A list of required documentation. - ANSWER Scope of ISMS
Information security and risk treatment
Information security policy and Objectives
Statement of Applicability
Risk treatment plan
Risk treatment report
Records of training, skills experience and qualifications
Monitoring measurement results
Internal audit program
Results of internal audit
Results of mangement review
Results of corrective actions
Is ISO 27001 a standard that defines the technical details for information
security, e.g., how to configure a firewall? - ANSWER No
Why is the Planning section described before the Operation section in
the standard? - ANSWER In order to have efficient operations, you need
to plan them ahead
Identify which of the following information security controls are
organizational controls: - ANSWER Defining a policy on the use of
cryptographic controls
Documenting a clear screen policy
Documenting a procedure for training employees
Choose which of the following activities are parts of the Plan phase: -
ANSWER Identify information security risks
Based on the results from the risk assessment, choose controls and
document a Statement of applicability
Document the Information Security Policy
, The project manager, as one of the basic roles in the ISMS
implementation process, has the following characteristics: - ANSWER
Coordinates the project for implementation of ISO 27001
Often is also the information security officer
How do you decide which policies and procedures to document? -
ANSWER Check whether it is required by ISO 27001
Check the risk assessment results to see if there is a need for such a
control
Check how important the process is to you and how complex it is
Improving the overall information security in your company.
Compliance with the ISO 27001 standard and to information security
legislation.
Lowering expenses
Organizing your company.
Providing a marketing edge. - ANSWER What are the most significant
benefits of implementing an Information Security Management System
based on ISO 27001 in an organization?
Flase - ANSWER Information security and IT security refer to the same
thing: true or false
True - ANSWER An Information Security Management System is a
systematic approach for managing and protecting a company's
information. true or false
A method used for implementation and maintenance of an Information
Security Management System in organizations - ANSWER The PDCA
cycle is:
Project team
Top management
Project manager - ANSWER The following roles are common in the
ISMS implementation process:
True - ANSWER Achieving compliance is one of the main benefits of
implementing ISO 27001:
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller luzlinkuz. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $10.99. You're not tied to anything after your purchase.