Free Information Security Management Professional based on ISO/IEC 27001 Exam ISMP Exam Practice Test

UNLOCK FULL
ISMP Exam Features
In Just $59 You can Access
  • All Official Question Types
  • Interactive Web-Based Practice Test Software
  • No Installation or 3rd Party Software Required
  • Customize your practice sessions (Free Demo)
  • 24/7 Customer Support
Page: 1 / 6
Total Questions: 30
  • In a company a personalized smart card is used for both physical and logical access control.What is the main purpose of the person's picture on the smart card?

    Answer: 1 Next Question
  • A company's webshop offers prospects and customers the possibility to search the catalog and place orders around the clock. In order to satisfy the needs of both customer and business several requirements have tobe met. One of the criteria is data classification.What is the most important classification aspect of the unit price of an object in a 24h webshop?

    Answer: 3 Next Question
  • Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are key terms in business continuity management (BCM). Reducing loss of data is one of the focus areas of a BCM policy.What requirement is in the data recovery policy to realize minimal data loss?

    Answer: 2 Next Question
  • The information security architect of a large service provider advocates an open design of the security architecture, as opposed to a secret design.What is her main argument for this choice?

    Answer: 3 Next Question
  • The information security manager is writing the Information Security Management System (ISMS) documentation. The controls that are to be implemented must be described in one of the phases of the Plan-Do-Check-Act (PDCA) cycle of the ISMS.In which phase should these controls be described?

    Answer: 1 Next Question
  • When should information security controls be considered?

    Answer: 1 Next Question
  • It is important that an organization is able to prove compliance with information standards and legislation. One of the most important areas is documentation concerning access management. This process contains anumber of activities including granting rights, monitoring identity status, logging, tracking access and removing rights. Part of these controls are audit trail records which may be used as evidence for both internal andexternal audits.What component of the audit trail is the most important for an external auditor?

    Answer: 1 Next Question
  • A security manager just finished the final copy of a risk assessment. This assessment contains a list of identified risks and she has to determine how to treat these risks.What is the best option for the treatment of risks?

    Answer: 2 Next Question
  • What needs to be decided prior to considering the treatment of risks?

    Answer: 1 Next Question
  • The ambition of the security manager is to certify the organization against ISO/IEC 27001.What is an activity in the certification program?

    Answer: 4 Next Question
Page: 1 / 6
Total Questions: 30