PECB iso iec 27001 lead auditor practice test

ISO/IEC 27001 Lead Auditor Exam

Last exam update: Oct 17 ,2024
Page 1 out of 7. Viewing questions 1-15 out of 100

Question 1

Below is Purpose of "Integrity", which is one of the Basic Components of Information Security

  • B. the property of safeguarding the accuracy and completeness of assets. Most Votes
  • C. the property that information is not made available or disclosed to unauthorized individuals
  • D. the property of being accessible and usable upon demand by an authorized entity.
Mark Question:
Answer:

B


User Votes:
B 51 votes
50%
C 7 votes
50%
D 5 votes
50%
Discussions
vote your answer:
B
C
D
0 / 1000
ashok
8 months, 1 week ago

the property of safeguarding the accuracy and completeness of assets.

ashok
8 months, 1 week ago

the property of safeguarding the accuracy and completeness of assets

ashgu
8 months ago

ddddddddddddddddddddddddddddddddddddddddd

Luffy619
6 months, 1 week ago

the property of safeguarding the accuracy and completeness of assets.

robdavies66
3 months, 2 weeks ago

the property of safeguarding the accuracy and completeness of assets.

robdavies66
3 months, 1 week ago

the property of safeguarding the accuracy and completeness of assets.

medmond
3 months ago

the property of safeguarding the accuracy and completeness of assets.

medmond
3 months ago

the property of safeguarding the accuracy and completeness of assets

Ndanga
2 months, 3 weeks ago

the property of safeguarding the accuracy and completeness of assets.

ASRARMA
2 months, 1 week ago

the property of safeguarding the accuracy and completeness of assets.

Mans
2 months ago

the property that information is not made available or disclosed to unauthorized individuals

Priyachoudhari
2 months ago

Safeguarding the accuracy and completeness of the assests

ASK
1 month, 1 week ago

C. the property that information is not made available or disclosed to unauthorized individuals


Question 2

-------------------------is an asset like other important business assets has value to an organization and
consequently needs to be protected.

  • A. Infrastructure
  • B. Data
  • C. Information Most Votes
  • D. Security
Mark Question:
Answer:

C


User Votes:
A 6 votes
50%
B 22 votes
50%
C 37 votes
50%
D 3 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
Abansal
12 months ago

Information

ashok
8 months, 1 week ago

Information

robdavies66
3 months, 2 weeks ago

Information

robdavies66
3 months, 1 week ago

Information

ASRARMA
2 months, 1 week ago

Information

Mans
2 months ago

Data is an asset like other important business assets has value to an organization and consequently needs to be protected

Priyachoudhari
2 months ago

Information


Question 3

What is we do in ACT - From PDCA cycle

  • B. Take actions to continually improve process performance Most Votes
  • C. Take actions to continually monitor process performance
  • D. Take actions to continually improve people performance
Mark Question:
Answer:

B


User Votes:
B 47 votes
50%
C 7 votes
50%
D 4 votes
50%
Discussions
vote your answer:
B
C
D
0 / 1000
ashok
8 months, 1 week ago

Take actions to continually improve process performance

ashok
8 months, 1 week ago

Take actions to continually improve process performance

robdavies66
3 months, 2 weeks ago

Take actions to continually improve process performance

robdavies66
3 months, 1 week ago

Take actions to continually improve process performance

ASRARMA
2 months, 1 week ago

B. Take actions to continually improve process performance

Mans
2 months ago

Take actions to continually improve process performance

Priyachoudhari
2 months ago

Continuly improve process performance


Question 4

Implement plan on a test basis - this comes under which section of PDCA

  • A. Plan
  • B. Do Most Votes
  • C. Act
  • D. Check
Mark Question:
Answer:

B


User Votes:
A 10 votes
50%
B 34 votes
50%
C 9 votes
50%
D 5 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
Abansal
12 months ago

The answer is "DO"

ashok
8 months, 1 week ago

Do Implement plan on a test basis

robdavies66
3 months, 2 weeks ago

The answer is B:Do

robdavies66
3 months, 1 week ago

B. Do B. Do

ASRARMA
2 months, 1 week ago

the answer is B. Do

Mans
2 months ago

Check implement plan on a test basis

Priyachoudhari
2 months ago

Do under pdca


Question 5

Which is the glue that ties the triad together

  • A. Process Most Votes
  • B. People
  • C. Collaboration
  • D. Technology
Mark Question:
Answer:

A


User Votes:
A 25 votes
50%
B 9 votes
50%
C 13 votes
50%
D 10 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
Abansal
12 months ago

Process is the glue that triad togather

ashok
8 months, 1 week ago

Process is the glue that ties the triad together

robdavies66
3 months, 2 weeks ago

A Process

robdavies66
3 months, 1 week ago

A, Process

ASRARMA
2 months, 1 week ago

A. Process

Priyachoudhari
2 months ago

Process is a triad


Question 6

Who are allowed to access highly confidential files?

  • A. Employees with a business need-to-know
  • B. Contractors with a business need-to-know
  • C. Employees with signed NDA have a business need-to-know Most Votes
  • D. Non-employees designated with approved access and have signed NDA
Mark Question:
Answer:

C


User Votes:
A 5 votes
50%
B 1 votes
50%
C 38 votes
50%
D 7 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
Abansal
12 months ago

Employee with signed NDA have a business need to know

ashok
8 months, 1 week ago

Employees with signed NDA have a business need-to-know

ashok
8 months, 1 week ago

Employees with signed NDA have a business need-to-know

robdavies66
3 months, 2 weeks ago

Employees with signed NDA have a business need-to-know

robdavies66
3 months, 1 week ago

Employees with signed NDA have a business need-to-know

ASRARMA
2 months, 1 week ago

C. Employees with signed NDA have a business need-to-know

Priyachoudhari
2 months ago

Employee with nda


Question 7

Which is not a requirement of HR prior to hiring?

  • A. Undergo background verification
  • B. Applicant must complete pre-employment documentation requirements
  • C. Must undergo Awareness training on information security. Most Votes
  • D. Must successfully pass Background Investigation
Mark Question:
Answer:

C


User Votes:
A
50%
B 3 votes
50%
C 31 votes
50%
D 4 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
ashok
8 months, 1 week ago

Must undergo Awareness training on information security.

robdavies66
3 months, 2 weeks ago

Must undergo Awareness training on information security

robdavies66
3 months, 1 week ago

Must undergo Awareness training on information security.

ASRARMA
2 months, 1 week ago

Must undergo Awareness training on information security.


Question 8

CMM stands for?

  • A. Capability Maturity Matrix
  • B. Capacity Maturity Matrix
  • C. Capability Maturity Model Most Votes
  • D. Capable Mature Model
Mark Question:
Answer:

C


User Votes:
A 6 votes
50%
B 3 votes
50%
C 28 votes
50%
D 2 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
Abansal
11 months, 1 week ago

Capacity Maturity Model

ashok
8 months, 1 week ago

Capability Maturity Model

robdavies66
3 months, 2 weeks ago

Capability Maturity Model

robdavies66
3 months, 1 week ago

Capability Maturity Model

ASRARMA
2 months, 1 week ago

Capability Maturity Model


Question 9

In acceptable use of Information Assets, which is the best practice?

  • A. Access to information and communication systems are provided for business purpose only Most Votes
  • B. Interfering with or denying service to any user other than the employee's host
  • C. Playing any computer games during office hours
  • D. Accessing phone or network transmissions, including wireless or wifi transmissions
Mark Question:
Answer:

A


User Votes:
A 33 votes
50%
B 3 votes
50%
C 2 votes
50%
D 1 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
Abansal
11 months, 1 week ago

A is the answer

ashok
8 months, 1 week ago

Access to information and communication systems are provided for business purpose only

robdavies66
3 months, 2 weeks ago

Access to information and communication systems are provided for business purpose only

robdavies66
3 months, 1 week ago

Access to information and communication systems are provided for business purpose only

ASRARMA
2 months, 1 week ago

A. Access to information and communication systems are provided for business purpose only


Question 10

All are prohibited in acceptable use of information assets, except:

  • A. Electronic chain letters
  • B. E-mail copies to non-essential readers
  • C. Company-wide e-mails with supervisor/TL permission. Most Votes
  • D. Messages with very large attachments or to a large number ofrecipients.
Mark Question:
Answer:

C


User Votes:
A 5 votes
50%
B 8 votes
50%
C 23 votes
50%
D 5 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
ashok
8 months, 1 week ago

Company-wide e-mails with supervisor/TL permission.

ashok
8 months, 1 week ago

Company-wide e-mails with supervisor/TL permission.

robdavies66
3 months, 2 weeks ago

Company-wide e-mails with supervisor/TL permission

robdavies66
3 months, 1 week ago

Company-wide e-mails with supervisor/TL permission

ASRARMA
2 months, 1 week ago

C. Company-wide e-mails with supervisor/TL permission.


Question 11

Information Security is a matter of building and maintaining ________ .

  • A. Confidentiality
  • B. Trust Most Votes
  • C. Protection
  • D. Firewalls
Mark Question:
Answer:

B


User Votes:
A 19 votes
50%
B 21 votes
50%
C 6 votes
50%
D 2 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
ashok
8 months, 1 week ago

Information Security is a matter of building and maintaining Trust

robdavies66
3 months, 2 weeks ago

B. Trust trust

robdavies66
3 months, 1 week ago

B trust b trust

robdavies66
3 months, 1 week ago

B. Trust B. Trust


Question 12

Phishing is what type of Information Security Incident?

  • A. Private Incidents
  • B. Cracker/Hacker Attacks Most Votes
  • C. Technical Vulnerabilities
  • D. Legal Incidents
Mark Question:
Answer:

B


User Votes:
A 6 votes
50%
B 30 votes
50%
C 6 votes
50%
D 1 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
ashok
8 months, 1 week ago

Cracker/Hacker Attacks

ashok
8 months, 1 week ago

Cracker/Hacker Attacks

robdavies66
3 months, 2 weeks ago

Cracker/Hacker Attacks

robdavies66
3 months, 1 week ago

Cracker/Hacker Attacks

robdavies66
3 months, 1 week ago

Cracker/Hacker Attacks

ASRARMA
2 months, 1 week ago

B. Cracker/Hacker Attacks


Question 13

The following are the guidelines to protect your password, except: 

  • A. Don't use the same password for various company system security access
  • B. Do not share passwords with anyone Most Votes
  • C. For easy recall, use the same password for company and personal accounts Most Votes
  • D. Change a temporary password on first log-on
Mark Question:
Answer:

B,C


User Votes:
A 1 votes
50%
B 12 votes
50%
C 26 votes
50%
D 1 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
ashok
8 months, 1 week ago

For easy recall, use the same password for company and personal accounts

robdavies66
3 months, 2 weeks ago

For easy recall, use the same password for company and personal accounts

robdavies66
3 months, 1 week ago

For easy recall, use the same password for company and personal accounts

robdavies66
3 months, 1 week ago

For easy recall, use the same password for company and personal accounts


Question 14

The following are purposes of Information Security, except:

  • A. Ensure Business Continuity
  • B. Minimize Business Risk
  • C. Increase Business Assets Most Votes
  • D. Maximize Return on Investment
Mark Question:
Answer:

C


User Votes:
A 1 votes
50%
B 6 votes
50%
C 24 votes
50%
D 17 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
ashok
8 months, 1 week ago

Increase Business Assets

robdavies66
3 months, 2 weeks ago

Increase Business Assets

robdavies66
3 months, 1 week ago

Increase Business Assets

robdavies66
3 months, 1 week ago

Increase Business Assets

robdavies66
3 months, 1 week ago

Increase Business Assets

ASRARMA
2 months, 1 week ago

C. Increase Business Assets


Question 15

Which of the following is not a type of Information Security attack?

  • A. Legal Incidents
  • B. Vehicular Incidents Most Votes
  • C. Technical Vulnerabilities
  • D. Privacy Incidents
Mark Question:
Answer:

B


User Votes:
A 5 votes
50%
B 27 votes
50%
C 2 votes
50%
D 4 votes
50%
Discussions
vote your answer:
A
B
C
D
0 / 1000
Abansal
12 months ago

Vehicular incident

Abansal
11 months, 1 week ago

Vehicular Incidents

ashok
8 months, 1 week ago

Vehicular Incidents

robdavies66
3 months, 2 weeks ago

Vehicular Incidents

robdavies66
3 months, 2 weeks ago

Vehicular Incidents

robdavies66
3 months, 1 week ago

Vehicular Incidents

robdavies66
3 months, 1 week ago

Vehicular Incidents

robdavies66
3 months, 1 week ago

Vehicular Incidents

ASRARMA
2 months, 1 week ago

B. Vehicular Incidents

ASK
1 month, 1 week ago

Vehicular Incidents

To page 2