iso-iec-27001-lead-auditor question 81 discussion

View all ISO/IEC 27001 Lead Auditor Exam here
back to pecb forum

Question 81

What is the standard definition of ISMS? 

  • A. Is an information security systematic approach to achieve business objectives for implementation, establishing, reviewing,operating and maintaining organization's reputation.
  • B. A company wide business objectives to achieve information security awareness for establishing, implementing, operating, monitoring, reviewing, maintaining and improving C. A project-based approach to achieve business objectives for establishing, implementing,operating, monitoring, reviewing, maintaining and improving an organizations information security
  • D. A systematic approach for establishing, implementing, operating,monitoring, reviewing, maintainingand improving an organizations information security to achieve business objectives. Most Votes
Answer:

D


User Votes:
A 5 votes
50%
B 1 votes
50%
D 26 votes
50%
Discussions
0 / 1000
Abansal
1 year, 3 months ago

The Answer is option D

ashok
12 months ago

A systematic approach for establishing, implementing, operating,monitoring, reviewing, maintainingand improving an organizations information security to achieve business objectives.

robdavies66
7 months ago

A systematic approach for establishing, implementing, operating,monitoring, reviewing, maintainingand improving an organizations information security to achieve business objectives.

ASRARMA
6 months ago

D. A systematic approach for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organizations information security to achieve business objectives.

maximea
3 months ago

D. A systematic approach for establishing, implementing, operating,monitoring, reviewing, maintainingand improving an organizations information security to achieve business objectives.

grosso62
1 month, 1 week ago

D. A systematic approach for establishing, implementing, operating,monitoring, reviewing, maintainingand improving an organizations information security to achieve business objectives.