What does the Information Security Policy describe?
Responda
which InfoSec-controls have been selected and taken
how the InfoSec-objectives will be reached
what the implementation-planning of the information security management system is
which Information Security-procedures are selected
Questão 2
Questão
In the context of contact with special interest groups, any information sharing agreements should identify requirements for the protection of [blank_start]confidential[blank_end] information.
Responda
topic-specific
public
confidential
Questão 3
Questão
Responsibilities for information security in projects should be defined and allocated to:
Responda
the project manager
specified roles defined in the used project management method of the organization
the InfoSec officer
the owner of the involved asset
the manager of the business domain in which the project is carried out
Questão 4
Questão
Organizations allowing teleworking activities, the physical security of the building and the local environment of the teleworking site should be considered
Responda
True
False
Questão 5
Questão
Prior to employment, [blank_start]screening[blank_end] as well as terms & conditions of employment are included as controls in ISO 27002 to ensure that employees and contractors understand their responsibilities and are suitable for the roles for which they are considered.
Responda
screening
awareness training
trial period
Questão 6
Questão
It is allowed that employees and contractors are provided with an anonymous reporting channel to report violations of information security policies or procedures (“whistle blowing”)
Responda
True
False
Questão 7
Questão
The identified owner of an asset is always an individual
Responda
True
False
Questão 8
Questão
Who is accountable to classify information assets?
Responda
the CEO
the CISO
the asset owner
the Information Security team
Questão 9
Questão
Physical labels and [blank_start]metadata[blank_end] are two common forms of labelling which are mentioned in ISO 27002.
Responda
data encryption
metadata
digital folders
Questão 10
Questão
What should be used to protect data on removable media if data confidentiality or integrity are important considerations?
Responda
backup on another removable medium
a password
logging
cryptographic techniques
Quer criar seus próprios Quizzesgratuitos com a GoConqr? Saiba mais.