PECB ISO-IEC-27001 Lead Auditor PECB Certified ISO/IEC 27001 Lead Auditor exam Online Training
PECB ISO-IEC-27001 Lead Auditor Online Training
The questions for ISO-IEC-27001 Lead Auditor were last updated at Feb 20,2025.
- Exam Code: ISO-IEC-27001 Lead Auditor
- Exam Name: PECB Certified ISO/IEC 27001 Lead Auditor exam
- Certification Provider: PECB
- Latest update: Feb 20,2025
What is the difference between a restricted and confidential document?
- A . Restricted – to be shared among an authorized group
Confidential – to be shared among named individuals - B . Restricted – to be shared among named individuals
Confidential – to be shared among an authorized group - C . Restricted – to be shared among named individuals
Confidential – to be shared across the organization only - D . Restricted – to be shared among named individuals
Confidential – to be shared with friends and family
CEO sends a mail giving his views on the status of the company and the company’s future strategy and the CEO’s vision and the employee’s part in it. The mail should be classified as
- A . Internal Mail
- B . Public Mail
- C . Confidential Mail
- D . Restricted Mail
You see a blue color sticker on certain physical assets.
What does this signify?
- A . The asset is very high critical and its failure affects the entire organization
- B . The asset with blue stickers should be kept air conditioned at all times
- C . The asset is high critical and its failure will affect a group/s/project’s work in the organization
- D . The asset is critical and the impact is restricted to an employee only
Integrity of data means
- A . Accuracy and completeness of the data
- B . Data should be viewable at all times
- C . Data should be accessed by only the right people
You have a hard copy of a customer design document that you want to dispose off.
What would you do
- A . Throw it in any dustbin
- B . Shred it using a shredder
- C . Give it to the office boy to reuse it for other purposes
- D . Be environment friendly and reuse it for writing
You receive the following mail from the IT support team: Dear User,Starting next week, we will be deleting all inactive email accounts in order to create spaceshare the below details in order to continue using your account. In case of no response,
Name:
Email ID:
Password:
DOB:
Kindly contact the webmail team for any further support. Thanks for your attention.
Which of the following is the best response?
- A . Ignore the email
- B . Respond it by saying that one should not share the password with anyone
- C . One should not respond to these mails and report such email to your supervisor
The following are definitions of Information, except:
- A . accurate and timely data
- B . specific and organized data for a purpose
- C . mature and measurable data
- D . can lead to understanding and decrease in uncertainty
In the event of an Information security incident, system users’ roles and responsibilities are to be observed, except:
- A . Report suspected or known incidents upon discovery through the Servicedesk
- B . Preserve evidence if necessary
- C . Cooperate with investigative personnel during investigation if needed
- D . Make the information security incident details known to all employees
What is the standard definition of ISMS?
- A . Is an information security systematic approach to achieve business objectives for implementation, establishing, reviewing,operating and maintaining organization’s reputation.
- B . A company wide business objectives to achieve information security awareness for establishing, implementing, operating, monitoring, reviewing, maintaining and improving
- C . A project-based approach to achieve business objectives for establishing,
implementing, operating, monitoring, reviewing, maintaining and improving an organization’s information security - D . A systematic approach for establishing, implementing, operating,monitoring, reviewing, maintaining and improving an organization’s information security to achieve business objectives.
Information or data that are classified as ______ do not require labeling.
- A . Public
- B . Internal
- C . Confidential
- D . Highly Confidential