alla Flashcards
1) What is defined as ”a systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organization’s information security to achieve business objectives”?
ISMS
2) Which of the following is not one of the ”fundamental principles” that ”also contribute to the successful implementation of an ISMS”?
d) active prevention and detection of stakeholder deviations
3) Information can be stored in many forms. Which forms are mentioned in ISO/IEC 27000?
digital, material and knowledge of the employee
4) Which term means ”informed decision to take a particular risk”?
risk acceptance
5) The standard ISO/IEC 27003 is concerned with what?
It provides guidance on the requirements of ISO/IEC 27001
6) According to ISO/IEC 27001, the management review shall include consideration of feedback on the information security performance, including trends in what?
alla
7) Is there a requirement in ISO/IEC 27001 that the information security policy shall be available as documented information?
d) Yes, no matter what
8) What is false regarding information security controls according to ISO/IEC 27001?
c) It is mandatory to select at least all the controls listed in the Annex A
9) ISO/IEC 27001 mentions a document called a ”statement of applicability”. Why is it called that?
d) The document contains applicable security controls
10) Needs and expectations of interested parties may include for example:
legal, regularoty and contract
11) What is the relation between ISO/IEC 27001 and ISO/IEC 27002?
27001 refers to the controls in 27002
12) What is true regarding ”control objectives” according to ISO/IEC 27002?
They state what should be achieved by one or more controls
13) “Segregation of duties” is a method for reducing the risk of accidental or deliberate
misuse of an organization’s assets. What does it mean?
Segregated responsibilities to reduce opportunities to breach security
14) Who is responsible for that information assets are appropriately inventoried, classified and protected?
asset owners
15) What is the point of “information classification”?
d) To ensure that information receives an appropriate level of protection
16) What is true in relation to “tribal governments” use of FIPS 199 security categorization scheme?
Tribal governments may use the scheme
17) FIPS 199 establishes security categories for both information and information systems. The security categories are based on the potential … ?
impact on an organization in case of security breach
18) Categorise historic public information about Swedish kings in a royal archive, in accordance with the security categorization scheme?
b) SC archive = {(confidentiality, NA), (integrity, HIGH), (availability, LOW)}
19) You have found both “contract” and “administrative” information in the same information system, categorised as SC contract information = {(confidentiality, MODERATE), (integrity, MODERATE), (availability, LOW)} and SC administrative information = {(confidentiality, LOW), (integrity, LOW), (availability, LOW)}. Categorise the information system where both information types reside to ensure proper protection?
a) {(confidentiality, MODERATE), (integrity, MODERATE), (availability, LOW)}.
20) Is potential impact of a security breach on individuals considered in FIPS 199?
d) Yes, this is explicitly stated in the text
21) What is a low-impact information system according to FIPS 200?
CIA = alla low
22) In using FIPS 199 and FIPS 200, which should be done first – determination of information system impact levels or the selection of appropriate security controls?
23) How shall organisations meet the stated “minimum security requirements” according to FIPS 200?
) They shall select appropriate controls in another document
24) Which term in FIPS 200 means “The official management decision given by a senior agency official to authorize operation of an information system” and to explicitly accept the residual risk?
b) Accreditation