PECB iso iec 27001 lead auditor practice test

ISO/IEC 27001 Lead Auditor Exam

Last exam update: Dec 15 ,2024
Page 1 out of 7. Viewing questions 1-15 out of 100

Question 1

Below is Purpose of "Integrity", which is one of the Basic Components of Information Security

  • B. the property of safeguarding the accuracy and completeness of assets. Most Votes
  • C. the property that information is not made available or disclosed to unauthorized individuals
  • D. the property of being accessible and usable upon demand by an authorized entity.
Mark Question:
Answer:

B


User Votes:
B 58 votes
50%
C 8 votes
50%
D 5 votes
50%
Discussions
vote your answer:
B
C
D
0 / 1000
ashok
10 months, 1 week ago

the property of safeguarding the accuracy and completeness of assets.

ashok
10 months, 1 week ago

the property of safeguarding the accuracy and completeness of assets

ashgu
9 months, 4 weeks ago

ddddddddddddddddddddddddddddddddddddddddd

Luffy619
8 months, 1 week ago

the property of safeguarding the accuracy and completeness of assets.

robdavies66
5 months, 2 weeks ago

the property of safeguarding the accuracy and completeness of assets.

robdavies66
5 months, 1 week ago

the property of safeguarding the accuracy and completeness of assets.

medmond
5 months ago

the property of safeguarding the accuracy and completeness of assets.

medmond
5 months ago

the property of safeguarding the accuracy and completeness of assets

Ndanga
4 months, 3 weeks ago

the property of safeguarding the accuracy and completeness of assets.

ASRARMA
4 months, 1 week ago

the property of safeguarding the accuracy and completeness of assets.

Mans
4 months ago

the property that information is not made available or disclosed to unauthorized individuals

Priyachoudhari
4 months ago

Safeguarding the accuracy and completeness of the assests

ASK
3 months ago

C. the property that information is not made available or disclosed to unauthorized individuals


Question 2

-------------------------is an asset like other important business assets has value to an organization and
consequently needs to be protected.

  • A. Infrastructure
  • B. Data
  • C. Information Most Votes
  • D. Security
Mark Question:
Answer:

C


User Votes:
A 7 votes
50%
B 26 votes
50%
C 41 votes
50%
D 3 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
Abansal
1 year, 1 month ago

Information

ashok
10 months, 1 week ago

Information

robdavies66
5 months, 2 weeks ago

Information

robdavies66
5 months, 1 week ago

Information

ASRARMA
4 months, 1 week ago

Information

Mans
4 months ago

Data is an asset like other important business assets has value to an organization and consequently needs to be protected

Priyachoudhari
4 months ago

Information


Question 3

What is we do in ACT - From PDCA cycle

  • B. Take actions to continually improve process performance Most Votes
  • C. Take actions to continually monitor process performance
  • D. Take actions to continually improve people performance
Mark Question:
Answer:

B


User Votes:
B 52 votes
50%
C 9 votes
50%
D 4 votes
50%
Discussions
vote your answer:
B
C
D
0 / 1000
ashok
10 months, 1 week ago

Take actions to continually improve process performance

ashok
10 months, 1 week ago

Take actions to continually improve process performance

robdavies66
5 months, 2 weeks ago

Take actions to continually improve process performance

robdavies66
5 months, 1 week ago

Take actions to continually improve process performance

ASRARMA
4 months, 1 week ago

B. Take actions to continually improve process performance

Mans
4 months ago

Take actions to continually improve process performance

Priyachoudhari
4 months ago

Continuly improve process performance


Question 4

Implement plan on a test basis - this comes under which section of PDCA

  • A. Plan
  • B. Do Most Votes
  • C. Act
  • D. Check
Mark Question:
Answer:

B


User Votes:
A 12 votes
50%
B 36 votes
50%
C 10 votes
50%
D 5 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
Abansal
1 year, 1 month ago

The answer is "DO"

ashok
10 months, 1 week ago

Do Implement plan on a test basis

robdavies66
5 months, 2 weeks ago

The answer is B:Do

robdavies66
5 months, 1 week ago

B. Do B. Do

ASRARMA
4 months, 1 week ago

the answer is B. Do

Mans
4 months ago

Check implement plan on a test basis

Priyachoudhari
4 months ago

Do under pdca


Question 5

Which is the glue that ties the triad together

  • A. Process Most Votes
  • B. People
  • C. Collaboration
  • D. Technology
Mark Question:
Answer:

A


User Votes:
A 29 votes
50%
B 9 votes
50%
C 14 votes
50%
D 10 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
Abansal
1 year, 1 month ago

Process is the glue that triad togather

ashok
10 months, 1 week ago

Process is the glue that ties the triad together

robdavies66
5 months, 2 weeks ago

A Process

robdavies66
5 months, 1 week ago

A, Process

ASRARMA
4 months, 1 week ago

A. Process

Priyachoudhari
4 months ago

Process is a triad


Question 6

Who are allowed to access highly confidential files?

  • A. Employees with a business need-to-know
  • B. Contractors with a business need-to-know
  • C. Employees with signed NDA have a business need-to-know Most Votes
  • D. Non-employees designated with approved access and have signed NDA
Mark Question:
Answer:

C


User Votes:
A 5 votes
50%
B 1 votes
50%
C 42 votes
50%
D 7 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
Abansal
1 year, 1 month ago

Employee with signed NDA have a business need to know

ashok
10 months, 1 week ago

Employees with signed NDA have a business need-to-know

ashok
10 months, 1 week ago

Employees with signed NDA have a business need-to-know

robdavies66
5 months, 2 weeks ago

Employees with signed NDA have a business need-to-know

robdavies66
5 months, 1 week ago

Employees with signed NDA have a business need-to-know

ASRARMA
4 months, 1 week ago

C. Employees with signed NDA have a business need-to-know

Priyachoudhari
4 months ago

Employee with nda


Question 7

Which is not a requirement of HR prior to hiring?

  • A. Undergo background verification
  • B. Applicant must complete pre-employment documentation requirements
  • C. Must undergo Awareness training on information security. Most Votes
  • D. Must successfully pass Background Investigation
Mark Question:
Answer:

C


User Votes:
A
50%
B 3 votes
50%
C 36 votes
50%
D 4 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
ashok
10 months, 1 week ago

Must undergo Awareness training on information security.

robdavies66
5 months, 2 weeks ago

Must undergo Awareness training on information security

robdavies66
5 months, 1 week ago

Must undergo Awareness training on information security.

ASRARMA
4 months, 1 week ago

Must undergo Awareness training on information security.


Question 8

CMM stands for?

  • A. Capability Maturity Matrix
  • B. Capacity Maturity Matrix
  • C. Capability Maturity Model Most Votes
  • D. Capable Mature Model
Mark Question:
Answer:

C


User Votes:
A 6 votes
50%
B 3 votes
50%
C 33 votes
50%
D 2 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
Abansal
1 year, 1 month ago

Capacity Maturity Model

ashok
10 months, 1 week ago

Capability Maturity Model

robdavies66
5 months, 2 weeks ago

Capability Maturity Model

robdavies66
5 months, 1 week ago

Capability Maturity Model

ASRARMA
4 months, 1 week ago

Capability Maturity Model


Question 9

In acceptable use of Information Assets, which is the best practice?

  • A. Access to information and communication systems are provided for business purpose only Most Votes
  • B. Interfering with or denying service to any user other than the employee's host
  • C. Playing any computer games during office hours
  • D. Accessing phone or network transmissions, including wireless or wifi transmissions
Mark Question:
Answer:

A


User Votes:
A 38 votes
50%
B 3 votes
50%
C 2 votes
50%
D 1 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
Abansal
1 year, 1 month ago

A is the answer

ashok
10 months, 1 week ago

Access to information and communication systems are provided for business purpose only

robdavies66
5 months, 2 weeks ago

Access to information and communication systems are provided for business purpose only

robdavies66
5 months, 1 week ago

Access to information and communication systems are provided for business purpose only

ASRARMA
4 months, 1 week ago

A. Access to information and communication systems are provided for business purpose only


Question 10

All are prohibited in acceptable use of information assets, except:

  • A. Electronic chain letters
  • B. E-mail copies to non-essential readers
  • C. Company-wide e-mails with supervisor/TL permission. Most Votes
  • D. Messages with very large attachments or to a large number ofrecipients.
Mark Question:
Answer:

C


User Votes:
A 6 votes
50%
B 9 votes
50%
C 26 votes
50%
D 5 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
ashok
10 months, 1 week ago

Company-wide e-mails with supervisor/TL permission.

ashok
10 months, 1 week ago

Company-wide e-mails with supervisor/TL permission.

robdavies66
5 months, 2 weeks ago

Company-wide e-mails with supervisor/TL permission

robdavies66
5 months, 1 week ago

Company-wide e-mails with supervisor/TL permission

ASRARMA
4 months, 1 week ago

C. Company-wide e-mails with supervisor/TL permission.


Question 11

Information Security is a matter of building and maintaining ________ .

  • A. Confidentiality
  • B. Trust Most Votes
  • C. Protection
  • D. Firewalls
Mark Question:
Answer:

B


User Votes:
A 21 votes
50%
B 24 votes
50%
C 8 votes
50%
D 2 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
ashok
10 months, 1 week ago

Information Security is a matter of building and maintaining Trust

robdavies66
5 months, 2 weeks ago

B. Trust trust

robdavies66
5 months, 1 week ago

B trust b trust

robdavies66
5 months, 1 week ago

B. Trust B. Trust


Question 12

Phishing is what type of Information Security Incident?

  • A. Private Incidents
  • B. Cracker/Hacker Attacks Most Votes
  • C. Technical Vulnerabilities
  • D. Legal Incidents
Mark Question:
Answer:

B


User Votes:
A 6 votes
50%
B 36 votes
50%
C 6 votes
50%
D 1 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
ashok
10 months, 1 week ago

Cracker/Hacker Attacks

ashok
10 months, 1 week ago

Cracker/Hacker Attacks

robdavies66
5 months, 2 weeks ago

Cracker/Hacker Attacks

robdavies66
5 months, 1 week ago

Cracker/Hacker Attacks

robdavies66
5 months, 1 week ago

Cracker/Hacker Attacks

ASRARMA
4 months, 1 week ago

B. Cracker/Hacker Attacks


Question 13

The following are the guidelines to protect your password, except: 

  • A. Don't use the same password for various company system security access
  • B. Do not share passwords with anyone Most Votes
  • C. For easy recall, use the same password for company and personal accounts Most Votes
  • D. Change a temporary password on first log-on
Mark Question:
Answer:

B,C


User Votes:
A 1 votes
50%
B 14 votes
50%
C 31 votes
50%
D 1 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
ashok
10 months, 1 week ago

For easy recall, use the same password for company and personal accounts

robdavies66
5 months, 2 weeks ago

For easy recall, use the same password for company and personal accounts

robdavies66
5 months, 1 week ago

For easy recall, use the same password for company and personal accounts

robdavies66
5 months, 1 week ago

For easy recall, use the same password for company and personal accounts

maximea
1 month, 1 week ago

Utiliser le même mot de passe pour les comptes de l'entreprise et les comptes personnels n'est pas recommandé car cela augmente le risque de compromission de la sécurité.


Question 14

The following are purposes of Information Security, except:

  • A. Ensure Business Continuity
  • B. Minimize Business Risk
  • C. Increase Business Assets Most Votes
  • D. Maximize Return on Investment
Mark Question:
Answer:

C


User Votes:
A 1 votes
50%
B 7 votes
50%
C 30 votes
50%
D 18 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
ashok
10 months, 1 week ago

Increase Business Assets

robdavies66
5 months, 2 weeks ago

Increase Business Assets

robdavies66
5 months, 1 week ago

Increase Business Assets

robdavies66
5 months, 1 week ago

Increase Business Assets

robdavies66
5 months, 1 week ago

Increase Business Assets

ASRARMA
4 months, 1 week ago

C. Increase Business Assets

maximea
1 month, 1 week ago

n'est pas un objectif direct de la sécurité de l'information


Question 15

Which of the following is not a type of Information Security attack?

  • A. Legal Incidents
  • B. Vehicular Incidents Most Votes
  • C. Technical Vulnerabilities
  • D. Privacy Incidents
Mark Question:
Answer:

B


User Votes:
A 5 votes
50%
B 32 votes
50%
C 3 votes
50%
D 4 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
Abansal
1 year, 1 month ago

Vehicular incident

Abansal
1 year, 1 month ago

Vehicular Incidents

ashok
10 months, 1 week ago

Vehicular Incidents

robdavies66
5 months, 2 weeks ago

Vehicular Incidents

robdavies66
5 months, 1 week ago

Vehicular Incidents

robdavies66
5 months, 1 week ago

Vehicular Incidents

robdavies66
5 months, 1 week ago

Vehicular Incidents

robdavies66
5 months, 1 week ago

Vehicular Incidents

ASRARMA
4 months, 1 week ago

B. Vehicular Incidents

ASK
3 months ago

Vehicular Incidents

maximea
1 month, 1 week ago

B. Vehicular Incidents

To page 2