Certbus > PECB > PECB Certifications > ISO-IEC-27001-LEAD-IMPLEMENTER > ISO-IEC-27001-LEAD-IMPLEMENTER Online Practice Questions and Answers

ISO-IEC-27001-LEAD-IMPLEMENTER Online Practice Questions and Answers

Questions 4

What is an example of a good physical security measure?

A. All employees and visitors carry an access pass.

B. Printers that are defective or have been replacedare immediately removed and given away as garbage for recycling.

C. Maintenance staff can be given quick and unimpeded access to the server area in the event of disaster.

Browse 80 Q&As
Questions 5

What is the greatest risk for an organization ifno information security policy has been defined?

A. If everyone works with the same account, it is impossible to find out who worked on what.

B. Information security activities are carried out by only a few people.

C. Too many measures areimplemented.

D. It is not possible for an organization to implement information security in a consistent manner.

Browse 80 Q&As
Questions 6

Midwest Insurance grades the monthly report of all claimed losses per insured as confidential. What is accomplished if all other reports from this insurance office are also assigned the appropriate grading?

A. The costs for automating are easier to charge to the responsible departments.

B. A determination can be made as to which report should be printed firstand which ones can wait a little longer.

C. Everyone can easily see how sensitive the reports' contents are by consulting the grading label.

D. Reports can be developed more easily and with fewer errors.

Browse 80 Q&As
Questions 7

What is the objective of classifying information?

A. Authorizing the use of an information system

B. Creating alabel that indicates how confidential the information is

C. Defining different levels of sensitivity into which information may be arranged

D. Displaying on the document who is permitted access

Browse 80 Q&As
Questions 8

Susan sends an email to Paul. Who determines the meaning and the value of information in this email?

A. Paul, therecipient of the information.

B. Paul and Susan, the sender and the recipient of the information.

C. Susan, the sender of the information.

Browse 80 Q&As
Questions 9

Companies use 27002 for compliance for which of the following reasons:

A. A structured program that helps with security and compliance

B. Explicit requirements for all regulations

C. Compliance with ISO 27002 is sufficient to comply with all regulations

Browse 80 Q&As
Questions 10

Of the following, which is the best organization or set of organizations to contribute to compliance?

A. IT only

B. IT,business management, HR and legal

C. IT and management

D. IT and legal

Browse 80 Q&As
Questions 11

Logging in to a computer system is an access-granting process consisting of three steps: identification, authentication and authorization. What occurs during the first step of this process: identification?

A. Thefirst step consists of checking if the user is using the correct certificate.

B. The first step consists of checking if the user appears on the list of authorized users.

C. The first step consists of comparing the password with the registered password.

D. The first step consists of granting access to the information to which the user is authorized.

Browse 80 Q&As
Questions 12

Why is compliance important forthe reliability of the information?

A. Compliance is another word for reliability. So, if a company indicates that it is compliant, it means that the information is managed properly.

B. By meeting the legislative requirements and theregulations of both the government and internal management, an organization shows that it manages its information in a sound manner.

C. When an organization employs a standard such as the ISO/IEC 27002 and uses it everywhere, it is compliant and thereforeit guarantees the reliability of its information.

D. When an organization is compliant, it meets the requirements of privacy legislation and, in doing so, protects the reliability of its information.

Browse 80 Q&As
Questions 13

In the context ofcontact with special interest groups, any information-sharing agreements should identify requirements for the protection of _________ information.

A. Availability

B. Confidential

C. Authentic

D. Authorization

Browse 80 Q&As
Questions 14

What is an example of a non-human threat to the physical environment?

A. Fraudulent transaction

B. Corrupted file

C. Storm

D. Virus

Browse 80 Q&As
Questions 15

Physical labels and ________ are two common forms of labeling which are mentioned in ISO 27002.

A. metadata

B. teradata

C. bridge

Browse 80 Q&As
Questions 16

Which of these control objectives are NOT in the domain "12.OPERATIONAL SAFETY"?

A. Protection against malicious code

B. Redundancies

C. Test data

D. Technical vulnerability management

Browse 80 Q&As
Questions 17

You apply for a position in another company and get the job. Along with your contract, you are asked to sign a code of conduct. What is a code of conduct?

A. A code ofconduct specifies how employees are expected to conduct themselves and is the same for all companies.

B. A code of conduct is a standard part of a labor contract.

C. A code of conduct differs from company to company and specifies, among other things, the rules of behavior with regard to the usage of information systems.

Browse 80 Q&As
Questions 18

The identified owner of an asset is always an individual

A. True

B. False

Browse 80 Q&As
Exam Name: PECB Certified ISO/IEC 27001 Lead Implementer exam
Last Update: Apr 15, 2024
Questions: 80 Q&As

PDF

$45.99

VCE

$49.99

PDF + VCE

$59.99