Organizational
People
Physical
Technology
100

What is the main purpose of an information security policy?

To set management direction and support for security.

100

Why is security awareness training important?

Reduces human error and insider risks.

100

Name one basic physical control for information security.

Locking doors, visitor badges, CCTV.

100

Why are strong passwords or MFA important?

Prevent unauthorized access to systems.

200

Name one way an organization can show top management commitment to ISMS.

By providing resources, setting objectives, or communicating importance of ISMS.

200

Give an example of a common human-related security risk.

Weak passwords, phishing, negligence.

200

Why is secure disposal of paper records important?

To prevent data leakage from discarded documents.

200

Give one example of logging and monitoring in ISMS.

Collecting admin login logs in SIEM.

300

Why must roles and responsibilities for information security be clearly defined?

To avoid gaps or overlaps in accountability.

300

What should be done when an employee leaves the organization?

Access rights must be revoked immediately.

300

Give an example of protecting equipment against environmental threats.

Fire suppression, climate control, surge protectors.

300

Why should software be patched regularly?

To close known vulnerabilities.

400

What is the benefit of including security in supplier contracts?

Ensures outsourced services meet the same security standards.

400

Why should disciplinary processes be linked to information security breaches?

To enforce accountability and discourage negligence.

400

Why is clear desk and clear screen policy important?

Prevents unauthorized access to sensitive data.

400

What is the role of backup and restore procedures in ISMS?

Ensure data availability after incidents.

500

Give an example of a positive issue (opportunity) that can strengthen ISMS.

Strong customer trust / growing cloud adoption in Indonesia.

500

How can organizations measure the effectiveness of awareness programs?

By testing staff (quizzes, phishing simulations, KPI tracking).

500

How would you protect a data center against tailgating?

Mantraps, access cards, security guards.

500

How can organizations reduce risk of misconfiguration in cloud services?

Apply secure baseline, automated compliance checks, IaC security.