Coursera Answers

1.3.4 Map to ISO 27002 Control Quiz Answer

1.3.4 Map to ISO 27002 Control Quiz Answer

Cyber Threat Management

Governance and Compliance

in this article i am gone to share Cyber Threat Management | Governance and Compliance | 1.3.4 Map to ISO 27002 Control Quiz Answer with you..


1.3.4 Map to ISO 27002 Control

Matching. Select from lists and then submit.

@Apollo is preparing for an upcoming ISMS audit but there is still work to do! They need to develop controls for a few of their control objectives. Can you help them specify the right control for each control objective?


Select an option from each of the dropdowns, then Submit.


To prevent unauthorized access to systems and applications

  • Access will be restricted in accordance with an access control policy


To prevent exploitation of software vulnerabilities

  • Rules regarding the installation of software by employees will be established and implemented


To ensure a consistent and effective approach to the management of information security incidents

  • Employees will be required to report any observed or suspected information security weaknesses


To prevent loss, damage, theft or compromise of sensitive data

  • A clean desk policy will be implemented