Zusammenfassung der Ressource
Frage 1
Frage
What does the Information Security Policy describe?
Antworten
-
which InfoSec-controls have been selected and taken
-
how the InfoSec-objectives will be reached
-
what the implementation-planning of the information security management system is
-
which Information Security-procedures are selected
Frage 2
Frage
In the context of contact with special interest groups, any information sharing agreements should identify requirements for the protection of [blank_start]confidential[blank_end] information.
Antworten
-
topic-specific
-
public
-
confidential
Frage 3
Frage
Responsibilities for information security in projects should be defined and allocated to:
Antworten
-
the project manager
-
specified roles defined in the used project management method of the organization
-
the InfoSec officer
-
the owner of the involved asset
-
the manager of the business domain in which the project is carried out
Frage 4
Frage
Organizations allowing teleworking activities, the physical security of the building and the local environment of the teleworking site should be considered
Frage 5
Frage
Prior to employment, [blank_start]screening[blank_end] as well as terms & conditions of employment are included as controls in ISO 27002 to ensure that employees and contractors understand their responsibilities and are suitable for the roles for which they are considered.
Antworten
-
screening
-
awareness training
-
trial period
Frage 6
Frage
It is allowed that employees and contractors are provided with an anonymous reporting channel to report violations of information security policies or procedures (“whistle blowing”)
Frage 7
Frage
The identified owner of an asset is always an individual
Frage 8
Frage
Who is accountable to classify information assets?
Frage 9
Frage
Physical labels and [blank_start]metadata[blank_end] are two common forms of labelling which are mentioned in ISO 27002.
Antworten
-
data encryption
-
metadata
-
digital folders
Frage 10
Frage
What should be used to protect data on removable media if data confidentiality or integrity are important considerations?