image


PECB


ISO-IEC-27001-Lead-Auditor


PECB Certified ISO/IEC 27001 Lead Auditor


https://killexams.com/pass4sure/exam-detail/ISO-IEC-27001-Lead-Auditor

Question: 31


is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.

  1. Trojan

  2. Operating System

  3. Virus

  4. Malware



r: D


on: 32

executed risk analysis provides a great deal of useful information. A risk analysis has four main objecti not one of the four main objectives of a risk analysis?

tifying assets and their value

ementing counter measures

blishing a balance between the costs of an incident and the costs of a security measure ermining relevant vulnerabilities and threats


r: B


on: 33


a repressive measure in case of a fire? ng out a fire insurance

ng out a fire after it has been detected by a fire detector airing damage caused by the fire


r: B


on: 34

image

Answe


Questi


A well- ves.


What is

  1. Iden

  2. Impl

  3. Esta

  4. Det


Answe


Questi


What is

  1. Taki

  2. Putti

  3. Rep


Answe


Questi


The following are the guidelines to protect your password, except:

  1. Don’t use the same password for various company system security access

  2. Do not share passwords with anyone

  3. For easy recall, use the same password for company and personal accounts

  4. Change a temporary password on first log-on


Answer: B,C


Question: 35

All are prohibited in acceptable use of information assets, except:

  1. Electronic chain letters

  2. E-mail copies to non-essential readers

  3. Company-wide e-mails with supervisor/TL permission.

  4. Messages with very large attachments or to a large number ofrecipients.


Answer: C


Question: 36


ic nal

fidential

hly Confidential


r: A


on: 37


s not a requirement of HR prior to hiring? ergo background verification

licant must complete pre-employment documentation requirements undergo Awareness training on information security.

successfully pass Background Investigation


r: C


on: 38


ation Security is a matter of building and maintaining ________ . fidentiality


ection walls

image

Information or data that are classified as do not require labeling.

  1. Publ

  2. Inter

  3. Con

  4. Hig


Answe


Questi


Which i

  1. Und

  2. App

  3. Must

  4. Must


Answe


Questi


Inform

  1. Con

  2. Trust

  3. Prot

  4. Fire


Answer: B


Question: 39


Does the security have the right to ask you to display your ID badges and check your bags?

  1. True

  2. False

Answer: A


Question: 40


Which of the following is not a type of Information Security attack?

  1. Legal Incidents

  2. Vehicular Incidents

  3. Technical Vulnerabilities

  4. Privacy Incidents


image

Answer: B


For More exams visit https://killexams.com/vendors-exam-list


image