IEC 27001, the management review shall include consideration of feedback on the information security performance, including trends in what?
a) nonconformities and corrective actions
b) monitoring and measurement results
c) audit results, or
d) all the above?
d) all the above
Is there a requirement in ISO/IEC 27001 that the information security policy shall be
available as documented information?
a) No, no requirement to document it at all
b) Yes, but only if determined by the organization as being necessary for the
effectiveness of the ISMS
c) Yes, but only if required by one or more stakeholders
d) Yes, no matter what
d) Yes, no matter what
What is false regarding information security controls according to ISO/IEC 27001?
a) In general, your risk should determine the controls you select
b) Selected controls need to be compared with controls listed in Annex A
c) It is mandatory to select at least all the controls listed in the Annex A
d) Controls are not only technical but also for example managerial
c) It is mandatory to select at least all the controls listed in the Annex A
ISO/IEC 27001 mentions a document called a ”statement of applicability”. Why is it called that?
a) It states the applicable risks
b) The document includes applicable assets
c) It contains all statements that are applicable to the ISMS
d) The document contains applicable security controls
d) The document contains applicable security controls
Needs and expectations of interested parties may include for example:
a) legal requirements
b) regulatory requirements
c) contractual obligations
d) all of the above
d) all of the above
What is the relation between ISO/IEC 27001 and ISO/IEC 27002?
a) They have no specific relation
b) They both contain controls for information security
c) 27001 refers to the controls in 27002
d) 27002 refers to the controls in 27001
c) 27001 refers to the controls in 27002
What is true regarding ”control objectives” according to ISO/IEC 27002?
a) They are mainly used to control information security objectives
b) They state what should be achieved by one or more controls
c) They are objectives that are used during incidents only
d) They are only used for auditing the ISMS
b) They state what should be achieved by one or more controls
“Segregation of duties” is a method for reducing the risk of accidental or deliberate misuse of an organization’s assets. What does it mean?
a) To pay duty in two separate instalments
b) That each person’s duties should be separable from the person
c) That two persons should not perform the same duties
d) Segregated responsibilities to reduce opportunities to breach security
d) Segregated responsibilities to reduce opportunities to breach security
Who is responsible for that information assets are appropriately inventoried, classified and protected?
a) The asset owners
b) The CEO (Chief Executive Officer)
c) The CISO (Chief Information Security Officer)
d) The CDO (Chief Digital Officer)
a) The asset owners
What is the point of “information classification”?
a) To ensure that all risks receive an appropriate level of treatment
b) To ensure that all security controls are implemented
c) It has the same meaning as risk assessment
d) To ensure that information receives an appropriate level of protection
d) To ensure that information receives an appropriate level of protection
What is true in relation to “tribal governments” use of FIPS 199 security categorization scheme?
a) Tribal governments have to use the scheme
b) Tribal governments may use the scheme
c) Tribal governments may not use the scheme
d) There is no mention of tribal governments in FIPS 199
b) Tribal governments may use the scheme
FIPS 199 establishes security categories for both information and information systems.
The security categories are based on the potential … ?
a) risk for a security breach
b) impact and probability for a security breach
c) information regarding a security breach
d) impact on an organization in case of security breach
d) impact on an organization in case of security breach
Categorise historic public information about Swedish kings in a royal archive, in accordance with the security categorization scheme?
a) SC archive = {(confidentiality, HIGH), (integrity, LOW), (availability, MODERATE)}
b) SC archive = {(confidentiality, NA), (integrity, HIGH), (availability, LOW)}
c) SC archive = {(confidentiality, LOW), (integrity, LOW), (availability, LOW)}
d) SC archive = {(confidentiality, NA), (integrity, LOW), (availability, HIGH)}.
b) SC archive = {(confidentiality, NA), (integrity, HIGH), (availability, LOW)}
You have found both “contract” and “administrative” information in the same information system, categorised as SC contract information = {(confidentiality, MODERATE),
(integrity, MODERATE), (availability, LOW)} and SC administrative information =
{(confidentiality, LOW), (integrity, LOW), (availability, LOW)}. Categorise the information
system where both information types reside to ensure proper protection?
a) {(confidentiality, MODERATE), (integrity, MODERATE), (availability, LOW)}.
b) {(confidentiality, MODERATE), (integrity, HIGH), (availability, HIGH)}.
c) {(confidentiality, HIGH), (integrity, MODERATE), (availability, LOW)}.
d) {(confidentiality, LOW), (integrity, LOW), (availability, HIGH)}.
a) {(confidentiality, MODERATE), (integrity, MODERATE), (availability, LOW)}.
Is potential impact of a security breach on individuals considered in FIPS 199?
a) No, it is only concerned with national security and societal functions
b) Yes, not spelled out in the text – but implied
c) No, it is only concerned with organisations
d) Yes, this is explicitly stated in the text
d) Yes, this is explicitly stated in the text
What is a low-impact information system according to FIPS 200?
a) A system with low confidentiality impact levels
b) A system with low integrity impact levels
c) A system with low availability impact levels
d) A system with low impact levels on all aspects listed above
d) A system with low impact levels on all aspects listed above
In using FIPS 199 and FIPS 200, which should be done first – determination of information system impact levels or the selection of appropriate security controls?
a) Determination of the “impact levels”
b) Selection of the “security controls”
c) It depends on the business context
d) It does not matter which one is done first
a) Determination of the “impact levels”
How shall organisations meet the stated “minimum security requirements” according to FIPS 200?
a) They just need to comply to them as they are written in FIPS 200
b) They shall remove the ones that are not needed and comply to the rest
c) They shall select appropriate controls in another document
d) They do not need to meet them at all
c) They shall select appropriate controls in another document
Which term in FIPS 200 means “The official management decision given by a senior agency official to authorize operation of an information system” and to explicitly accept the residual risk?
a) Certification
b) Accreditation
c) Authentication
d) Confirmation
b) Accreditation