ISMS Implementation Training Exam Paper
ISMS Implementation Training Exam Paper
Objective Questions
(Please tick mark the correct answer only.)
Generic Questions for ISMS: -
Q-02) Which standard spells out the requirements for information security
( c ) ISO/IEC 27002:2013
Q-03) “The property of being accessible and usable upon demand by an authorized entity’’ is called …
Q-04) “The property that information is not made available or disclosed to unauthorized
individuals, entities, or processes” is called …
Q-05) “Process to comprehend the nature of risk and to determine the level of risk” is called …
Q-06) “A weakness of an asset or control that can be exploited by one or more threats” is called …
Q-07) The ISMS documentation shall include ‘risk treatment plan’. Is this statement true or false ?
Q-08) Visitors’ book, audit reports and completed access authorization forms are examples of …
WWW.QACSWORLD.COM
Question Paper for ISMS Implementation Training.
Q-09) “There shall be a formal disciplinary process for employees who have committed a security breach”. True
or false ?
Q-10) Who shall ensure that unattended user equipment has appropriate protection ?
WWW.QACSWORLD.COM
Question Paper for ISMS Implementation Training.
ISMS
Q1 The principal of ISO 27001:2013 can be refers to -----
a)Information Security Management System b)Business Continuity Management System
c)Quality Management System d) Information Technology Service
Management System
Q2 External and internal issues should include -----
a)Liability b)Policy
c)Risk d)Objective
Q3 Interested parties requirement for ISMS should include --
a)Competency requirement b)Legal and regulatory requirement
c)HIRA d)Aspects and impact
Q4a When determining the scope for ISMS what should consider-----
a)5.1 b)6.1 & 6.2
c)6.8 d)4.1 & 4.2
Q4b Which one of these is exception part of audit to be shared among the audit team?
a)Knowledge of information security b)Technical knowledge of the activity to be
audited
c)Knowledge of the principal of auditing d)Knowledge of management system
Q4c The technique for assessment of external and internal parties should consider--
a) Risk Assessment Techniques b)Hazard analysis techniques
c)Aspects technique d)Impact technique
Q4d When determining the scope the organization shall consider---
a)Its activities, products and services b)Its competence
c)Its communication d)Its Documents
Q4e Issues both negative and positive can be consider in ----
a)Support b)Context of the organization
c)Operational d)Planning
Q5a Review of the policies for information security is to ensure continuing--------, adequacy and
effectiveness
a)Ability b)Monitoring
c)Suitability d)Perfectly
Q5b ISMS policy should include---
a)Operational procedure b)Structural requirement
c)Resources Requirement d)Commitment to satisfy requirement related
to information security
Q5c Performance of the ISMS reported to Top management by----
a)Quality manager b)General manager
c)Authorized person d)Technical head
Q5d ISMS policy shall be
a)Maintained as Documented information b)Available to inserted parties
c)Documented ,communicated and available to d)Display at office
inserted parties
ISMS policy should be communicated to the---
WWW.QACSWORLD.COM
Question Paper for ISMS Implementation Training.
WWW.QACSWORLD.COM
Question Paper for ISMS Implementation Training.
Risk Criteria
Q6b How a mobile devices security risk can be ensured----
a)By making mobile policy b)Adopting security measures to manage
mobile risks
c)Both a & b d) b only
Q6c Analysis the information security risks can be done by----
a)Assess the potential consequences b)Determine the level of risk
c)Assess the likelihood of the occurrence d)All the above
Q6d The objectives for ISMS shall incorporate----
a)International laws b)Results of risk assessment and treatment
c) National laws d)Competence
Q7a Human resource security prior to employment can be done by -----
a)Interviewing b)Screening and background verification
c)Information security awareness training d)Contractual agreement
Q7b Competency requirement for ISMS can be fulfilment by---
a)Knowledge of Information management b)Business management practices
terminology, principle, practices and techniques
c)Client business sector d)All the above
Q7c The criteria for selection of auditor for ISMS is----
a)1 year full time practical workplace b)Two years part time work related with
experience information technology
c)4 year full time practical workplace d)Knowledge of other ISO standard
experience
Q7d Control of ISMS documents can be done by---
a)Storage b)Control of Change version
c)Distribution, access, retrieval, use and d)Id and no.
disposition
Q7e Which of the following is a regulatory requirement for ISMS ----
a)Audit plan audit risk b)Electronic signature
c)Continual improvement d)Audit type
Q7f Information receives an appropriate level of protection can be ensured by---
a)Classification and Labelling of information b)By giving identification number
c)IT management d)Documentation
Q7g To prevent unauthorized disclosure, modification, removal or destruction of information stored
on media can be done by-----
a)Physical media transfer b)Disposal of media
c)Management of removable media d)All the above
Q8a To ensure correct and secure operations of information processing facilities by----
a)Segregation of net work services b) Separate testing and operational
environment
c)System change procedure d)Out source development
Q8b Logging and monitoring of events in ISMS can be done by-----
a)Capacity management b)Back up
c)Clock synchronization d)Information control audit
Equipment can be prevented from loss, damage or theft by----
WWW.QACSWORLD.COM
Question Paper for ISMS Implementation Training.
Q8c a)Verification of the data prior to disposal or re b)Equipment, information or software shall
use not be taken off-site without prior
authorization
c)Clear desk and clear screen policy d)All the above
Q9a The information security performance results can consider valid when---
a)Results are comparable and reproducible b)Results obtained from internal audit audit
c)Audit done by competent person d)Third party audit
Q9b Observation and interviewing to person during the work ,seeing the results of performance,
looking to code of conduct and confidentiality during internal audit is
a)Audit facts b)Audit Finding
c)Audit evidence d)Audit conformity
Q9c Feed back on ISMS should include------
a)Decision on continual improvement b)Results of risk assessment and risk
treatment plan
c)Need to change documents d)Needs to change policy and objectives
10a When a non conformity occurs, the organization shall ----
a)Keep in form of NC b)Take any action
c)Take, evaluate, implement and review the d)Change the process
action
10b Enhancing the performance related to the use of ISMS can be archived by----
a)Non conformity b)Corrective action
c)Audit d)Continual improvement
A Security of teleworking and use of mobile devices can be ensured by
a)Handling of assets b)Review of user access rights
c)Assessment of risk introduced by using mobile d)Screening
devices
B Prior to employment for ISMS the organization shall -----
a)Screening of the candidate b)Training of the candidate
c)Awareness of the candidate d)Give responsibility
C Supplier accessible assets can be protected by---
a)Agreement with supplier with regards risk b)Regular auditing at supplier end
association with IT
c)Documentation of the Mitigating associated d)All the above
with IT
D What are the measures for cryptographic control?
a)Use of passwords b)Development of cryptographic keys
c)By limited use of information d)Use by authorized person
E ------ shall be used to prevent unauthorized physical access of Information of an organization
a)Ownership of assets b)Handling of assets
c)Physical security perimeter d)Review of the user access
F All equipment prior to disposal or reuse should be----
a)Verified for the stored media b)Checking up of the license of the software
c)Checking up calibration d)All the above
Change to the operational environment or reduce the risk of unauthorized use can be done by---
WWW.QACSWORLD.COM
Question Paper for ISMS Implementation Training.
WWW.QACSWORLD.COM
Question Paper for ISMS Implementation Training.
No Question Comments/Notes
1 What should be taken into
consideration while investigating
information security policy?
2 What should be taken into
consideration while investigating asset
inventory?
3 What should be taken into
consideration while investigating risk
analysis?
4 What should be taken into
consideration while investigating risk
treatment plan?
5 What should be taken into
consideration while investigating
Applicability Statement?
6 What should be taken into
consideration while investigating
Applicability Statement?
7 What should be taken into
consideration associated with ISMS
while investigating duties and
responsibilities?
8 What are the issues to be taken into
consideration while investigating the
confidentiality agreements signed with
the personnel?
9 What should be checked out at third-
party contracts?
10 What should be taken into
consideration while investigating
“Scanning” clause of Human Resources
section?
11 What should be taken into
consideration in "Return of Assets" and
"Abolition of Access Rights" clauses
while investigating Human Resources
section?
12 What should be taken into
consideration in "Support Services"
clause under the title of Physical
Security?
WWW.QACSWORLD.COM
Question Paper for ISMS Implementation Training.
WWW.QACSWORLD.COM
Question Paper for ISMS Implementation Training.
WWW.QACSWORLD.COM
Question Paper for ISMS Implementation Training.
WWW.QACSWORLD.COM
Question Paper for ISMS Implementation Training.
WWW.QACSWORLD.COM
Question Paper for ISMS Implementation Training.
Trainee Name: -
Date:-
Review by QACS: -
Review date: -
Reviewer name: -
WWW.QACSWORLD.COM