A list of required documentation. - ANSWER Scope of ISMS
Information security and risk treatment
Information security policy and Objectives
Statement of Applicability
Risk treatment plan
Risk treatment report
Records of training, skills experience and qualifications
Monitoring measurement results
Internal audit program
Results of internal audit
Results of mangement review
Results of corrective actions
Is ISO 27001 a standard that defines the technical details for information
security, e.g., how to configure a firewall? - ANSWER No
Why is the Planning section described before the Operation section in
the standard? - ANSWER In order to have efficient operations, you need
to plan them ahead
Identify which of the following information security controls are
organizational controls: - ANSWER Defining a policy on the use of
cryptographic controls
Documenting a clear screen policy
Documenting a procedure for training employees
Choose which of the following activities are parts of the Plan phase: -
ANSWER Identify information security risks
Based on the results from the risk assessment, choose controls and
document a Statement of applicability
Document the Information Security Policy
, The project manager, as one of the basic roles in the ISMS
implementation process, has the following characteristics: - ANSWER
Coordinates the project for implementation of ISO 27001
Often is also the information security officer
How do you decide which policies and procedures to document? -
ANSWER Check whether it is required by ISO 27001
Check the risk assessment results to see if there is a need for such a
control
Check how important the process is to you and how complex it is
Improving the overall information security in your company.
Compliance with the ISO 27001 standard and to information security
legislation.
Lowering expenses
Organizing your company.
Providing a marketing edge. - ANSWER What are the most significant
benefits of implementing an Information Security Management System
based on ISO 27001 in an organization?
Flase - ANSWER Information security and IT security refer to the same
thing: true or false
True - ANSWER An Information Security Management System is a
systematic approach for managing and protecting a company's
information. true or false
A method used for implementation and maintenance of an Information
Security Management System in organizations - ANSWER The PDCA
cycle is:
Project team
Top management
Project manager - ANSWER The following roles are common in the
ISMS implementation process:
True - ANSWER Achieving compliance is one of the main benefits of
implementing ISO 27001:
Los beneficios de comprar resúmenes en Stuvia estan en línea:
Garantiza la calidad de los comentarios
Compradores de Stuvia evaluaron más de 700.000 resúmenes. Así estas seguro que compras los mejores documentos!
Compra fácil y rápido
Puedes pagar rápidamente y en una vez con iDeal, tarjeta de crédito o con tu crédito de Stuvia. Sin tener que hacerte miembro.
Enfócate en lo más importante
Tus compañeros escriben los resúmenes. Por eso tienes la seguridad que tienes un resumen actual y confiable.
Así llegas a la conclusión rapidamente!
Preguntas frecuentes
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
100% de satisfacción garantizada: ¿Cómo funciona?
Nuestra garantía de satisfacción le asegura que siempre encontrará un documento de estudio a tu medida. Tu rellenas un formulario y nuestro equipo de atención al cliente se encarga del resto.
Who am I buying this summary from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller luzlinkuz. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy this summary for 10,74 €. You're not tied to anything after your purchase.