What is the best way to start setting the information security controls?
C
Security monitoring is an important control measure to make sure that the required security level is
maintained. In order to realize 24/7 availability of the service, this service is outsourced to a partner
in the cloud.
What should be an important control in the contract?
D
What needs to be decided prior to considering the treatment of risks?
A
The information security manager is writing the Information Security Management System (ISMS)
documentation. The controls that are to be implemented must be described in one of the phases of
the
Plan-Do-
Check-Act (PDCA) cycle of the ISMS.
In which phase should these controls be described?
A
The ambition of the security manager is to certify the organization against ISO/IEC 27001.
What is an activity in the certification program?
D
The Board of Directors of an organization is accountable for obtaining adequate assurance.
Who should be responsible for coordinating the information security awareness campaigns?
C
A protocol to investigate fraud by employees is being designed.
Which measure can be part of this protocol?
B
What is a risk treatment strategy?
B
An experienced security manager is well aware of the risks related to communication over the
internet. She also knows that Public Key Infrastructure (PKI) can be used to keep e-mails between
employees confidential.
Which is the main risk of PKI?
A
A security manager for a large company has the task to achieve physical protection for corporate
data stores.
Through which control can physical protection be achieved?
D