PECB iso iec 27001 lead auditor practice test

Answers ISO/IEC 27001 Lead Auditor Exam

Last exam update: Dec 03 ,2023
Page 1 out of 6
Viewing questions 1-15 out of 100

Question 1

Information Security is a matter of building and maintaining ________ .

  • A. Confidentiality
  • B. Trust
  • C. Protection
  • D. Firewalls
Answer:

B

Discussions
0 / 1000

Question 2

Phishing is what type of Information Security Incident?

  • A. Private Incidents
  • B. Cracker/Hacker Attacks
  • C. Technical Vulnerabilities
  • D. Legal Incidents
Answer:

B

Discussions
0 / 1000

Question 3

The following are the guidelines to protect your password, except: 

  • A. Don't use the same password for various company system security access
  • B. Do not share passwords with anyone
  • C. For easy recall, use the same password for company and personal accounts
  • D. Change a temporary password on first log-on
Answer:

B,C

Discussions
0 / 1000

Question 4

The following are purposes of Information Security, except:

  • A. Ensure Business Continuity
  • B. Minimize Business Risk
  • C. Increase Business Assets
  • D. Maximize Return on Investment
Answer:

C

Discussions
0 / 1000

Question 5

Which of the following is not a type of Information Security attack?

  • A. Legal Incidents
  • B. Vehicular Incidents
  • C. Technical Vulnerabilities
  • D. Privacy Incidents
Answer:

B

Discussions
0 / 1000

Question 6

A decent visitor is roaming around without visitor's ID. As an employee you should do the following,
except:

  • A. Say "hi" and offer coffee
  • B. Call the receptionist and inform about the visitor
  • C. Greet and ask him what is his business
  • D. Escort him to his destination
Answer:

A

Discussions
0 / 1000

Question 7

Stages of Information 

  • A. creation, evolution, maintenance, use, disposition
  • B. creation, use, disposition, maintenance, evolution
  • C. creation, distribution, use, maintenance, disposition 
  • D. creation, distribution, maintenance, disposition, use
Answer:

C

Discussions
0 / 1000

Question 8

A property of Information that has the ability to prove occurrence of a claimed event.

  • A. Electronic chain letters 
  • B. Integrity
  • C. Availability
  • D. Accessibility
Answer:

B

Discussions
0 / 1000

Question 9

Information or data that are classified as ______ do not require labeling.

  • A. Public
  • B. Internal
  • C. Confidential
  • D. Highly Confidential
Answer:

A

Discussions
0 / 1000

Question 10

What is the standard definition of ISMS? 

  • A. Is an information security systematic approach to achieve business objectives for implementation, establishing, reviewing,operating and maintaining organization's reputation.
  • B. A company wide business objectives to achieve information security awareness for establishing, implementing, operating, monitoring, reviewing, maintaining and improving C. A project-based approach to achieve business objectives for establishing, implementing,operating, monitoring, reviewing, maintaining and improving an organizations information security
  • D. A systematic approach for establishing, implementing, operating,monitoring, reviewing, maintainingand improving an organizations information security to achieve business objectives.
Answer:

D

Discussions
0 / 1000

Question 11

In the event of an Information security incident, system users' roles and responsibilities are to be
observed, except:

  • A. Report suspected or known incidents upon discovery through the Servicedesk
  • B. Preserve evidence if necessary
  • C. Cooperate with investigative personnel during investigation if needed
  • D. Make the information security incident details known to all employees
Answer:

D

Discussions
0 / 1000

Question 12

The following are definitions of Information, except:

  • A. accurate and timely data
  • B. specific and organized data for a purpose
  • C. mature and measurable data
  • D. can lead to understanding and decrease in uncertainty
Answer:

C

Discussions
0 / 1000

Question 13

You receive the following mail from the IT support team: Dear User,Starting next week, we will be
deleting all inactive email accounts in order tocreate spaceshare the below details in order to
continue using your account. In case ofno response,
Name:
Email ID:
Password:
DOB:
Kindly contact the webmail team for any further support. Thanks for your attention.
Which of the following is the best response?

  • A. Ignore the email
  • B. Respond it by saying that one should not share the password with anyone
  • C. One should not respond to these mails and report such email to your supervisor 
Answer:

C

Discussions
0 / 1000

Question 14

You have a hard copy of a customer design document that you want to dispose off. What would you
do

  • A. Throw it in any dustbin
  • B. Shred it using a shredder
  • C. Give it to the office boy to reuse it for other purposes
  • D. Be environment friendly and reuse it for writing
Answer:

B

Discussions
0 / 1000

Question 15

Integrity of data means

  • A. Accuracy and completeness of the data
  • B. Data should be viewable at all times
  • C. Data should be accessed by only the right people
Answer:

A

Discussions
0 / 1000
To page 2