exin ismp practice test

Exam Title: Information Security Management Professional based on ISO/IEC 27001

Last update: Nov 27 ,2025
Question 1

The information security architect of a large service provider advocates an open design of the
security architecture, as opposed to a secret design.
What is her main argument for this choice?

  • A. Open designs are easily configured.
  • B. Open designs have more functionality.
  • C. Open designs are tested extensively.
Answer:

C

vote your answer:
A
B
C
A 0 B 0 C 0
Comments
Question 2

When is revision of an employee’s access rights mandatory?

  • A. After any position change
  • B. At hire
  • C. At least each year
  • D. At all moments stated in the information security policy
Answer:

D

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 3

An employee has worked on the organizational risk assessment. The goal of the assessment is not to
bring residual risks to zero, but to bring the residual risks in line with an organization's risk appetite.
When has the risk assessment program accomplished its primary goal?

  • A. Once the controls are implemented
  • B. Once the transference of the risk is complete
  • C. When decision makers have been informed of uncontrolled risks and proper authority groups decide to leave the risks in place
  • D. When the risk analysis is completed
Answer:

C

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 4

In a company a personalized smart card is used for both physical and logical access control.
What is the main purpose of the person’s picture on the smart card?

  • A. To authenticate the owner of the card
  • B. To authorize the owner of the card
  • C. To identify the role of the card owner
  • D. To verify the iris of the card owner
Answer:

A

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 5

What is a key item that must be kept in mind when designing an enterprise-wide information
security program?

  • A. When defining controls follow an approach and framework that is consistent with organizational culture
  • B. Determine controls in the light of specific risks an organization is facing
  • C. Put an enterprise-wide network and Host-Based Intrusion Detection and Prevention System (Host- Based IDPS) into place as soon as possible
  • D. Put an incident management and log file analysis program in place immediately
Answer:

B

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 6

Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are key terms in business
continuity management (BCM). Reducing loss of data is one of the focus areas of a BCM policy.
What requirement is in the data recovery policy to realize minimal data loss?

  • A. Maximize RPO
  • B. Reduce RPO
  • C. Reduce RTO
  • D. Reduce the time between RTO and RPO
Answer:

B

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 7

The security manager of a global company has decided that a risk assessment needs to be completed
across the company.
What is the primary objective of the risk assessment?

  • A. Identify, quantify and prioritize each of the business-critical assets residing on the corporate infrastructure
  • B. Identify, quantify and prioritize risks against criteria for risk acceptance
  • C. Identify, quantify and prioritize the scope of this risk assessment
  • D. Identify, quantify and prioritize which controls are going to be used to mitigate risk
Answer:

B

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 8

Who should be asked to check compliance with the information security policy throughout the
company?

  • A. Internal audit department
  • B. External forensics investigators
  • C. The same company that checks the yearly financial statement
Answer:

B

vote your answer:
A
B
C
A 0 B 0 C 0
Comments
Question 9

The handling of security incidents is done by the incident management process under guidelines of
information security management. These guidelines call for several types of mitigation plans.
Which mitigation plan covers short-term recovery after a security incident has occurred?

  • A. The Business Continuity Plan (BCP)
  • B. The disaster recovery plan
  • C. The incident response plan
  • D. The risk treatment plan
Answer:

C

vote your answer:
A
B
C
D
A 0 B 0 C 0 D 0
Comments
Question 10

An information security officer is asked to write a retention policy for a financial system. She is aware
of the fact that some data must be kept for a long time and other data must be deleted.
Where should she look for guidelines first?

  • A. In company policies
  • B. In finance management procedures
  • C. In legislation
Answer:

C

vote your answer:
A
B
C
A 0 B 0 C 0
Comments
Page 1 out of 2
Viewing questions 1-10 out of 30
Go To
page 2