Pass4itsure > EXIN > EXIN Information Security Management ISO/IEC 27001 > ISMP > ISMP Online Practice Questions and Answers

ISMP Online Practice Questions and Answers

Questions 4

The security manager of a global company has decided that a risk assessment needs to be completed across the company.

What is the primary objective of the risk assessment?

A. Identify, quantify and prioritize each of the business-critical assets residing on the corporate infrastructure

B. Identify, quantify and prioritize risks against criteria for risk acceptance

C. Identify, quantify and prioritize the scope of this risk assessment

D. Identify, quantify and prioritize which controls are going to be used to mitigate risk

Buy Now
Questions 5

An experienced security manager is well aware of the risks related to communication over the internet. She also knows that Public Key Infrastructure (PKI) can be used to keep e- mails between employees confidential.

Which is the main risk of PKI?

A. The Certificate Authority (CA) is hacked.

B. The certificate is invalid because it is on a Certificate Revocation List.

C. The users lose their public keys.

D. The HR department wants to be a Registration Authority (RA).

Buy Now
Questions 6

A protocol to investigate fraud by employees is being designed. Which measure can be part of this protocol?

A. Seize and investigate the private laptop of the employee

B. Investigate the contents of the workstation of the employee

C. Investigate the private mailbox of the employee

D. Put a phone tap on the employee's business phone

Buy Now
Questions 7

What is a risk treatment strategy?

A. Mobile updates

B. Risk acceptance

C. Risk exclusion

D. Software installation

Buy Now
Questions 8

A security manager just finished the final copy of a risk assessment. This assessment contains a list of identified risks and she has to determine how to treat these risks.

What is the best option for the treatment of risks?

A. Begin risk remediation immediately as the organization is currently at risk

B. Decide the criteria for determining if the risk can be accepted

C. Design appropriate controls to reduce the risk

D. Remediate the risk regardless of cost

Buy Now
Questions 9

A risk manager is asked to perform a complete risk assessment for a company. What is the best method to identify most of the threats to the company?

A. Have a brainstorm with representatives of all stakeholders

B. Interview top management

C. Send a checklist for threat identification to all staff involved in information security

Buy Now
Questions 10

An information security officer is asked to write a retention policy for a financial system. She is aware of the fact that some data must be kept for a long time and other data must be deleted.

Where should she look for guidelines first?

A. In company policies

B. In finance management procedures

C. In legislation

Buy Now
Questions 11

Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are key terms in business continuity management (BCM). Reducing loss of data is one of the focus areas of a BCM policy.

What requirement is in the data recovery policy to realize minimal data loss?

A. Maximize RPO

B. Reduce RPO

C. Reduce RTO

D. Reduce the time between RTO and RPO

Buy Now
Questions 12

When is revision of an employee's access rights mandatory?

A. After any position change

B. At hire

C. At least each year

D. At all moments stated in the information security policy

Buy Now
Questions 13

What is the main reason to use a firewall to separate two parts of your internal network?

A. To control traffic intensity between two network segments

B. To decrease network loads

C. To enable the installation of an Intrusion Detection System

D. To separate areas with different confidentiality requirements

Buy Now
Exam Code: ISMP
Exam Name: Information Security Management Professional based on ISO/IEC 27001
Last Update: May 01, 2025
Questions: 30
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99