Weekend Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

ISO-IEC-27001-Foundation Sample Questions Answers

Questions 4

Which trend in information security performance is required to be considered during a management review of the ISMS?

Options:

A.

Achievement of information security objectives

B.

Validity of information continuity controls

C.

Relevant external and internal requirements changes

D.

Decisions related to continual improvement opportunities

Buy Now
Questions 5

Which statement describes a purpose of monitoring, measurement, analysis and evaluation according to ISO/IEC 27001?

Options:

A.

To evaluate information security performance

B.

To ensure that employees and contractors are competent

C.

To monitor the use of information assets

D.

To track the use of outsourced processes

Buy Now
Questions 6

Which statement describes the control for the Compliance with policies, rules and standards for information security within Annex A of ISO/IEC 27001?

Options:

A.

Regular review of compliance

B.

Regular review of contractual compliance

C.

Maintain contact with legal authorities

D.

Return assets to their legal owners

Buy Now
Questions 7

Which statement describes the Classification of information control in Annex A of ISO/IEC 27001?

Options:

A.

Ensures that all information assets are labelled with their classification

B.

Ensures that information is classified based on confidentiality, integrity and availability

C.

Ensures that security perimeters are used to protect assets

D.

Ensures the rules to control physical and logical access apply to assets

Buy Now
Questions 8

What is the definition of a threat according to ISO/IEC 27000?

Options:

A.

A potential cause of an unwanted incident which can result in harm to a system or organization

B.

A single or a series of unwanted or unexpected information security events

C.

A weakness of an asset or a control that can be exploited

D.

The risk remaining after risk treatment

Buy Now
Questions 9

Which statement about the conduct of audits is true?

Options:

A.

Third party audits are conducted by a customer of the organization

B.

The certificate issued after a successful re-certification audit in typical schemes lasts for one year

C.

One of the focus areas for a surveillance audit is the output from internal audits and management reviews

D.

During Stage 1 of a certification audit, evidence is collected by observing activities

Buy Now
Questions 10

Identify the missing word in the following sentence.

The organization shall determine the [ ? ] of interested parties relevant to information security.

Options:

A.

requirements

B.

number

C.

structure

D.

influence

Buy Now
Questions 11

What is a requirement for a corrective action made in response to a nonconformity?

Options:

A.

They are proportionate to the likelihood of the nonconformity recurring

B.

They are appropriate to the effects of the nonconformity

C.

They do NOT change the organization's information security policies

D.

They always eliminate the cause of the nonconformity

Buy Now
Questions 12

Which is a control title within Annex A of ISO/IEC 27001?

Options:

A.

Information security in supplier relationships

B.

Responsibilities and procedures

C.

Protection of documents

D.

Change control

Buy Now
Questions 13

Which statement describes a requirement for information security objectives?

Options:

A.

They shall be consistent with the information security policy

B.

They shall all be measurable

C.

They shall be contractually transferred to third parties

D.

They shall be reviewed at least annually

Buy Now
Questions 14

Which activity is a required element of information security risk identification?

Options:

A.

Determine the risk owners

B.

Consider the likelihood of the occurrence

C.

Prioritize the risk for treatment

D.

Determine the level of risk

Buy Now
Questions 15

Which information is required to be included in the Statement of Applicability?

Options:

A.

The scope and boundaries of the ISMS

B.

The risk assessment approach of the organization

C.

The criteria against which risk will be evaluated

D.

The justification for including each information security control

Buy Now
Exam Code: ISO-IEC-27001-Foundation
Exam Name: ISO/IEC 27001 (2022) Foundation Exam
Last Update: Oct 5, 2025
Questions: 50
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now ISO-IEC-27001-Foundation