
ISO127001
Quiz by Bram
Feel free to use or edit a copy
includes Teacher and Student dashboards
Measure skillsfrom any curriculum
Measure skills
from any curriculum
Tag the questions with any skills you have. Your dashboard will track each student's mastery of each skill.
With a free account, teachers can
- edit the questions
- save a copy for later
- start a class game
- automatically assign follow-up activities based on students’ scores
- assign as homework
- share a link with colleagues
- print as a bubble sheet
16 questions
Show answers
- Q1What is ISO127001 all about?Requirements and setup of security software (Firewall, Anti-Virus, etc.)Set of rules that must be implemented within the companyEstablishing an information security management systemHandling of physical documents60s
- Q2How to achieve Information Security?Implement and constantly practice the process of protecting informationAcquire a security software package and install it within the organizationHire a data protection company that will monitor and prevent intrusions and attacks60s
- Q3Which types of information are protected by the ISO127001Employees private data (bank accounts, salary statements, home addresses)Starred company data (clients and suppliers, stakeholders, investor data, etc.)All of the information mentioned in every other answerClient (contracts, employees emails, etc.) and Respondent data (emails, IP addresses, answers, etc.)60s
- Q4What will this mean for our current and future clients?All clients will be required to conform with the policies and procedures, established by the ISO127001Better protection of client information and higher chances of acquiring new clientsISO127001 has no effect on our current and future clientsStarred will be required to submit a quarterly ISO127001 report to every client60s
- Q5Where should the MFA (2FA) be used?Services (websites) listed in the ISO127001 policyUsing MFA (2FA) is considered a bad practiceFinance-related products onlyEvery service (website) that supports it60s
- Q6What data should be stored (kept) on work notebookOnly the data that is currently required in relation to tasks at handISO127001 doesn't restrict types of information stored on my notebookAll company data I have access to according to the security policiesBoth company data and my private information60s
- Q7Should the access to data (information) be separatedNo, ISO127001 policies do not require data access separationNo, separating access to data (information) compromises information securityYes, based on employees personal decisionYes, based on CIA classification60s
- Q8When is it appropriate to log in from client's (or public) deviceDuring mission critical meetings and salesNever. Login and (any private information) may be used only on company laptopAfter making sure the client's (or public) device has appropriate anti-virus software installedOnly if the owner of the device is trustworthy60s
- Q9How is "clear screen and clear desk" policy applicable?This policy is a recommendation and is not enforced by ISO127001Notebook must be locked only if leaving it for more than 10 minutes. Documents should be turned face down to prevent others from seeing the contents.Only management must make sure to lock their notebooks if going away and lock documents in a lockable drawerEvery employee must lock their notebooks if going away and lock documents in a lockable drawer60s
- Q10What is a strong password?Both requirement must be met - more than 8 characters and at least 1 special characterSomething personal to me like a pet name or mother's maiden name or my favorite football teamAs long as one requirement is met - either more than 8 characters or at least 1 special characterPassword must be picked from the list, provided by the ISO127001 policy60s
- Q11What network type should be preferred?4G and a password-protected WiFi are both goodWifi is preferred. 4G may be used but only in combination with a VPN4G is preferred. Wifi may be used but only in combination with a VPN.Any network because modern systems enforce encryption60s
- Q12Who is responsible for protecting informationEvery employee including myselfISO127001 auditor, after granting the certification to StarredInformation protection is automated and requires no effort from employeesSecurity department and management60s
- Q13To whom should the security policies be applied?All employeesTop managementSecurity departmentAll employees, freelancers and suppliers60s
- Q14What restriction apply on transport of the data?Data transfer is not restricted as long as reliable network is usedData transport is prohibited at all timesMinimize the transport and use only secure, encrypted networkNo restrictions because modern communication technologies and services provide reliable protection60s
- Q15When should information security policies be applied?Only when visiting clients or working in public spacesAlways apply both at work and at homeWhen deemed necessary at my own discretionAnywhere outside the office60s