A decent visitor is roaming around without visitor's ID. As an employee you should do the following, except:
A decent visitor is roaming around without visitor's ID. As an employee you should do the following, except:A . Say "hi" and offer coffeeB . Call the receptionist and inform about the visitorC . Greet and ask him what is his businessD . Escort him to his destinationView AnswerAnswer: A...
for?
Which six of the following actions are the individual(s) managing the audit programme responsible for?A . Selecting the audit teamB . Retaining documented information of the audit resultsC . Defining the objectives, scope and criteria for an individual auditD . Defining the plan of an individual auditE . Establishing the...
You are the person responsible for managing the audit programme and deciding the size and composition of the audit team for a specific audit. Select the two factors that should be considered.
You are the person responsible for managing the audit programme and deciding the size and composition of the audit team for a specific audit. Select the two factors that should be considered.A . The audit scope and criteriaB . Customer relationshipsC . The overall competence of the audit team needed...
You are performing an ISMS audit at a nursing home where residents always wear an electronic wristband for monitoring their location, heartbeat, and blood pressure. The wristband automatically uploads this data to a cloud server for healthcare monitoring and analysis by staff.
You are performing an ISMS audit at a nursing home where residents always wear an electronic wristband for monitoring their location, heartbeat, and blood pressure. The wristband automatically uploads this data to a cloud server for healthcare monitoring and analysis by staff. You now wish to verify that the information...
You are an experienced ISMS audit team leader providing guidance to an ISMS auditor in training. They have been asked to carry out an assessment of external providers and have prepared a checklist containing the following activities. They have asked you to review their checklist to confirm that the actions they are proposing are appropriate.
You are an experienced ISMS audit team leader providing guidance to an ISMS auditor in training. They have been asked to carry out an assessment of external providers and have prepared a checklist containing the following activities. They have asked you to review their checklist to confirm that the actions...
You are performing an ISMS audit at a residential nursing home called ABC that provides healthcare services. You find all nursing home residents wear an electronic wristband for monitoring their location, heartbeat, and blood pressure always. You learned that the electronic wristband automatically uploads all data to the artificial intelligence (AI) cloud server for healthcare monitoring and analysis by healthcare staff.
You are performing an ISMS audit at a residential nursing home called ABC that provides healthcare services. You find all nursing home residents wear an electronic wristband for monitoring their location, heartbeat, and blood pressure always. You learned that the electronic wristband automatically uploads all data to the artificial intelligence...
Information Security is a matter of building and maintaining ________.
Information Security is a matter of building and maintaining ________.A . ConfidentialityB . TrustC . ProtectionD . FirewallsView AnswerAnswer: B Explanation: Information security is a matter of building and maintaining trust. Trust is the confidence that information and information processing facilities are protected from unauthorized or malicious actions that could...
Stages of Information
Stages of InformationA . creation, evolution, maintenance, use, dispositionB . creation, use, disposition, maintenance, evolutionC . creation, distribution, use, maintenance, dispositionD . creation, distribution, maintenance, disposition, useView AnswerAnswer: C Explanation: The stages of information are creation, distribution, use, maintenance, and disposition. These are the phases that information goes through during...
You ask the IT Manager why the organisation still uses the mobile app while personal data encryption and pseudonymization tests failed. Also, whether the Service Manager is authorized to approve the test.
You ask the IT Manager why the organisation still uses the mobile app while personal data encryption and pseudonymization tests failed. Also, whether the Service Manager is authorized to approve the test. The IT Manager explains the test results should be approved by him according to the software security management...
Which six of the following would cause you concern in respect of conformity to ISO/IEC 27001:2022 requirements?
The data center at which you work is currently seeking ISO/IEC27001:2022 certification. In preparation for your initial certification visit a number of internal audits have been carried out by a colleague working at another data centre within your Group. They secured their ISO/IEC 27001:2022 certificate earlier in the year. You...