You are an experienced ISMS audit team leader providing guidance to an ISMS auditor in training. They have been asked to carry out an assessment of external providers and have prepared a checklist containing the following activities. They have asked you to review their checklist to confirm that the actions they are proposing are appropriate.

You are an experienced ISMS audit team leader providing guidance to an ISMS auditor in training. They have been asked to carry out an assessment of external providers and have prepared a checklist containing the following activities. They have asked you to review their checklist to confirm that the actions...

May 1, 2025 No Comments READ MORE +

You are performing an ISMS audit at a residential nursing home called ABC that provides healthcare services. You find all nursing home residents wear an electronic wristband for monitoring their location, heartbeat, and blood pressure always. You learned that the electronic wristband automatically uploads all data to the artificial intelligence (AI) cloud server for healthcare monitoring and analysis by healthcare staff.

You are performing an ISMS audit at a residential nursing home called ABC that provides healthcare services. You find all nursing home residents wear an electronic wristband for monitoring their location, heartbeat, and blood pressure always. You learned that the electronic wristband automatically uploads all data to the artificial intelligence...

May 1, 2025 No Comments READ MORE +

Information Security is a matter of building and maintaining ________.

Information Security is a matter of building and maintaining ________.A . ConfidentialityB . TrustC . ProtectionD . FirewallsView AnswerAnswer: B Explanation: Information security is a matter of building and maintaining trust. Trust is the confidence that information and information processing facilities are protected from unauthorized or malicious actions that could...

April 30, 2025 No Comments READ MORE +

Stages of Information

Stages of InformationA . creation, evolution, maintenance, use, dispositionB . creation, use, disposition, maintenance, evolutionC . creation, distribution, use, maintenance, dispositionD . creation, distribution, maintenance, disposition, useView AnswerAnswer: C Explanation: The stages of information are creation, distribution, use, maintenance, and disposition. These are the phases that information goes through during...

April 29, 2025 No Comments READ MORE +

You ask the IT Manager why the organisation still uses the mobile app while personal data encryption and pseudonymization tests failed. Also, whether the Service Manager is authorized to approve the test.

You ask the IT Manager why the organisation still uses the mobile app while personal data encryption and pseudonymization tests failed. Also, whether the Service Manager is authorized to approve the test. The IT Manager explains the test results should be approved by him according to the software security management...

April 28, 2025 No Comments READ MORE +

Which six of the following would cause you concern in respect of conformity to ISO/IEC 27001:2022 requirements?

The data center at which you work is currently seeking ISO/IEC27001:2022 certification. In preparation for your initial certification visit a number of internal audits have been carried out by a colleague working at another data centre within your Group. They secured their ISO/IEC 27001:2022 certificate earlier in the year. You...

April 26, 2025 No Comments READ MORE +

Below is Purpose of "Integrity", which is one of the Basic Components of Information Security

Below is Purpose of "Integrity", which is one of the Basic Components of Information SecurityA . the property that information is not made available or disclosed to unauthorized individualsB . the property of safeguarding the accuracy and completeness of assets.C . the property that information is not made available or...

April 22, 2025 No Comments READ MORE +

The following options are key actions involved in a first-party audit

DRAG DROP The following options are key actions involved in a first-party audit. Order the stages to show the sequence in which the actions should take place. View AnswerAnswer: Explanation: The correct order of the stages is: Prepare the audit checklist Gather objective evidence Review audit evidence Document findings Audit...

April 19, 2025 No Comments READ MORE +

Integrity of data means

Integrity of data meansA . Accuracy and completeness of the dataB . Data should be viewable at all timesC . Data should be accessed by only the right peopleView AnswerAnswer: A Explanation: Integrity of data means accuracy and completeness of the data. Integrity is one of the three main objectives...

April 19, 2025 No Comments READ MORE +

You are an ISMS audit team leader tasked with conducting a follow-up audit at a client's data centre. Following two days on-site you conclude that of the original 12 minor and 1 major nonconformities that prompted the follow-up audit, only 1 minor nonconformity still remains outstanding. Select four options for the actions you could take.

You are an ISMS audit team leader tasked with conducting a follow-up audit at a client's data centre. Following two days on-site you conclude that of the original 12 minor and 1 major nonconformities that prompted the follow-up audit, only 1 minor nonconformity still remains outstanding. Select four options for...

April 19, 2025 No Comments READ MORE +