This page was exported from Exams Labs Braindumps [ http://blog.examslabs.com ] Export date:Thu Nov 21 10:07:01 2024 / +0000 GMT ___________________________________________________ Title: New PECB ISO-IEC-27001-Lead-Auditor Dumps & Questions Updated on 2023 [Q57-Q81] --------------------------------------------------- New PECB ISO-IEC-27001-Lead-Auditor Dumps & Questions Updated on 2023 Dumps to Pass your ISO-IEC-27001-Lead-Auditor Exam with 100% Real Questions and Answers PECB ISO-IEC-27001-Lead-Auditor Exam Syllabus Topics: TopicDetailsTopic 1Evaluate the ISMS conformity to ISOIEC 27001 requirements, in accordance with the fundamental audit concepts and principlesTopic 2Interpret the ISOIEC 27001 requirements for an ISMS from the perspective of an auditor Information Security Management System (ISMS)Topic 3Fundamental audit concepts and principles Fundamental principles and concepts of Information Security Management System (ISMS)Topic 4Managing an ISOIEC 27001 audit program Preparation, Conducting, Closing of an ISOIEC 27001 audit   QUESTION 57Information has a number of reliability aspects. Reliability is constantly being threatened. Examples of threats are: a cable becomes loose, someone alters information by accident, data is used privately or is falsified.Which of these examples is a threat to integrity?  a loose cable  accidental alteration of data  private use of data  System restart QUESTION 58After a devastating office fire, all staff are moved to other branches of the company. At what moment in the incident management process is this measure effectuated?  Between incident and damage  Between detection and classification  Between recovery and normal operations  Between classification and escalation QUESTION 59Changes to the information processing facilities shall be done in controlled manner.  True  False QUESTION 60There is a scheduled fire drill in your facility. What should you do?  Participate in the drill  Excuse yourself by saying you have an urgent deliverable  Call in sick  None of the above QUESTION 61How are data and information related?  Data is a collection of structured and unstructured information  Information consists of facts and statistics collected together for reference or analysis  When meaning and value are assigned to data, it becomes information QUESTION 62CMM stands for?  Capability Maturity Matrix  Capacity Maturity Matrix  Capability Maturity Model  Capable Mature Model QUESTION 63You have a hard copy of a customer design document that you want to dispose off. What would you do  Throw it in any dustbin  Shred it using a shredder  Give it to the office boy to reuse it for other purposes  Be environment friendly and reuse it for writing QUESTION 64A planning process that introduced the concept of planning as a cycle that forms the basis for continuous improvement is called:  time based planning.  plan, do, check, act.  planning for continuous improvement.  RACI Matrix QUESTION 65What is the name of the system that guarantees the coherence of information security in the organization?  Information Security Management System (ISMS)  Rootkit  Security regulations for special information for the government  Information Technology Service Management (ITSM) QUESTION 66A property of Information that has the ability to prove occurrence of a claimed event.  Electronic chain letters  Integrity  Availability  Accessibility QUESTION 67Information or data that are classified as ______ do not require labeling.  Public  Internal  Confidential  Highly Confidential QUESTION 68What controls can you do to protect sensitive data in your computer when you go out for lunch?  You activate your favorite screen-saver  You are confident to leave your computer screen as is since a password protected screensaver is installed and it is set to activate after 10 minutes of inactivity  You lock your computer by pressing Windows+L or CTRL-ALT-DELETE and then click “Lock Computer”.  You turn off the monitor QUESTION 69CEO sends a mail giving his views on the status of the company and the company’s future strategy and the CEO’s vision and the employee’s part in it. The mail should be classified as  Internal Mail  Public Mail  Confidential Mail  Restricted Mail QUESTION 70A fire breaks out in a branch office of a health insurance company. The personnel are transferred to neighboring branches to continue their work.Where in the incident cycle is moving to a stand-by arrangements found?  between threat and incident  between recovery and threat  between damage and recovery  between incident and damage QUESTION 71You work in the office of a large company. You receive a call from a person claiming to be from the Helpdesk. He asks you for your password.What kind of threat is this?  Natural threat  Organizational threat  Social Engineering  Arason QUESTION 72Which reliability aspect of information is compromised when a staff member denies having sent a message?  Confidentiality  Integrity  Availability  Correctness QUESTION 73A scenario wherein the city or location where the building(s) reside is / are not accessible.  Component  Facility  City  Country QUESTION 74What is the standard definition of ISMS?  Is an information security systematic approach to achieve business objectives for implementation, establishing, reviewing,operating and maintaining organization’s reputation.  A company wide business objectives to achieve information security awareness for establishing, implementing, operating, monitoring, reviewing, maintaining and improving  A project-based approach to achieve business objectives for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organization’s information security  A systematic approach for establishing, implementing, operating,monitoring, reviewing, maintaining and improving an organization’s information security to achieve business objectives. QUESTION 75What would be the reference for you to know who should have access to data/document?  Data Classification Label  Access Control List (ACL)  Masterlist of Project Records (MLPR)  Information Rights Management (IRM) QUESTION 76__________ is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.  Trojan  Operating System  Virus  Malware QUESTION 77What is the security management term for establishing whether someone’s identity is correct?  Identification  Authentication  Authorisation  Verification QUESTION 78A hacker gains access to a web server and reads the credit card numbers stored on that server. Which security principle is violated?  Availability  Confidentiality  Integrity  Authenticity QUESTION 79Which measure is a preventive measure?  Installing a logging system that enables changes in a system to be recognized  Shutting down all internet traffic after a hacker has gained access to the company systems  Putting sensitive information in a safe QUESTION 80What is a repressive measure in case of a fire?  Taking out a fire insurance  Putting out a fire after it has been detected by a fire detector  Repairing damage caused by the fire QUESTION 81We can leave laptops during weekdays or weekends in locked bins.  True  False  Loading … Updated Exam ISO-IEC-27001-Lead-Auditor Dumps with New Questions: https://www.examslabs.com/PECB/ISO-27001/best-ISO-IEC-27001-Lead-Auditor-exam-dumps.html --------------------------------------------------- Images: https://blog.examslabs.com/wp-content/plugins/watu/loading.gif https://blog.examslabs.com/wp-content/plugins/watu/loading.gif --------------------------------------------------- --------------------------------------------------- Post date: 2023-02-18 09:39:33 Post date GMT: 2023-02-18 09:39:33 Post modified date: 2023-02-18 09:39:33 Post modified date GMT: 2023-02-18 09:39:33