Pass4itsure > EXIN > EXIN Information Security Management ISO/IEC 27001 > ISMP > ISMP Online Practice Questions and Answers

ISMP Online Practice Questions and Answers

Questions 4

Security monitoring is an important control measure to make sure that the required security level is maintained. In order to realize 24/7 availability of the service, this service is outsourced to a partner in the cloud.

What should be an important control in the contract?

A. The network communication channel is secured by using encryption.

B. The third party is certified against ISO/IEC 27001.

C. The third party is certified for adhering to privacy protection controls.

D. Your IT auditor has the right to audit the external party's service management processes.

Buy Now
Questions 5

What needs to be decided prior to considering the treatment of risks?

A. Criteria for determining whether or not the risk can be accepted

B. How to apply appropriate controls to reduce the risks

C. Mitigation plans

D. The development of own guidelines

Buy Now
Questions 6

The Board of Directors of an organization is accountable for obtaining adequate assurance. Who should be responsible for coordinating the information security awareness campaigns?

A. The Board of Directors

B. The operational manager

C. The security manager

D. The user

Buy Now
Questions 7

In a company a personalized smart card is used for both physical and logical access control. What is the main purpose of the person's picture on the smart card?

A. To authenticate the owner of the card

B. To authorize the owner of the card

C. To identify the role of the card owner

D. To verify the iris of the card owner

Buy Now
Questions 8

An employee has worked on the organizational risk assessment. The goal of the assessment is not to bring residual risks to zero, but to bring the residual risks in line with an organization's risk appetite.

When has the risk assessment program accomplished its primary goal?

A. Once the controls are implemented

B. Once the transference of the risk is complete

C. When decision makers have been informed of uncontrolled risks and proper authority groups decide to leave the risks in place

D. When the risk analysis is completed

Buy Now
Questions 9

The handling of security incidents is done by the incident management process under guidelines of information security management. These guidelines call for several types of mitigation plans.

Which mitigation plan covers short-term recovery after a security incident has occurred?

A. The Business Continuity Plan (BCP)

B. The disaster recovery plan

C. The incident response plan

D. The risk treatment plan

Buy Now
Questions 10

A security manager just finished the final copy of a risk assessment. This assessment contains a list of identified risks and she has to determine how to treat these risks.

What is the best option for the treatment of risks?

A. Begin risk remediation immediately as the organization is currently at risk

B. Decide the criteria for determining if the risk can be accepted

C. Design appropriate controls to reduce the risk

D. Remediate the risk regardless of cost

Buy Now
Questions 11

An information security officer is asked to write a retention policy for a financial system. She is aware of the fact that some data must be kept for a long time and other data must be deleted.

Where should she look for guidelines first?

A. In company policies

B. In finance management procedures

C. In legislation

Buy Now
Questions 12

Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are key terms in business continuity management (BCM). Reducing loss of data is one of the focus areas of a BCM policy.

What requirement is in the data recovery policy to realize minimal data loss?

A. Maximize RPO

B. Reduce RPO

C. Reduce RTO

D. Reduce the time between RTO and RPO

Buy Now
Questions 13

The ambition of the security manager is to certify the organization against ISO/IEC 27001. What is an activity in the certification program?

A. Formulate the security requirements in the outsourcing contracts

B. Implement the security baselines in Secure Systems Development Life Cycle (SecSDLC)

C. Perform a risk assessment of the secure internet connectivity architecture of the datacenter

D. Produce a Statement of Applicability based on risk assessments

Buy Now
Exam Code: ISMP
Exam Name: Information Security Management Professional based on ISO/IEC 27001
Last Update: Apr 29, 2024
Questions: 30
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$45.99

VCE

$49.99

PDF + VCE

$59.99