Latest ISO-IEC-27001-Lead-Auditor Practice Tests with Actual Questions

Get Complete pool of questions with Premium PDF and Test Engine

Exam Code : ISO-IEC-27001-Lead-Auditor
Exam Name : PECB Certified ISO/IEC 27001 Lead Auditor
Vendor Name : "PECB"







PECB


ISO-IEC-27001-Lead-Auditor


PECB Certified ISO/IEC 27001 Lead Auditor


https://killexams.com/pass4sure/exam-detail/ISO-IEC-27001-Lead-Auditor


Question: 31


is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.

  1. Trojan

  2. Operating System

  3. Virus

  4. Malware



r: D


on: 32

executed risk analysis provides a great deal of useful information. A risk analysis has four main objecti not one of the four main objectives of a risk analysis?

tifying assets and their value

ementing counter measures

blishing a balance between the costs of an incident and the costs of a security measure ermining relevant vulnerabilities and threats


r: B


on: 33


a repressive measure in case of a fire? ng out a fire insurance

ng out a fire after it has been detected by a fire detector airing damage caused by the fire


r: B


on: 34

Answe


Questi


A well- ves.


What is

  1. Iden

  2. Impl

  3. Esta

  4. Det


Answe


Questi


What is

  1. Taki

  2. Putti

  3. Rep


Answe


Questi


The following are the guidelines to protect your password, except:

  1. Don’t use the same password for various company system security access

  2. Do not share passwords with anyone

  3. For easy recall, use the same password for company and personal accounts

  4. Change a temporary password on first log-on




Answer: B,C



Question: 35

All are prohibited in acceptable use of information assets, except:

  1. Electronic chain letters

  2. E-mail copies to non-essential readers

  3. Company-wide e-mails with supervisor/TL permission.

  4. Messages with very large attachments or to a large number ofrecipients.




Answer: C



Question: 36


ic nal

fidential

hly Confidential


r: A


on: 37


s not a requirement of HR prior to hiring? ergo background verification

licant must complete pre-employment documentation requirements undergo Awareness training on information security.

successfully pass Background Investigation


r: C


on: 38


ation Security is a matter of building and maintaining ________ . fidentiality


ection walls

Information or data that are classified as do not require labeling.

  1. Publ

  2. Inter

  3. Con

  4. Hig


Answe


Questi


Which i

  1. Und

  2. App

  3. Must

  4. Must


Answe


Questi


Inform

  1. Con

  2. Trust

  3. Prot

  4. Fire




Answer: B



Question: 39


Does the security have the right to ask you to display your ID badges and check your bags?

  1. True

  2. False



Answer: A



Question: 40


Which of the following is not a type of Information Security attack?

  1. Legal Incidents

  2. Vehicular Incidents

  3. Technical Vulnerabilities

  4. Privacy Incidents




Answer: B