1 / 11

PECB Certified ISOIEC 27001 Lead Auditor ISO-IEC-27001 Lead Auditor Exam Questions

PassQuestion provides the latest PECB Certified ISOIEC 27001 Lead Auditor ISO-IEC-27001 Lead Auditor Exam Questions to help you in every possible way to clear the exam on your first attempt.

Download Presentation

PECB Certified ISOIEC 27001 Lead Auditor ISO-IEC-27001 Lead Auditor Exam Questions

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ISO-IEC-27001 Lead Auditor ISO-IEC-27001 Lead Auditor Free Questions Free Questions PECB Certified ISO/IEC 27001 PECB Certified ISO/IEC 27001 Lead Auditor exam Lead Auditor exam https://www.passquestion.com/ISO-IEC-27001-Lead-Auditor.html https://www.passquestion.com/ISO-IEC-27001-Lead-Auditor.html

  2. Question 1 Question 1 Which is not a requirement of HR prior to hiring? Which is not a requirement of HR prior to hiring? A. Undergo background verification A. Undergo background verification B. Applicant must complete pre-employment documentation requirements B. Applicant must complete pre-employment documentation requirements C. Must undergo Awareness training on information security. C. Must undergo Awareness training on information security. D. Must successfully pass Background Investigation D. Must successfully pass Background Investigation Answer: C Answer: C

  3. Question 2 Question 2 A couple of years ago you started your company which has now grown from 1 to 20 A couple of years ago you started your company which has now grown from 1 to 20 employees. Your company’s information is worth more and more and gone are the days employees. Your company’s information is worth more and more and gone are the days when you could keep control yourself. You are aware that you have to take measures, but when you could keep control yourself. You are aware that you have to take measures, but what should they be? You hire a consultant who advises you to start with a qualitative risk what should they be? You hire a consultant who advises you to start with a qualitative risk analysis. analysis. What is a qualitative risk analysis? What is a qualitative risk analysis? A. This analysis follows a precise statistical probability calculation in order to calculate A. This analysis follows a precise statistical probability calculation in order to calculate exact loss caused by damage. exact loss caused by damage. B. This analysis is based on scenarios and situations and produces a subjective view of the B. This analysis is based on scenarios and situations and produces a subjective view of the possible threats. possible threats. Answer: B Answer: B

  4. Question 3 Question 3 What is a repressive measure in case of a fire? What is a repressive measure in case of a fire? A. Taking out a fire insurance A. Taking out a fire insurance B. Putting out a fire after it has been detected by a fire detector B. Putting out a fire after it has been detected by a fire detector C. Repairing damage caused by the fire C. Repairing damage caused by the fire Answer: B Answer: B

  5. Question 4 Question 4 Below is Purpose of "Integrity", which is one of the Basic Components of Below is Purpose of "Integrity", which is one of the Basic Components of Information Security Information Security A. the property that information is not made available or disclosed to A. the property that information is not made available or disclosed to unauthorized individuals unauthorized individuals B. the property of safeguarding the accuracy and completeness of assets. B. the property of safeguarding the accuracy and completeness of assets. C. the property that information is not made available or disclosed to C. the property that information is not made available or disclosed to unauthorized individuals unauthorized individuals D. the property of being accessible and usable upon demand by an authorized D. the property of being accessible and usable upon demand by an authorized entity. entity. Answer: B Answer: B

  6. Question 5 Question 5 Does the security have the right to ask you to display your ID badges and check your bags? Does the security have the right to ask you to display your ID badges and check your bags? A. True A. True B. False B. False Answer: A Answer: A

  7. Question 6 Question 6 You work in the office of a large company. You receive a call from a person claiming to You work in the office of a large company. You receive a call from a person claiming to be from the Helpdesk. He asks you for your password. be from the Helpdesk. He asks you for your password. What kind of threat is this? What kind of threat is this? A. Natural threat A. Natural threat B. Organizational threat B. Organizational threat C. Social Engineering C. Social Engineering D. Arason D. Arason Answer: C Answer: C

  8. Question 7 Question 7 A hacker gains access to a web server and reads the credit card numbers stored A hacker gains access to a web server and reads the credit card numbers stored on that on that server. server. Which security principle is violated? Which security principle is violated? A. Availability A. Availability B. Confidentiality B. Confidentiality C. Integrity C. Integrity D. Authenticity D. Authenticity Answer: B Answer: B

  9. Question 8 Question 8 There was a fire in a branch of the company Midwest Insurance. The fire department quickly arrived There was a fire in a branch of the company Midwest Insurance. The fire department quickly arrived at the scene and could extinguish the fire before it spread and burned down the entire premises. The at the scene and could extinguish the fire before it spread and burned down the entire premises. The server, however, was destroyed in the fire. The backup tapes kept in another room had melted and server, however, was destroyed in the fire. The backup tapes kept in another room had melted and many other documents were lost for good. many other documents were lost for good. What is an example of the indirect damage caused by this fire? What is an example of the indirect damage caused by this fire? A. Melted backup tapes A. Melted backup tapes B. Burned computer systems B. Burned computer systems C. Burned documents C. Burned documents D. Water damage due to the fire extinguishers D. Water damage due to the fire extinguishers Answer: D Answer: D

  10. Question 9 Question 9 Which measure is a preventive measure? Which measure is a preventive measure? A. Installing a logging system that enables changes in a system to be recognized A. Installing a logging system that enables changes in a system to be recognized B. Shutting down all internet traffic after a hacker has gained access to the B. Shutting down all internet traffic after a hacker has gained access to the company systems company systems C. Putting sensitive information in a safe C. Putting sensitive information in a safe Answer: C Answer: C

  11. Question 10 Question 10 Which of the following is not a type of Information Security attack? Which of the following is not a type of Information Security attack? A. Legal Incidents A. Legal Incidents B. Vehicular Incidents B. Vehicular Incidents C. Technical Vulnerabilities C. Technical Vulnerabilities D. Privacy Incidents D. Privacy Incidents Answer: B Answer: B

More Related