PECB iso iec 27001 lead auditor practice test

ISO/IEC 27001 Lead Auditor Exam

Last exam update: Jul 20 ,2024
Page 1 out of 7. Viewing questions 1-15 out of 100

Question 1

Below is Purpose of "Integrity", which is one of the Basic Components of Information Security

  • B. the property of safeguarding the accuracy and completeness of assets.
  • C. the property that information is not made available or disclosed to unauthorized individuals
  • D. the property of being accessible and usable upon demand by an authorized entity.
Mark Question:
Answer:

B

User Votes:
B 29 votes
50%
C 1 votes
50%
D 2 votes
50%

Discussions
vote your answer:
B
C
D
0 / 1000
ashok
5 months, 1 week ago

the property of safeguarding the accuracy and completeness of assets.

ashok
5 months, 1 week ago

the property of safeguarding the accuracy and completeness of assets

ashgu
5 months ago

ddddddddddddddddddddddddddddddddddddddddd

Luffy619
3 months, 2 weeks ago

the property of safeguarding the accuracy and completeness of assets.

2 weeks, 3 days ago

the property of safeguarding the accuracy and completeness of assets.

1 week, 2 days ago

the property of safeguarding the accuracy and completeness of assets.


Question 2

-------------------------is an asset like other important business assets has value to an organization and
consequently needs to be protected.

  • A. Infrastructure
  • B. Data
  • C. Information
  • D. Security
Mark Question:
Answer:

C

User Votes:
A 5 votes
50%
B 13 votes
50%
C 20 votes
50%
D 1 votes
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000
Abansal
9 months ago

Information

ashok
5 months, 1 week ago

Information

2 weeks, 3 days ago

Information

1 week, 2 days ago

Information


Question 3

What is we do in ACT - From PDCA cycle

  • B. Take actions to continually improve process performance
  • C. Take actions to continually monitor process performance
  • D. Take actions to continually improve people performance
Mark Question:
Answer:

B

User Votes:
B 28 votes
50%
C 3 votes
50%
D 2 votes
50%

Discussions
vote your answer:
B
C
D
0 / 1000
ashok
5 months, 1 week ago

Take actions to continually improve process performance

ashok
5 months, 1 week ago

Take actions to continually improve process performance

2 weeks, 3 days ago

Take actions to continually improve process performance

1 week, 2 days ago

Take actions to continually improve process performance


Question 4

Implement plan on a test basis - this comes under which section of PDCA

  • A. Plan
  • B. Do
  • C. Act
  • D. Check
Mark Question:
Answer:

B

User Votes:
A 7 votes
50%
B 20 votes
50%
C 5 votes
50%
D 2 votes
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000
Abansal
9 months ago

The answer is "DO"

ashok
5 months, 1 week ago

Do Implement plan on a test basis

2 weeks, 3 days ago

The answer is B:Do

1 week, 2 days ago

B. Do B. Do


Question 5

Which is the glue that ties the triad together

  • A. Process
  • B. People
  • C. Collaboration
  • D. Technology
Mark Question:
Answer:

A

User Votes:
A 12 votes
50%
B 4 votes
50%
C 7 votes
50%
D 7 votes
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000
Abansal
9 months ago

Process is the glue that triad togather

ashok
5 months, 1 week ago

Process is the glue that ties the triad together

2 weeks, 3 days ago

A Process

1 week, 2 days ago

A, Process


Question 6

Who are allowed to access highly confidential files?

  • A. Employees with a business need-to-know
  • B. Contractors with a business need-to-know
  • C. Employees with signed NDA have a business need-to-know
  • D. Non-employees designated with approved access and have signed NDA
Mark Question:
Answer:

C

User Votes:
A 2 votes
50%
B 1 votes
50%
C 22 votes
50%
D 3 votes
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000
Abansal
9 months ago

Employee with signed NDA have a business need to know

ashok
5 months, 1 week ago

Employees with signed NDA have a business need-to-know

ashok
5 months, 1 week ago

Employees with signed NDA have a business need-to-know

2 weeks, 3 days ago

Employees with signed NDA have a business need-to-know

1 week, 2 days ago

Employees with signed NDA have a business need-to-know


Question 7

Which is not a requirement of HR prior to hiring?

  • A. Undergo background verification
  • B. Applicant must complete pre-employment documentation requirements
  • C. Must undergo Awareness training on information security.
  • D. Must successfully pass Background Investigation
Mark Question:
Answer:

C

User Votes:
A
50%
B 2 votes
50%
C 16 votes
50%
D 2 votes
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000
ashok
5 months, 1 week ago

Must undergo Awareness training on information security.

2 weeks, 3 days ago

Must undergo Awareness training on information security

1 week, 2 days ago

Must undergo Awareness training on information security.


Question 8

CMM stands for?

  • A. Capability Maturity Matrix
  • B. Capacity Maturity Matrix
  • C. Capability Maturity Model
  • D. Capable Mature Model
Mark Question:
Answer:

C

User Votes:
A 5 votes
50%
B 1 votes
50%
C 13 votes
50%
D 2 votes
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000
Abansal
8 months, 1 week ago

Capacity Maturity Model

ashok
5 months, 1 week ago

Capability Maturity Model

2 weeks, 3 days ago

Capability Maturity Model

1 week, 2 days ago

Capability Maturity Model


Question 9

In acceptable use of Information Assets, which is the best practice?

  • A. Access to information and communication systems are provided for business purpose only
  • B. Interfering with or denying service to any user other than the employee's host
  • C. Playing any computer games during office hours
  • D. Accessing phone or network transmissions, including wireless or wifi transmissions
Mark Question:
Answer:

A

User Votes:
A 19 votes
50%
B 1 votes
50%
C 1 votes
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000
Abansal
8 months, 1 week ago

A is the answer

ashok
5 months, 1 week ago

Access to information and communication systems are provided for business purpose only

2 weeks, 3 days ago

Access to information and communication systems are provided for business purpose only

1 week, 2 days ago

Access to information and communication systems are provided for business purpose only


Question 10

All are prohibited in acceptable use of information assets, except:

  • A. Electronic chain letters
  • B. E-mail copies to non-essential readers
  • C. Company-wide e-mails with supervisor/TL permission.
  • D. Messages with very large attachments or to a large number ofrecipients.
Mark Question:
Answer:

C

User Votes:
A 3 votes
50%
B 5 votes
50%
C 12 votes
50%
D 1 votes
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000
ashok
5 months, 1 week ago

Company-wide e-mails with supervisor/TL permission.

ashok
5 months, 1 week ago

Company-wide e-mails with supervisor/TL permission.

2 weeks, 3 days ago

Company-wide e-mails with supervisor/TL permission

1 week, 2 days ago

Company-wide e-mails with supervisor/TL permission


Question 11

Information Security is a matter of building and maintaining ________ .

  • A. Confidentiality
  • B. Trust
  • C. Protection
  • D. Firewalls
Mark Question:
Answer:

B

User Votes:
A 9 votes
50%
B 10 votes
50%
C 5 votes
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000
ashok
5 months, 1 week ago

Information Security is a matter of building and maintaining Trust

2 weeks, 3 days ago

B. Trust trust

1 week, 2 days ago

B trust b trust

1 week, 2 days ago

B. Trust B. Trust


Question 12

Phishing is what type of Information Security Incident?

  • A. Private Incidents
  • B. Cracker/Hacker Attacks
  • C. Technical Vulnerabilities
  • D. Legal Incidents
Mark Question:
Answer:

B

User Votes:
A 4 votes
50%
B 19 votes
50%
C 1 votes
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000
ashok
5 months, 1 week ago

Cracker/Hacker Attacks

ashok
5 months, 1 week ago

Cracker/Hacker Attacks

2 weeks, 3 days ago

Cracker/Hacker Attacks

1 week, 2 days ago

Cracker/Hacker Attacks

1 week, 2 days ago

Cracker/Hacker Attacks


Question 13

The following are the guidelines to protect your password, except: 

  • A. Don't use the same password for various company system security access
  • B. Do not share passwords with anyone
  • C. For easy recall, use the same password for company and personal accounts
  • D. Change a temporary password on first log-on
Mark Question:
Answer:

B,C

User Votes:
A
50%
B 6 votes
50%
C 18 votes
50%
D 1 votes
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000
ashok
5 months, 1 week ago

For easy recall, use the same password for company and personal accounts

2 weeks, 3 days ago

For easy recall, use the same password for company and personal accounts

1 week, 2 days ago

For easy recall, use the same password for company and personal accounts

1 week, 2 days ago

For easy recall, use the same password for company and personal accounts


Question 14

The following are purposes of Information Security, except:

  • A. Ensure Business Continuity
  • B. Minimize Business Risk
  • C. Increase Business Assets
  • D. Maximize Return on Investment
Mark Question:
Answer:

C

User Votes:
A
50%
B 2 votes
50%
C 15 votes
50%
D 12 votes
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000
ashok
5 months, 1 week ago

Increase Business Assets

2 weeks, 3 days ago

Increase Business Assets

1 week, 2 days ago

Increase Business Assets

1 week, 2 days ago

Increase Business Assets

1 week, 2 days ago

Increase Business Assets


Question 15

Which of the following is not a type of Information Security attack?

  • A. Legal Incidents
  • B. Vehicular Incidents
  • C. Technical Vulnerabilities
  • D. Privacy Incidents
Mark Question:
Answer:

B

User Votes:
A 2 votes
50%
B 16 votes
50%
C 2 votes
50%
D 4 votes
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000
Abansal
9 months ago

Vehicular incident

Abansal
8 months, 1 week ago

Vehicular Incidents

ashok
5 months, 1 week ago

Vehicular Incidents

2 weeks, 3 days ago

Vehicular Incidents

2 weeks, 1 day ago

Vehicular Incidents

1 week, 2 days ago

Vehicular Incidents

1 week, 2 days ago

Vehicular Incidents

1 week, 2 days ago

Vehicular Incidents

To page 2