<< Prev Question Next Question >>

Question 36/67

You are an experienced ISMS audit team leader, talking to an Auditor in training who has been assigned to your audit team. You want to ensure that they understand the importance of the Check stage of the Plan-Do-Check-Act cycle in respect of the operation of the information security management system.
You do this by asking him to select the words that best complete the sentence:
To complete the sentence with the best word(s), click on the blank section you want to complete so that it is highlighted in red, and then click on the applicable text from the options below. Alternatively, you may drag and drop the option to the appropriate blank section.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (67q)
Question 1: What controls can you do to protect sensitive data in your c...
Question 2: Four types of Data Classification (Choose two)...
Question 3: Who is authorized to change the classification of a document...
Question 4: You are an experienced audit team leader guiding an auditor ...
Question 5: Please match the roles to the following descriptions: (Exhib...
Question 6: Integrity of data means
Question 7: What type of measure involves the stopping of possible conse...
Question 8: The data center at which you work is currently seeking ISO/I...
Question 9: Cabling Security is associated with Power, telecommunication...
Question 10: An employee caught with offense of abusing the internet, suc...
Question 11: What is the security management term for establishing whethe...
Question 12: You work in the office of a large company. You receive a cal...
Question 13: You are an experienced ISMS audit team leader providing inst...
Question 14: __________ is a software used or created by hackers to disru...
Question 15: The following are purposes of Information Security, except:...
Question 16: In which order is an Information Security Management System ...
Question 17: You are conducting an ISMS audit in the despatch department ...
Question 18: Often, people do not pick up their prints from a shared prin...
Question 19: What is a definition of compliance?...
Question 20: What type of legislation requires a proper controlled purcha...
Question 21: Select the words that best complete the sentence: To complet...
Question 22: A scenario wherein the city or location where the building(s...
Question 23: There is a scheduled fire drill in your facility. What shoul...
Question 24: Which three of the following work documents are not required...
Question 25: Which two of the following statements are true?...
Question 26: How are data and information related?...
Question 27: Access Control System, CCTV and security guards are form of:...
Question 28: Which one of the following options best describes the main p...
Question 29: Which department maintain's contacts with law enforcement au...
Question 30: Which of the following is a preventive security measure?...
Question 31: What is the standard definition of ISMS?...
Question 32: During an opening meeting of a Stage 2 audit, the Managing D...
Question 33: What type of system ensures a coherent Information Security ...
Question 34: A couple of years ago you started your company which has now...
Question 35: A hacker gains access to a web server and reads the credit c...
Question 36: You are an experienced ISMS audit team leader, talking to an...
Question 37: CEO sends a mail giving his views on the status of the compa...
Question 38: A decent visitor is roaming around without visitor's ID. As ...
Question 39: An administration office is going to determine the dangers t...
Question 40: You are an ISMS auditor conducting a third-party surveillanc...
Question 41: What is an example of a human threat?...
Question 42: The computer room is protected by a pass reader. Only the Sy...
Question 43: What is social engineering?
Question 44: Who is responsible for Initial asset allocation to the user/...
Question 45: You are conducting a third-party surveillance audit when ano...
Question 46: What is the worst possible action that an employee may recei...
Question 47: Below is Purpose of "Integrity", which is one of the Basic C...
Question 48: After completing Stage 1 and in preparation for a Stage 2 in...
Question 49: Which of the following does a lack of adequate security cont...
Question 50: Which three of the following options are an advantage of usi...
Question 51: You are preparing the audit findings. Select two options tha...
Question 52: A member of staff denies sending a particular message. Which...
Question 53: You are performing an ISMS audit at a residential nursing ho...
Question 54: You are carrying out your first third-party ISMS surveillanc...
Question 55: Which two of the following are examples of audit methods tha...
Question 56: Which of the following is not a type of Information Security...
Question 57: An employee caught with offense of abusing the internet, suc...
Question 58: What would be the reference for you to know who should have ...
Question 59: You are performing an ISMS audit at a nursing home where res...
Question 60: In regard to generating an audit finding, select the words t...
Question 61: You see a blue color sticker on certain physical assets. Wha...
Question 62: What is the difference between a restricted and confidential...
Question 63: In what part of the process to grant access to a system does...
Question 64: Who are allowed to access highly confidential files?...
Question 65: Which of the following is a possible event that can have a d...
Question 66: Select a word from the following options that best completes...
Question 67: You are an experienced ISMS audit team leader guiding an aud...