PECB iso iec 27001 lead auditor practice test

ISO/IEC 27001 Lead Auditor Exam

Last exam update: Feb 05 ,2025
Page 1 out of 7. Viewing questions 1-15 out of 100

Question 1

Below is Purpose of "Integrity", which is one of the Basic Components of Information Security

  • B. the property of safeguarding the accuracy and completeness of assets. Most Votes
  • C. the property that information is not made available or disclosed to unauthorized individuals
  • D. the property of being accessible and usable upon demand by an authorized entity.
Mark Question:
Answer:

B


User Votes:
B 65 votes
50%
C 8 votes
50%
D 6 votes
50%
Discussions
vote your answer:
B
C
D
0 / 1000
ashok
12 months ago

the property of safeguarding the accuracy and completeness of assets.

ashok
12 months ago

the property of safeguarding the accuracy and completeness of assets

ashgu
11 months, 3 weeks ago

ddddddddddddddddddddddddddddddddddddddddd

Luffy619
10 months ago

the property of safeguarding the accuracy and completeness of assets.

robdavies66
7 months ago

the property of safeguarding the accuracy and completeness of assets.

robdavies66
6 months, 4 weeks ago

the property of safeguarding the accuracy and completeness of assets.

medmond
6 months, 3 weeks ago

the property of safeguarding the accuracy and completeness of assets.

medmond
6 months, 3 weeks ago

the property of safeguarding the accuracy and completeness of assets

Ndanga
6 months, 2 weeks ago

the property of safeguarding the accuracy and completeness of assets.

ASRARMA
6 months ago

the property of safeguarding the accuracy and completeness of assets.

Mans
5 months, 3 weeks ago

the property that information is not made available or disclosed to unauthorized individuals

Priyachoudhari
5 months, 3 weeks ago

Safeguarding the accuracy and completeness of the assests

ASK
4 months, 3 weeks ago

C. the property that information is not made available or disclosed to unauthorized individuals

grosso62
1 month, 1 week ago

B. the property of safeguarding the accuracy and completeness of assets.

grosso62
3 weeks, 4 days ago

B. the property of safeguarding the accuracy and completeness of assets.


Question 2

-------------------------is an asset like other important business assets has value to an organization and
consequently needs to be protected.

  • A. Infrastructure
  • B. Data
  • C. Information Most Votes
  • D. Security
Mark Question:
Answer:

C


User Votes:
A 7 votes
50%
B 30 votes
50%
C 46 votes
50%
D 3 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
Abansal
1 year, 3 months ago

Information

ashok
12 months ago

Information

robdavies66
7 months ago

Information

robdavies66
6 months, 4 weeks ago

Information

ASRARMA
6 months ago

Information

Mans
5 months, 3 weeks ago

Data is an asset like other important business assets has value to an organization and consequently needs to be protected

Priyachoudhari
5 months, 3 weeks ago

Information

grosso62
1 month, 1 week ago

C. Information

grosso62
3 weeks, 4 days ago

C. Information


Question 3

What is we do in ACT - From PDCA cycle

  • B. Take actions to continually improve process performance Most Votes
  • C. Take actions to continually monitor process performance
  • D. Take actions to continually improve people performance
Mark Question:
Answer:

B


User Votes:
B 58 votes
50%
C 11 votes
50%
D 4 votes
50%
Discussions
vote your answer:
B
C
D
0 / 1000
ashok
12 months ago

Take actions to continually improve process performance

ashok
12 months ago

Take actions to continually improve process performance

robdavies66
7 months ago

Take actions to continually improve process performance

robdavies66
6 months, 4 weeks ago

Take actions to continually improve process performance

ASRARMA
6 months ago

B. Take actions to continually improve process performance

Mans
5 months, 3 weeks ago

Take actions to continually improve process performance

Priyachoudhari
5 months, 3 weeks ago

Continuly improve process performance

grosso62
1 month, 1 week ago

B. Take actions to continually improve process performance

grosso62
3 weeks, 4 days ago

B. Take actions to continually improve process performance


Question 4

Implement plan on a test basis - this comes under which section of PDCA

  • A. Plan
  • B. Do Most Votes
  • C. Act
  • D. Check
Mark Question:
Answer:

B


User Votes:
A 13 votes
50%
B 40 votes
50%
C 12 votes
50%
D 5 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
Abansal
1 year, 3 months ago

The answer is "DO"

ashok
12 months ago

Do Implement plan on a test basis

robdavies66
7 months ago

The answer is B:Do

robdavies66
6 months, 4 weeks ago

B. Do B. Do

ASRARMA
6 months ago

the answer is B. Do

Mans
5 months, 3 weeks ago

Check implement plan on a test basis

Priyachoudhari
5 months, 3 weeks ago

Do under pdca

grosso62
1 month, 1 week ago

This comes under section of PDCA Do


Question 5

Which is the glue that ties the triad together

  • A. Process Most Votes
  • B. People
  • C. Collaboration
  • D. Technology
Mark Question:
Answer:

A


User Votes:
A 33 votes
50%
B 10 votes
50%
C 16 votes
50%
D 10 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
Abansal
1 year, 3 months ago

Process is the glue that triad togather

ashok
12 months ago

Process is the glue that ties the triad together

robdavies66
7 months ago

A Process

robdavies66
6 months, 4 weeks ago

A, Process

ASRARMA
6 months ago

A. Process

Priyachoudhari
5 months, 3 weeks ago

Process is a triad

grosso62
1 month, 1 week ago

A. Process


Question 6

Who are allowed to access highly confidential files?

  • A. Employees with a business need-to-know
  • B. Contractors with a business need-to-know
  • C. Employees with signed NDA have a business need-to-know Most Votes
  • D. Non-employees designated with approved access and have signed NDA
Mark Question:
Answer:

C


User Votes:
A 6 votes
50%
B 2 votes
50%
C 48 votes
50%
D 7 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
Abansal
1 year, 3 months ago

Employee with signed NDA have a business need to know

ashok
12 months ago

Employees with signed NDA have a business need-to-know

ashok
12 months ago

Employees with signed NDA have a business need-to-know

robdavies66
7 months ago

Employees with signed NDA have a business need-to-know

robdavies66
6 months, 4 weeks ago

Employees with signed NDA have a business need-to-know

ASRARMA
6 months ago

C. Employees with signed NDA have a business need-to-know

Priyachoudhari
5 months, 3 weeks ago

Employee with nda

grosso62
1 month, 1 week ago

C. Employees with signed NDA have a business need-to-know


Question 7

Which is not a requirement of HR prior to hiring?

  • A. Undergo background verification
  • B. Applicant must complete pre-employment documentation requirements
  • C. Must undergo Awareness training on information security. Most Votes
  • D. Must successfully pass Background Investigation
Mark Question:
Answer:

C


User Votes:
A
50%
B 4 votes
50%
C 38 votes
50%
D 6 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
ashok
12 months ago

Must undergo Awareness training on information security.

robdavies66
7 months ago

Must undergo Awareness training on information security

robdavies66
6 months, 4 weeks ago

Must undergo Awareness training on information security.

ASRARMA
6 months ago

Must undergo Awareness training on information security.

grosso62
1 month, 1 week ago

C. Must undergo Awareness training on information security.


Question 8

CMM stands for?

  • A. Capability Maturity Matrix
  • B. Capacity Maturity Matrix
  • C. Capability Maturity Model Most Votes
  • D. Capable Mature Model
Mark Question:
Answer:

C


User Votes:
A 6 votes
50%
B 5 votes
50%
C 36 votes
50%
D 2 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
Abansal
1 year, 2 months ago

Capacity Maturity Model

ashok
12 months ago

Capability Maturity Model

robdavies66
7 months ago

Capability Maturity Model

robdavies66
6 months, 4 weeks ago

Capability Maturity Model

ASRARMA
6 months ago

Capability Maturity Model

grosso62
1 month, 1 week ago

C. Capability Maturity Model


Question 9

In acceptable use of Information Assets, which is the best practice?

  • A. Access to information and communication systems are provided for business purpose only Most Votes
  • B. Interfering with or denying service to any user other than the employee's host
  • C. Playing any computer games during office hours
  • D. Accessing phone or network transmissions, including wireless or wifi transmissions
Mark Question:
Answer:

A


User Votes:
A 44 votes
50%
B 3 votes
50%
C 2 votes
50%
D 1 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
Abansal
1 year, 2 months ago

A is the answer

ashok
12 months ago

Access to information and communication systems are provided for business purpose only

robdavies66
7 months ago

Access to information and communication systems are provided for business purpose only

robdavies66
6 months, 4 weeks ago

Access to information and communication systems are provided for business purpose only

ASRARMA
6 months ago

A. Access to information and communication systems are provided for business purpose only

grosso62
1 month, 1 week ago

A. Access to information and communication systems are provided for business purpose only


Question 10

All are prohibited in acceptable use of information assets, except:

  • A. Electronic chain letters
  • B. E-mail copies to non-essential readers
  • C. Company-wide e-mails with supervisor/TL permission. Most Votes
  • D. Messages with very large attachments or to a large number ofrecipients.
Mark Question:
Answer:

C


User Votes:
A 7 votes
50%
B 9 votes
50%
C 30 votes
50%
D 5 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
ashok
12 months ago

Company-wide e-mails with supervisor/TL permission.

ashok
12 months ago

Company-wide e-mails with supervisor/TL permission.

robdavies66
7 months ago

Company-wide e-mails with supervisor/TL permission

robdavies66
6 months, 4 weeks ago

Company-wide e-mails with supervisor/TL permission

ASRARMA
6 months ago

C. Company-wide e-mails with supervisor/TL permission.

grosso62
1 month, 1 week ago

C. Company-wide e-mails with supervisor/TL permission.


Question 11

Information Security is a matter of building and maintaining ________ .

  • A. Confidentiality
  • B. Trust Most Votes
  • C. Protection
  • D. Firewalls
Mark Question:
Answer:

B


User Votes:
A 24 votes
50%
B 28 votes
50%
C 9 votes
50%
D 2 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
ashok
12 months ago

Information Security is a matter of building and maintaining Trust

robdavies66
7 months ago

B. Trust trust

robdavies66
6 months, 4 weeks ago

B trust b trust

robdavies66
6 months, 4 weeks ago

B. Trust B. Trust

grosso62
1 month, 1 week ago

A. Confidentiality


Question 12

Phishing is what type of Information Security Incident?

  • A. Private Incidents
  • B. Cracker/Hacker Attacks Most Votes
  • C. Technical Vulnerabilities
  • D. Legal Incidents
Mark Question:
Answer:

B


User Votes:
A 6 votes
50%
B 40 votes
50%
C 8 votes
50%
D 1 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
ashok
12 months ago

Cracker/Hacker Attacks

ashok
12 months ago

Cracker/Hacker Attacks

robdavies66
7 months ago

Cracker/Hacker Attacks

robdavies66
6 months, 4 weeks ago

Cracker/Hacker Attacks

robdavies66
6 months, 4 weeks ago

Cracker/Hacker Attacks

ASRARMA
6 months ago

B. Cracker/Hacker Attacks

grosso62
1 month, 1 week ago

B. Cracker/Hacker Attacks


Question 13

The following are the guidelines to protect your password, except: 

  • A. Don't use the same password for various company system security access
  • B. Do not share passwords with anyone Most Votes
  • C. For easy recall, use the same password for company and personal accounts Most Votes
  • D. Change a temporary password on first log-on
Mark Question:
Answer:

B,C


User Votes:
A 2 votes
50%
B 14 votes
50%
C 35 votes
50%
D 1 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
ashok
12 months ago

For easy recall, use the same password for company and personal accounts

robdavies66
7 months ago

For easy recall, use the same password for company and personal accounts

robdavies66
6 months, 4 weeks ago

For easy recall, use the same password for company and personal accounts

robdavies66
6 months, 4 weeks ago

For easy recall, use the same password for company and personal accounts

maximea
3 months ago

Utiliser le même mot de passe pour les comptes de l'entreprise et les comptes personnels n'est pas recommandé car cela augmente le risque de compromission de la sécurité.

grosso62
1 month, 1 week ago

D. Change a temporary password on first log-on


Question 14

The following are purposes of Information Security, except:

  • A. Ensure Business Continuity
  • B. Minimize Business Risk
  • C. Increase Business Assets Most Votes
  • D. Maximize Return on Investment
Mark Question:
Answer:

C


User Votes:
A 1 votes
50%
B 7 votes
50%
C 33 votes
50%
D 20 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
ashok
12 months ago

Increase Business Assets

robdavies66
7 months ago

Increase Business Assets

robdavies66
6 months, 4 weeks ago

Increase Business Assets

robdavies66
6 months, 4 weeks ago

Increase Business Assets

robdavies66
6 months, 4 weeks ago

Increase Business Assets

ASRARMA
6 months ago

C. Increase Business Assets

maximea
3 months ago

n'est pas un objectif direct de la sécurité de l'information

grosso62
1 month, 1 week ago

D. Maximize Return on Investment


Question 15

Which of the following is not a type of Information Security attack?

  • A. Legal Incidents
  • B. Vehicular Incidents Most Votes
  • C. Technical Vulnerabilities
  • D. Privacy Incidents
Mark Question:
Answer:

B


User Votes:
A 6 votes
50%
B 36 votes
50%
C 4 votes
50%
D 4 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
Abansal
1 year, 3 months ago

Vehicular incident

Abansal
1 year, 2 months ago

Vehicular Incidents

ashok
12 months ago

Vehicular Incidents

robdavies66
7 months ago

Vehicular Incidents

robdavies66
7 months ago

Vehicular Incidents

robdavies66
6 months, 4 weeks ago

Vehicular Incidents

robdavies66
6 months, 4 weeks ago

Vehicular Incidents

robdavies66
6 months, 4 weeks ago

Vehicular Incidents

ASRARMA
6 months ago

B. Vehicular Incidents

ASK
4 months, 3 weeks ago

Vehicular Incidents

maximea
3 months ago

B. Vehicular Incidents

grosso62
1 month, 1 week ago

B. Vehicular Incidents

To page 2