Lead Auditor 27001 Flashcards

1
Q

Information is what kind of asset?

A

Strategic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Property of accuracy and completeness. CIA triad

A

Integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

CIA Triad

A

Confidential
Integrity
Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A hacker compromising a message someone sends to another is what CIA?

A

Integrity, accuracy of message was corrupted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

When someone sends a message and they can no longer claim they didn’t is what?

A

Non repudiation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Property is the entity it claims to be

A

Authenticity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Example of authentic and non repudiation

A

Digital signature

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Use a framework of resources to achieve an organization’s objectives

A

Management systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Management system components

A

Quality management
Scope
Organization
Process
Policies
Records

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

PDCA cycle

A

In the quality management:
Plan
Do
Check
Act

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Management system used to ensure the information security of its information assets

A

ISMS

In sec man sys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Item of value to an org is a primary asset

A

False, information asset

Primary is business process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Stand. That specifies requirements for estáb implementation and manage. And continual improving of ISMS

A

ISO 27001

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Catalog of security and privacy controls for all U.S. federal information systems

A

Nist 800-53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Framework for governance and manage of enterprise IT

A

Cobit 2019

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Only normative standards like 27001 can be audited

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Nist framework is what 5?

A

Identify
Protect
Detect
Respond
Recover

6th is governance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Standard that contains guidelines for implementing security controls

A

27002

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Clause 7.5

A

Documented information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which clause requires org to include documented information in the ISMS as directly required by 27001 and org for effectiveness of the ISMS

A

7.5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Documentation life cycle

A

Créate
Store
Use
Archive
Dispose

24
Q

12 step method

A

Management support
Scope of ISMS
Gap Analysis
Information security policy
Competence assurance
Asset inventory
Risk management methodology
Risk assessment
Risk treatment
Performance evaluation
Improvement
Certification audit

25
Q

Determines whether a project is worth it

A

Business case

26
Q

Raci matrix

A

Responsible
Accountable
Consulted
Informed

27
Q

Most important reason to obtain support by top management for an ISO 27001 implementation project

A

Guarantee sufficient resources and budget for the implementation

28
Q

Responsibility specifically for top management in ISO 27001

A

Approving information security policy

29
Q

True or false, multiple roles can be assigned accountability role within an activity

31
Q

Name a standard that is normative and can be certified

32
Q

A procedures describing how to configure a server is an example of?

34
Q

3 purposes of context analysis

A

Scope of isms
Risk and opportunities
Adaptation

35
Q

Pestel

A

Political
Economical
Social
Technological
Environmental
Legal

37
Q

4.4

A

Org estab implements and maintains continuous improvement of ISMS

38
Q

Only 2 process required in ISO 27001

A

Risk assessment
Risk treatment

39
Q

This has to be available as documented information due to requirements of ISO 27001

A

Scope of ISMS

40
Q

A customer requiring an org to have compliance with privacy regulations is defined as what?

A

Interested party

41
Q

Who is accountable for approving scope of ISMS?

A

Top management

42
Q

Org establishes information security objectives and plans to achieve them at relevant functions and levels

43
Q

Info sec objectives

A

Strategic goals
Is policy
Confidential
Integrity
Availability

44
Q

Smart goals

A

Specific
Measure able
Achieve able
Relevant
Timebound

47
Q

Management systeme used to ensure the information security of its information assets

49
Q

Primary assets are an item of value to the org

A

False, information assets

Primary is business processes and activities information

Supporting assets- enable primary assets

50
Q

4 tabs to track assets

A

Classification
Type
Category
Owner

52
Q

This consists of leadership, org structure and process that ensure enterprises IT sustains and extends the enterprise strategies and objectives

A

IT governance

53
Q

3 benefits of IT governance

A

Benefits realization
Risk optimization
Resource optimization

54
Q

Resource optimization treats risks to meet an org risk acceptance criteria

A

False, risk optimization
-Resource optimization is the provision of necessary resources and training for efficient tech use

Benefits realization is IT creates value aligned with org values and measure for success and eliminate low value initiatives