Logo Passei Direto
Material
Study with thousands of resources!

Text Material Preview

ISO/IEC 27001 (2022)
Foundation Exam
Version: Demo
[ Total Questions: 10]
Web: www.dumpscafe.com
Email: support@dumpscafe.com
APMG-International
ISO-IEC-27001-Foundation
https://www.dumpscafe.com
https://www.dumpscafe.com/Braindumps-ISO-IEC-27001-Foundation.html
IMPORTANT NOTICE
Feedback
We have developed quality product and state-of-art service to ensure our customers interest. If you have any 
suggestions, please feel free to contact us at feedback@dumpscafe.com
Support
If you have any questions about our product, please provide the following items:
exam code
screenshot of the question
login id/email
please contact us at and our technical experts will provide support within 24 hours.support@dumpscafe.com
Copyright
The product of each order has its own encryption code, so you should use it independently. Any unauthorized 
changes will inflict legal punishment. We reserve the right of final explanation for this statement.
APMG-International - ISO-IEC-27001-FoundationPass Exam
1 of 7Verified Solution - 100% Result
A. 
B. 
C. 
D. 
Category Breakdown
Category Number of Questions
Planning 4
Annex A: Information Security Controls 2
Context of the Organization 2
Introduction to ISO/IEC 27001 1
Support 1
TOTAL 10
Question #:1 - [Planning]
Which item is required to be defined when planning the organization's risk assessment process?
The parts of the ISMS scope which are excluded from the risk assessment
How the effectiveness of the method will be measured
The criteria for acceptable levels of risk
There are NO specific information requirements
Answer: C
Explanation
Clause 6.1.2 (Information security risk assessment) requires organizations to “define and apply an 
information security risk assessment process that… establishes and maintains information security risk 
”criteria, including criteria for accepting risk.
This means that acceptable levels of risk (risk acceptance criteria) must be explicitly defined. These criteria 
ensure consistent decision-making when evaluating whether identified risks need further treatment or can be 
tolerated.
Option A is incorrect because exclusions relate to the ISMS scope (Clause 4.3), not risk assessment planning. 
Option B is not a requirement; effectiveness of risk assessment methods is not required to be measured, 
though methods must be applied consistently. Option D is false—the standard clearly specifies required 
elements for risk assessment.
Thus, the correct answer isC: The criteria for acceptable levels of risk.
Question #:2 - [Annex A: Information Security Controls]
Identify the missing word(s) in the following control relating to the Policies for information security control.
“Information security policy and topic-specific policies should be defined, approved by management, [ ? ] and 
acknowledged by relevant personnel and relevant interested parties, and reviewed at planned intervals and if 
significant changes occur.”
APMG-International - ISO-IEC-27001-FoundationPass Exam
2 of 7Verified Solution - 100% Result
A. 
B. 
C. 
D. 
A. 
B. 
C. 
D. 
published
established and maintained
published, communicated to
communicated to
Answer: C
Explanation
Comprehensive and Detailed Explanation From Exact Extract ISO/IEC 27002:2022 standards:
Annex A.5.1 (Policies for information security) states:
“Information security policy and topic-specific policies should be defined, approved by management, 
published, communicated to and acknowledged by relevant personnel and relevant interested parties, 
”and reviewed at planned intervals and if significant changes occur.
This confirms that the missing words are The control emphasizes not just “published, communicated to.”
defining and approving policies but ensuring they are actively distributed and communicated so that relevant 
stakeholders are aware of and acknowledge them. Options A, B, and D are partial but incomplete.
Thus, the correct answer is .C
Question #:3 - [Context of the Organization]
Identify the missing word in the following sentence.
The organization shall determine the [ ? ] of interested parties relevant to information security.
requirements
number
structure
influence
Answer: A
Explanation
Clause 4.2 of ISO/IEC 27001:2022 states:
“The organization shall determine: a) interested parties that are relevant to the information security 
management system; b) the relevant requirements of these interested parties; c) which of these 
”requirements will be addressed through the ISMS.
APMG-International - ISO-IEC-27001-FoundationPass Exam
3 of 7Verified Solution - 100% Result
A. 
B. 
C. 
D. 
A. 
B. 
C. 
This confirms that the missing word is . Neither number, structure, nor influence are specified in requirements
the standard.
Question #:4 - [Planning]
Identify the missing word(s) in the following sentence.
“Information security, cybersecurity and privacy protection – [ ? ]” is the title of ISO/IEC 27005.
Guidelines for information security management systems auditing
Information security management systems – Requirements
Guidance on managing information security risks
Information security controls
Answer: C
Explanation
Comprehensive and Detailed Explanation From Exact Extract ISO/IEC 27005 standards:
ISO/IEC 27005:2022 is titled:
“Information security, cybersecurity and privacy protection — Guidance on managing information 
”security risks.
This standard provides structured methodologies for identifying, analyzing, evaluating, and treating risks, in 
alignment with ISO/IEC 27001’s risk management requirements (Clause 6.1.2 and 6.1.3). It supports 
organizations in implementing the risk management process that underpins an ISMS. Options A and B are 
titles of other ISO standards (ISO/IEC 27007 for auditing, ISO/IEC 27001 for requirements). Option D refers 
to ISO/IEC 27002 (controls).
Thus, the correct answer is .C: Guidance on managing information security risks
Question #:5 - [Introduction to ISO/IEC 27001]
Identify the missing words in the following sentence.
The organization shall establish, implement, maintain and [ ? ] an information security management system, 
including the processes needed and their interactions, in accordance with the requirements of this document.
report on
continually improve
communicate the importance of
APMG-International - ISO-IEC-27001-FoundationPass Exam
4 of 7Verified Solution - 100% Result
D. 
A. 
B. 
C. 
D. 
A. 
enforce standards for
Answer: B
Explanation
Clause 4.4 of ISO/IEC 27001:2022 states:
“The organization shall establish, implement, maintain and continually improve an information 
security management system, including the processes needed and their interactions, in accordance with 
”the requirements of this document.
This requirement highlights that an ISMS is not static; it must evolve continuously to adapt to new risks, 
technologies, and business changes. Options A, C, and D are not mentioned in the clause. The continual 
improvement cycle is central to ISO standards, aligning with the model.Plan-Do-Check-Act (PDCA)
Thus, the missing words are“continually improve.”
Question #:6 - [Support]
Which ISMS documentation is part of the minimum scope of documented information required to be 
managed and controlled?
Records of management decisions related to continual improvement
Third party information security awareness materials
The budget assigned to operate the ISMS and its related allocations
A statement of correspondence between other ISO standards and the ISMS
Answer: A
Explanation
Clause 7.5 (Documented Information) specifies that organizations must maintain documentationnecessary for 
. Additionally, Clause 9.3 (Management Review) requires “the effectiveness of the ISMS records of 
” as an output of management review. This is a decisions related to continual improvement opportunities
core requirement and forms part of the documented information that must be retained and controlled. Third-
party materials(B), budgets (C), and cross-reference statements to other ISO standards (D) are not required by 
ISO/IEC 27001. Only documents that directly demonstrate compliance, decision-making, and continual 
improvement are mandated. Therefore, the verified minimum required documentation includesrecords of 
related to continual improvement, confirming .management review decisions Answer: A
Question #:7 - [Planning]
Which action is a required response to an identified residual risk?
APMG-International - ISO-IEC-27001-FoundationPass Exam
5 of 7Verified Solution - 100% Result
A. 
B. 
C. 
D. 
A. 
B. 
C. 
D. 
By default, it shall be controlled by information security awareness and training
Top management shall delegate its treatment to risk owners
It shall be reviewed by the risk owner to consider acceptance
The organization shall change practices to avoid the risk occurring
Answer: C
Explanation
Clause 6.1.3 (e) specifies:
“The organization shall obtain risk owners’ approval of the information security risk treatment plan 
”and acceptance of the residual information security risks.
This confirms that residual risks — those remaining after risk treatment — must be reviewed and formally 
accepted by the designated risk owner. Option A is incorrect; awareness training is not a default control for all 
residual risks. Option B misrepresents leadership responsibility; top management ensures processes exist, but
formally approve residual risk. Option D (avoiding risk) is a treatment option, not the mandated risk owners
requirement for residual risks.
Thus, the required response is .C: Review and acceptance by the risk owner
Question #:8 - [Annex A: Information Security Controls]
To whom are the information security policies required to be communicated, according to the control in 
Annex A of ISO/IEC 27001?
Top management
Only staff with accountability for ISMS operation
Employees within the scope of the ISMS
Relevant personnel and relevant interested parties
Answer: D
Explanation
Comprehensive and Detailed Explanation From Exact Extract ISO/IEC 27002:2022 standards:
Annex A.5.1 (Policies for information security) clearly specifies:
“Information security policy and topic-specific policies should be defined, approved by management, 
”published, communicated to and acknowledged by relevant personnel and relevant interested parties…
APMG-International - ISO-IEC-27001-FoundationPass Exam
6 of 7Verified Solution - 100% Result
A. 
B. 
C. 
D. 
A. 
B. 
C. 
D. 
This means the communication obligation is not limited to top management (A) or only ISMS staff (B), nor 
does it stop at employees only (C). Instead, ISO/IEC 27001/27002 mandate a broader scope: allrelevant 
must be informed. This ensures both internal stakeholders personnel and relevant interested parties
(employees, contractors, temporary staff) and external interested parties (suppliers, partners, regulators, 
customers, etc.) receive the right policy communications where applicable. Therefore, the correct and verified 
answer is .D
Question #:9 - [Context of the Organization]
Which factor is required to be determined when understanding the organization and its context?
Internal issues affecting the purpose of the ISMS
The information security objectives relevant to the ISMS
The processes that will be required to operate the ISMS
The ISO/IEC 27001 clauses which apply to the management system
Answer: A
Explanation
Clause 4.1 specifies exactly what must be determined when establishing context: “The organization shall 
determine external and internal issues that are relevant to its purpose and that affect its ability to 
” This requirement is achieve the intended outcome(s) of its information security management system.
about understanding internal and external issues (e.g., culture, capabilities, regulatory environment) that 
influence the ISMS’s effectiveness. Objectives (option B) are addressed later in Clause 6.2; processes (option 
C) are addressed in Clause 4.4 and operational planning; and “which clauses apply” (option D) is not a 
determination step—ISO/IEC 27001’s requirements in Clauses 4–10 are not optional. Therefore, the direct, 
required factor per 4.1 is determining internal (and external) issues relevant to the organization’s purpose and 
ISMS outcomes.
Question #:10 - [Planning]
Which statement describes a requirement for information security objectives?
They shall be consistent with the information security policy
They shall all be measurable
They shall be contractually transferred to third parties
They shall be reviewed at least annually
Answer: A
Explanation
APMG-International - ISO-IEC-27001-FoundationPass Exam
7 of 7Verified Solution - 100% Result
Clause 6.2 (Information security objectives) requires that objectives:
“be consistent with the information security policy”
“be measurable (if practicable)”
“take into account applicable information security requirements”
“be monitored, communicated, and updated as appropriate.”
From this, option A is correct since consistency with policy is an explicit requirement. Option B is incorrect 
because the standard allows objectives to be measurable “if practicable” (not mandatory for all). Option C is 
incorrect—objectives are not transferred contractually to third parties, though third-party agreements may 
include security requirements. Option D is incorrect because the standard requires regular review “as 
appropriate,” not a fixed annual cycle.
Thus, the verified requirement isA: They shall be consistent with the information security policy.
About dumpscafe.com
dumpscafe.com was founded in 2007. We provide latest & high quality IT / Business Certification Training Exam 
Questions, Study Guides, Practice Tests.
We help you pass any IT / Business Certification Exams with 100% Pass Guaranteed or Full Refund. Especially 
Cisco, CompTIA, Citrix, EMC, HP, Oracle, VMware, Juniper, Check Point, LPI, Nortel, EXIN and so on.
View list of all certification exams: All vendors
 
 
 
We prepare state-of-the art practice tests for certification exams. You can reach us at any of the email addresses 
listed below.
Sales: sales@dumpscafe.com
Feedback: feedback@dumpscafe.com
Support: support@dumpscafe.com
Any problems about IT certification or our products, You can write us back and we will get back to you within 24 
hours.
https://www.dumpscafe.com
https://www.dumpscafe.com/allproducts.html
https://www.dumpscafe.com/Microsoft-exams.html
https://www.dumpscafe.com/Cisco-exams.html
https://www.dumpscafe.com/Citrix-exams.html
https://www.dumpscafe.com/CompTIA-exams.html
https://www.dumpscafe.com/EMC-exams.html
https://www.dumpscafe.com/ISC-exams.html
https://www.dumpscafe.com/Checkpoint-exams.html
https://www.dumpscafe.com/Juniper-exams.html
https://www.dumpscafe.com/Apple-exams.html
https://www.dumpscafe.com/Oracle-exams.html
https://www.dumpscafe.com/Symantec-exams.html
https://www.dumpscafe.com/VMware-exams.html
mailto:sales@dumpscafe.com
mailto:feedback@dumpscafe.com
mailto:support@dumpscafe.com