Leads4pass > EXIN > EXIN Certifications > ISMP > ISMP Online Practice Questions and Answers

ISMP Online Practice Questions and Answers

Questions 4

What needs to be decided prior to considering the treatment of risks?

A. Criteria for determining whether or not the risk can be accepted

B. How to apply appropriate controls to reduce the risks

C. Mitigation plans

D. The development of own guidelines

Buy Now
Questions 5

Who should be asked to check compliance with the information security policy throughout the company?

A. Internal audit department

B. External forensics investigators

C. The same company that checks the yearly financial statement

Buy Now
Questions 6

A company's webshop offers prospects and customers the possibility to search the catalog and place orders around the clock. In order to satisfy the needs of both customer and business several requirements have to be met. One of the criteria is data classification.

What is the most important classification aspect of the unit price of an object in a 24h webshop?

A. Confidentiality

B. Integrity

C. Availability

Buy Now
Questions 7

In a company the IT strategy is migrating towards a Service Oriented Architecture (SOA) so that migrating to the cloud is better feasible in the future. The security architect is asked to make a first draft of the security architecture.

Which elements should the security architect draft?

A. Management and control of the security services

B. The information security policy, the risk assessment and the controls in the security services

C. Which security services are provided and in which supporting architectures are they defined

Buy Now
Questions 8

The information security manager is writing the Information Security Management System (ISMS) documentation. The controls that are to be implemented must be described in one of the phases of the Plan-Do-Check-Act (PDCA) cycle of the ISMS.

In which phase should these controls be described?

A. Plan

B. Do

C. Check

D. Act

Buy Now
Questions 9

The information security architect of a large service provider advocates an open design of the security architecture, as opposed to a secret design.

What is her main argument for this choice?

A. Open designs are easily configured.

B. Open designs have more functionality.

C. Open designs are tested extensively.

Buy Now
Questions 10

Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are key terms in business continuity management (BCM). Reducing loss of data is one of the focus areas of a BCM policy.

What requirement is in the data recovery policy to realize minimal data loss?

A. Maximize RPO

B. Reduce RPO

C. Reduce RTO

D. Reduce the time between RTO and RPO

Buy Now
Questions 11

What is a key item that must be kept in mind when designing an enterprise-wide information security program?

A. When defining controls follow an approach and framework that is consistent with organizational culture

B. Determine controls in the light of specific risks an organization is facing

C. Put an enterprise-wide network and Host-Based Intrusion Detection and Prevention System (Host-Based IDPS) into place as soon as possible

D. Put an incident management and log file analysis program in place immediately

Buy Now
Questions 12

The ambition of the security manager is to certify the organization against ISO/IEC 27001. What is an activity in the certification program?

A. Formulate the security requirements in the outsourcing contracts

B. Implement the security baselines in Secure Systems Development Life Cycle (SecSDLC)

C. Perform a risk assessment of the secure internet connectivity architecture of the datacenter

D. Produce a Statement of Applicability based on risk assessments

Buy Now
Questions 13

It is important that an organization is able to prove compliance with information standards and legislation. One of the most important areas is documentation concerning access management. This process contains a number of activities including granting rights, monitoring identity status, logging, tracking access and removing rights. Part of these controls are audit trail records which may be used as evidence for both internal and external audits.

What component of the audit trail is the most important for an external auditor?

A. Access criteria and access control mechanisms

B. Log review, consolidation and management

C. System-specific policies for business systems

Buy Now
Exam Code: ISMP
Exam Name: Information Security Management Professional based on ISO/IEC 27001
Last Update: Aug 15, 2025
Questions: 30
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99