ITSMA - L2 Terminologies and Types of IT AUDIT - PART 2

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What is the purpose of a Risk Assessment?

  • To identify, assess, and prioritize risks to the organization (correct)
  • To eliminate all risks to the organization
  • To ensure that the organization is in compliance with all laws and regulations
  • To assign blame for any risks that are identified

What is the last step in the model process for managing information security according to ISO 27001:2013?

  • Establish security policy, objectives, processes and procedures
  • Implement and operate the security policy, controls, processes and procedures
  • Assess and measure process performance against security policy, objectives and practical experience
  • Take corrective and preventive actions based on the results of the internal security audit and management review (correct)

What are the treatment options for Risk Assessment?

  • Mitigate, eliminate, accept, avoid
  • Avoid, reduce, share, retain
  • Accept, eliminate, control, transfer (correct)
  • Control, avoid, transfer, accept

What is the purpose of ISO 27001:2013 certification?

<p>All of the above (D)</p> Signup and view all the answers

What is the primary objective of internal controls in an organization?

<p>To prevent problems and protect assets (A)</p> Signup and view all the answers

What is a security policy in the context of information security?

<p>A document that outlines the organization's approach to protecting its information assets (B)</p> Signup and view all the answers

What is the purpose of conducting a Risk Assessment from a compliance perspective?

<p>All of the above (D)</p> Signup and view all the answers

What are the benefits of conducting a Risk Assessment for an organization?

<p>All of the above (C)</p> Signup and view all the answers

What is the purpose of a security policy in an organization?

<p>To provide management direction and support for information security in accordance with business requirements and relevant laws and regulations (B)</p> Signup and view all the answers

What are the steps of Risk Assessment process?

<p>Identify assets and determine the level of acceptable risk, identify threats to those individual assets, identify security-relevant events and impacts to the business that might arise, determine risk to the security of individual assets by applicable threats (A)</p> Signup and view all the answers

Flashcards are hidden until you start studying

More Like This

Use Quizgecko on...
Browser
Browser