Vcehome > EXIN > EXIN Information Security Management ISO/IEC 27001 > ISMP > ISMP Online Practice Questions and Answers

ISMP Online Practice Questions and Answers

Questions 4

The security manager of a global company has decided that a risk assessment needs to be completed across the company.

What is the primary objective of the risk assessment?

A. Identify, quantify and prioritize each of the business-critical assets residing on the corporate infrastructure

B. Identify, quantify and prioritize risks against criteria for risk acceptance

C. Identify, quantify and prioritize the scope of this risk assessment

D. Identify, quantify and prioritize which controls are going to be used to mitigate risk

Browse 30 Q&As
Questions 5

Security monitoring is an important control measure to make sure that the required security level is maintained. In order to realize 24/7 availability of the service, this service is outsourced to a partner in the cloud.

What should be an important control in the contract?

A. The network communication channel is secured by using encryption.

B. The third party is certified against ISO/IEC 27001.

C. The third party is certified for adhering to privacy protection controls.

D. Your IT auditor has the right to audit the external party's service management processes.

Browse 30 Q&As
Questions 6

Who should be asked to check compliance with the information security policy throughout the company?

A. Internal audit department

B. External forensics investigators

C. The same company that checks the yearly financial statement

Browse 30 Q&As
Questions 7

In a company the IT strategy is migrating towards a Service Oriented Architecture (SOA) so that migrating to the cloud is better feasible in the future. The security architect is asked to make a first draft of the security architecture.

Which elements should the security architect draft?

A. Management and control of the security services

B. The information security policy, the risk assessment and the controls in the security services

C. Which security services are provided and in which supporting architectures are they defined

Browse 30 Q&As
Questions 8

The information security manager is writing the Information Security Management System (ISMS) documentation. The controls that are to be implemented must be described in one of the phases of the Plan-Do-Check-Act (PDCA) cycle of the ISMS.

In which phase should these controls be described?

A. Plan

B. Do

C. Check

D. Act

Browse 30 Q&As
Questions 9

The information security architect of a large service provider advocates an open design of the security architecture, as opposed to a secret design.

What is her main argument for this choice?

A. Open designs are easily configured.

B. Open designs have more functionality.

C. Open designs are tested extensively.

Browse 30 Q&As
Questions 10

When should information security controls be considered?

A. After the risk assessment

B. As part of the scoping meeting

C. At the kick-off meeting

D. During the risk assessment work

Browse 30 Q&As
Questions 11

What is a key item that must be kept in mind when designing an enterprise-wide information security program?

A. When defining controls follow an approach and framework that is consistent with organizational culture

B. Determine controls in the light of specific risks an organization is facing

C. Put an enterprise-wide network and Host-Based Intrusion Detection and Prevention System (Host-Based IDPS) into place as soon as possible

D. Put an incident management and log file analysis program in place immediately

Browse 30 Q&As
Questions 12

Which security item is designed to take collections of data from multiple computers?

A. Firewall

B. Host-Based Intrusion Detection and Prevention System (Host-Based IDPS)

C. Network-Based Intrusion Detection and Prevention System (Network-Based IDPS)

D. Virtual Private Network (VPN)

Browse 30 Q&As
Questions 13

The ambition of the security manager is to certify the organization against ISO/IEC 27001. What is an activity in the certification program?

A. Formulate the security requirements in the outsourcing contracts

B. Implement the security baselines in Secure Systems Development Life Cycle (SecSDLC)

C. Perform a risk assessment of the secure internet connectivity architecture of the datacenter

D. Produce a Statement of Applicability based on risk assessments

Browse 30 Q&As
Exam Code: ISMP
Exam Name: Information Security Management Professional based on ISO/IEC 27001
Last Update: May 10, 2024
Questions: 30 Q&As

PDF

$49.99

VCE

$59.99

PDF + VCE

$67.99