This page was exported from Best Free Exam Guide [ http://free.exams4sures.com ] Export date:Sat Mar 15 8:08:04 2025 / +0000 GMT ___________________________________________________ Title: [Jul 25, 2022] ISO-IEC-27001-Lead-Auditor Exam Dumps - 100% Marks In ISO-IEC-27001-Lead-Auditor Exam! [Q35-Q56] --------------------------------------------------- [Jul 25, 2022] ISO-IEC-27001-Lead-Auditor Exam Dumps - 100% Marks In ISO-IEC-27001-Lead-Auditor Exam! Exam Dumps Use Real ISO 27001 Dumps With 99 Questions! PECB ISO-IEC-27001-Lead-Auditor Exam Syllabus Topics: TopicDetailsTopic 1Explain the fundamental concepts and principles of an information security management system (ISMS) based on ISOIEC 27001Topic 2Fundamental audit concepts and principles Fundamental principles and concepts of Information Security Management System (ISMS)Topic 3Managing an ISOIEC 27001 audit program Preparation, Conducting, Closing of an ISOIEC 27001 auditTopic 4Evaluate the ISMS conformity to ISOIEC 27001 requirements, in accordance with the fundamental audit concepts and principlesTopic 5Interpret the ISOIEC 27001 requirements for an ISMS from the perspective of an auditor Information Security Management System (ISMS)   NEW QUESTION 35A decent visitor is roaming around without visitor’s ID. As an employee you should do the following, except:  Say “hi” and offer coffee  Call the receptionist and inform about the visitor  Greet and ask him what is his business  Escort him to his destination NEW QUESTION 36Which of the following factors does NOT contribute to the value of data for an organisation?  The correctness of data  The indispensability of data  The importance of data for processes  The content of data NEW QUESTION 37We can leave laptops during weekdays or weekends in locked bins.  True  False NEW QUESTION 38How are data and information related?  Data is a collection of structured and unstructured information  Information consists of facts and statistics collected together for reference or analysis  When meaning and value are assigned to data, it becomes information NEW QUESTION 39In what part of the process to grant access to a system does the user present a token?  Authorisation  Verification  Authentication  Identification NEW QUESTION 40A member of staff denies sending a particular message.Which reliability aspect of information is in danger here?  availability  correctness  integrity  confidentiality NEW QUESTION 41A well-executed risk analysis provides a great deal of useful information. A risk analysis has four main objectives.What is not one of the four main objectives of a risk analysis?  Identifying assets and their value  Implementing counter measures  Establishing a balance between the costs of an incident and the costs of a security measure  Determining relevant vulnerabilities and threats NEW QUESTION 42Which threat could occur if no physical measures are taken?  Unauthorised persons viewing sensitive files  Confidential prints being left on the printer  A server shutting down because of overheating  Hackers entering the corporate network NEW QUESTION 43CEO sends a mail giving his views on the status of the company and the company’s future strategy and the CEO’s vision and the employee’s part in it. The mail should be classified as  Internal Mail  Public Mail  Confidential Mail  Restricted Mail NEW QUESTION 44Which of the following is a possible event that can have a disruptive effect on the reliability of information?  Threat  Risk  Vulnerability  Dependency NEW QUESTION 45A couple of years ago you started your company which has now grown from 1 to 20 employees. Your company’s information is worth more and more and gone are the days when you could keep control yourself.You are aware that you have to take measures, but what should they be? You hire a consultant who advises you to start with a qualitative risk analysis.What is a qualitative risk analysis?  This analysis follows a precise statistical probability calculation in order to calculate exact loss caused by damage.  This analysis is based on scenarios and situations and produces a subjective view of the possible threats. NEW QUESTION 46What is a definition of compliance?  Laws, considered collectively or the process of making or enacting laws  The state or fact of according with or meeting rules or standards  An official or authoritative instruction  A rule or directive made and maintained by an authority. NEW QUESTION 47Which of the following is a technical security measure?  Encryption  Security policy  Safe storage of backups  User role profiles. NEW QUESTION 48You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called  Shoulder Surfing  Mountaineering  Phishing  Spoofing NEW QUESTION 49All are prohibited in acceptable use of information assets, except:  Electronic chain letters  E-mail copies to non-essential readers  Company-wide e-mails with supervisor/TL permission.  Messages with very large attachments or to a large number ofrecipients. NEW QUESTION 50Which is not a requirement of HR prior to hiring?  Undergo background verification  Applicant must complete pre-employment documentation requirements  Must undergo Awareness training on information security.  Must successfully pass Background Investigation NEW QUESTION 51Which measure is a preventive measure?  Installing a logging system that enables changes in a system to be recognized  Shutting down all internet traffic after a hacker has gained access to the company systems  Putting sensitive information in a safe NEW QUESTION 52What type of system ensures a coherent Information Security organisation?  Federal Information Security Management Act (FISMA)  Information Technology Service Management System (ITSM)  Information Security Management System (ISMS)  Information Exchange Data System (IEDS) NEW QUESTION 53Which reliability aspect of information is compromised when a staff member denies having sent a message?  Confidentiality  Integrity  Availability  Correctness NEW QUESTION 54Information or data that are classified as ______ do not require labeling.  Public  Internal  Confidential  Highly Confidential NEW QUESTION 55There is a network printer in the hallway of the company where you work. Many employees don’t pick up their printouts immediately and leave them on the printer.What are the consequences of this to the reliability of the information?  The integrity of the information is no longer guaranteed.  The availability of the information is no longer guaranteed.  The confidentiality of the information is no longer guaranteed.  The Security of the information is no longer guaranteed. NEW QUESTION 56What type of compliancy standard, regulation or legislation provides a code of practice for information security?  ISO/IEC 27002  Personal data protection act  Computer criminality act  IT Service Management  Loading … Pass Your ISO-IEC-27001-Lead-Auditor Exam Easily With 100% Exam Passing Guarantee: https://www.exams4sures.com/PECB/ISO-IEC-27001-Lead-Auditor-practice-exam-dumps.html --------------------------------------------------- Images: https://free.exams4sures.com/wp-content/plugins/watu/loading.gif https://free.exams4sures.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2022-07-25 10:30:03 Post date GMT: 2022-07-25 10:30:03 Post modified date: 2022-07-25 10:30:03 Post modified date GMT: 2022-07-25 10:30:03