PECB ISO-IEC-27001 Lead Auditor PECB Certified ISO/IEC 27001 Lead Auditor exam Online Training
PECB ISO-IEC-27001 Lead Auditor Online Training
The questions for ISO-IEC-27001 Lead Auditor were last updated at Feb 20,2025.
- Exam Code: ISO-IEC-27001 Lead Auditor
- Exam Name: PECB Certified ISO/IEC 27001 Lead Auditor exam
- Certification Provider: PECB
- Latest update: Feb 20,2025
A property of Information that has the ability to prove occurrence of a claimed event.
- A . Electronic chain letters
- B . Integrity
- C . Availability
- D . Accessibility
Stages of Information
- A . creation, evolution, maintenance, use, disposition
- B . creation, use, disposition, maintenance, evolution
- C . creation, distribution, use, maintenance, disposition
- D . creation, distribution, maintenance, disposition, use
A decent visitor is roaming around without visitor’s ID. As an employee you should do the following, except:
- A . Say "hi" and offer coffee
- B . Call the receptionist and inform about the visitor
- C . Greet and ask him what is his business
- D . Escort him to his destination
Which of the following is not a type of Information Security attack?
- A . Legal Incidents
- B . Vehicular Incidents
- C . Technical Vulnerabilities
- D . Privacy Incidents
The following are purposes of Information Security, except:
- A . Ensure Business Continuity
- B . Minimize Business Risk
- C . Increase Business Assets
- D . Maximize Return on Investment
The following are the guidelines to protect your password, except:
- A . Don’t use the same password for various company system security access
- B . Do not share passwords with anyone
- C . For easy recall, use the same password for company and personal accounts
- D . Change a temporary password on first log-on
Phishing is what type of Information Security Incident?
- A . Private Incidents
- B . Cracker/Hacker Attacks
- C . Technical Vulnerabilities
- D . Legal Incidents
Information Security is a matter of building and maintaining ________.
- A . Confidentiality
- B . Trust
- C . Protection
- D . Firewalls
All are prohibited in acceptable use of information assets, except:
- A . Electronic chain letters
- B . E-mail copies to non-essential readers
- C . Company-wide e-mails with supervisor/TL permission.
- D . Messages with very large attachments or to a large number ofrecipients.
In acceptable use of Information Assets, which is the best practice?
- A . Access to information and communication systems are provided for business purpose only
- B . Interfering with or denying service to any user other than the employee’s host
- C . Playing any computer games during office hours
- D . Accessing phone or network transmissions, including wireless or wifi transmissions