Uploaded by denverbirdtail

PECB Certified ISO-IEC-27001 Lead Implementer Exam Dumps

advertisement
ISO-IEC-27001
Lead Implementer
https://www.certspots.com/exam/iso-iec-27001-lead-implementer/
ISO-IEC-27001 Lead Implementer Dumps
1. What is an example of a good physical security measure?
A. All employees and visitors carry an access pass.
B. Printers that are defective or have been replaced are immediately
removed and given away as garbage for recycling.
C. Maintenance staff can be given quick and unimpeded access to
the server area in the event of disaster.
Answer: A
ISO-IEC-27001 Lead Implementer Dumps
2. The company Midwest Insurance has taken many measures to protect its
information. It uses an Information Security Management System, the input
and output of data in applications is validated, confidential documents are
sent in encrypted form and staff use tokens to access information systems.
Which of these is not a technical measure?
A. Information Security Management System
B. The use of tokens to gain access to information systems
C. Validation of input and output data in applications
D. Encryption of information
Answer: A
ISO-IEC-27001 Lead Implementer Dumps
3. Which of these control objectives are NOT in the domain "12.
OPERATIONAL SAFETY"?
A. Protection against malicious code
B. Redundancies
C. Test data
D. Technical vulnerability management
Answer: B
ISO-IEC-27001 Lead Implementer Dumps
4. What should be used to protect data on removable media if data
confidentiality or integrity are important considerations?
A. backup on another removable medium
B. cryptographic techniques
C. a password
D. logging
Answer: B
ISO-IEC-27001 Lead Implementer Dumps
5. Which security controls must be implemented to comply with
ISO/IEC 27001?
A. Those designed by the organization only
B. Those included in the risk treatment plan
C. Those listed in Annex A of ISO/IEC 27001, without any exception
Answer: B
ISO-IEC-27001 Lead Implementer Dumps
6. How can Invalid Electric's ensure that Us employees are prepared
for the audit?
A. By conducting practice Interviews with the employees
B. By allowing the employees to observe the technologies used
C. By showing the employees the internal audit reports so they can
anticipate the questions asked by the auditor
Answer: A
ISO-IEC-27001 Lead Implementer Dumps
7. An organization has established a policy that provides the
personnel with the information required to effectively deploy
encryption solutions in order to protect organizational confidential
data. What type of policy is this?
A. High-level general policy
B. High-level topic-specific policy
C. Topic-specific policy
Answer: A
ISO-IEC-27001 Lead Implementer Dumps
8. Which situation presented in scenario 8 is not in compliance with
ISO/IEC 27001 requirements?
A. Emma has an operational role in the HealthGenic's management
system
B. The recodification audit Is planned to be conducted two years
after HealthGenic implemented the ISMS
C. Emma had access to all offices and documentation of HealthGenic
Answer: A
ISO-IEC-27001 Lead Implementer Dumps
9. An organization documented each security control that it Implemented
by describing their functions in detail. Is this compliant with ISO/IEC 27001?
A. No, the standard requires to document only the operation of processes
and controls, so no description of each security control is needed
B. No, because the documented information should have a strict format,
including the date, version number and author identification
C. Yes, but documenting each security control and not the process in
general will make it difficult to review the documented information
Answer: C
ISO-IEC-27001 Lead Implementer Dumps
10. You are the owner of a growing company, SpeeDelivery, which provides
courier services. You decide that it is time to draw up a risk analysis for your
information system. This includes an inventory of threats and risks. What is
the relation between a threat, risk and risk analysis?
A. A risk analysis identifies threats from the known risks.
B. A risk analysis is used to clarify which threats are relevant and what risks
they involve.
C. A risk analysis is used to remove the risk of a threat.
D. Risk analyses help to find a balance between threats and risks.
Answer: B
Download