PECB ISO-IEC-27001-Lead-Auditor PECB Certified ISO/IEC 27001 Lead Auditor https://killexams.com/pass4sure/exam-detail/ISO-IEC-27001-Lead-Auditor Question: 31 __________ is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems. A. Trojan B. Operating System C. Virus D. Malware Answer: D Question: 32 A well-executed risk analysis provides a great deal of useful information. A risk analysis has four main objectives. What is not one of the four main objectives of a risk analysis? A. Identifying assets and their value B. Implementing counter measures C. Establishing a balance between the costs of an incident and the costs of a security measure D. Determining relevant vulnerabilities and threats Answer: B Question: 33 What is a repressive measure in case of a fire? A. Taking out a fire insurance B. Putting out a fire after it has been detected by a fire detector C. Repairing damage caused by the fire Answer: B Question: 34 The following are the guidelines to protect your password, except: A. Don’t use the same password for various company system security access B. Do not share passwords with anyone C. For easy recall, use the same password for company and personal accounts D. Change a temporary password on first log-on Answer: B,C Question: 35 All are prohibited in acceptable use of information assets, except: A. Electronic chain letters B. E-mail copies to non-essential readers C. Company-wide e-mails with supervisor/TL permission. D. Messages with very large attachments or to a large number ofrecipients. Answer: C Question: 36 Information or data that are classified as ______ do not require labeling. A. Public B. Internal C. Confidential D. Highly Confidential Answer: A Question: 37 Which is not a requirement of HR prior to hiring? A. Undergo background verification B. Applicant must complete pre-employment documentation requirements C. Must undergo Awareness training on information security. D. Must successfully pass Background Investigation Answer: C Question: 38 Information Security is a matter of building and maintaining ________ . A. Confidentiality B. Trust C. Protection D. Firewalls Answer: B Question: 39 Does the security have the right to ask you to display your ID badges and check your bags? A. True B. False Answer: A Question: 40 Which of the following is not a type of Information Security attack? A. Legal Incidents B. Vehicular Incidents C. Technical Vulnerabilities D. Privacy Incidents Answer: B For More exams visit https://killexams.com/vendors-exam-list