Page 1 of 3

Quiz: ISO 27701

1. For SOP 08 (Field Safety Corrective Action FSCA Reporting), which is NOT a relevant scenario to raise a FSCA?

1. For SOP 08 (Field Safety Corrective Action FSCA Reporting), which is NOT a relevant scenario to raise a FSCA?
A
B
C
D

2. For SOP 13 (Sales Execution), what is the main purpose of the SOP?

2. For SOP 13 (Sales Execution), what is the main purpose of the SOP?
A
B
C
D

3. For SOP 20 (Risk Management), during the business process lifecycle of a product, when should we identify and address potential hazards and security shortcomings of the product?

3. For SOP 20 (Risk Management), during the business process lifecycle of a product, when should we identify and address potential hazards and security shortcomings of the product?
A
B
C
D

4. For SOP 25 (Acceptable Use of Assets), who is responsible for ensuring the confidentiality, integrity, and availability of information assets in BYOD-devices?

4. For SOP 25 (Acceptable Use of Assets), who is responsible for ensuring the confidentiality, integrity, and availability of information assets in BYOD-devices?
A
B
C
D

5. For SOP 26 (Mobile Device and Teleworking), what is the main purpose of this SOP?

5. For SOP 26 (Mobile Device and Teleworking), what is the main purpose of this SOP?
A
B
C
D

6. For SOP 28 (Password Management), which of the following is true?

6. For SOP 28 (Password Management), which of the following is true?
A
B
C
D

7. For SOP 29 (Disposable and Destruction), what should be done when equipment or media is intended for disposal or reuse?

a. Licensed data and software must be disposed
b. Licensed data and software must be shared
c. Licensed data and software must be duplicated
7. For SOP 29 (Disposable and Destruction), what should be done when equipment or media is intended for disposal or reuse?
A
B
C
D

8. For SOP 31 (Clear Desk and Clear Screen), what should be avoided when leaving confidential documents unattended?

8. For SOP 31 (Clear Desk and Clear Screen), what should be avoided when leaving confidential documents unattended?
A
B
C
D

9. For SOP 34 (Information Transfer), which risk is NOT mentioned in the SOP when securing the email system?

9. For SOP 34 (Information Transfer), which risk is NOT mentioned in the SOP when securing the email system?
A
B
C
D

10. For SOP 16 (Maintenance of Work Environment), which of the following are the 3 stages that the work environment must be split into?

10. For SOP 16 (Maintenance of Work Environment), which of the following are the 3 stages that the work environment must be split into?
A
B
C
D

Never submit passwords through Tally forms.
Report malicious form