PECB ISO IEC 27001 LEAD AUDITOR Exam Questions

Questions for the ISO IEC 27001 LEAD AUDITOR were updated on : Jun 07 ,2024

Page 1 out of 7. Viewing questions 1-15 out of 100

Question 1

Changes on project-managed applications or database should undergo the change control process as
documented.

  • A. True
  • B. False
Answer:

A

User Votes:
A
50%
B
50%

Discussions
vote your answer:
A
B
0 / 1000

Question 2

A scenario wherein the city or location where the building(s) reside is / are not accessible.

  • A. Component
  • B. Facility
  • C. City
  • D. Country
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 3

What would be the reference for you to know who should have access to data/document?

  • A. Data Classification Label
  • B. Access Control List (ACL)
  • C. Masterlist of Project Records (MLPR)
  • D. Information Rights Management (IRM)
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 4

An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio
streaming, will not receive a warning for committing such act but will directly receive an IR.

  • A. True
  • B. False
Answer:

A

User Votes:
A
50%
B
50%

Discussions
vote your answer:
A
B
0 / 1000

Question 5

An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.

  • A. True
  • B. False
Answer:

B

User Votes:
A
50%
B
50%

Discussions
vote your answer:
A
B
0 / 1000

Question 6

What is the worst possible action that an employee may receive for sharing his or her password or
access with others?

  • A. Forced roll off from the project
  • B. The lowest rating on his or her performance assessment
  • C. Three days suspension from work
  • D. Termination
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 7

Which of the following statements are correct for Clean Desk Policy?

  • A. Don't leave confidential documents on your desk.
  • B. Don't leave valuable items on your desk if you are not in your work area.
  • C. Don't leave highly confidential items.
  • D. Don't leave laptops without cable lock.
Answer:

A,B,C

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 8

__________ is a software used or created by hackers to disrupt computer operation, gather sensitive
information, or gain access to private computer systems.

  • A. Trojan
  • B. Operating System
  • C. Virus
  • D. Malware
Answer:

D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 9

There is a scheduled fire drill in your facility. What should you do?

  • A. Participate in the drill
  • B. Excuse yourself by saying you have an urgent deliverable
  • C. Call in sick
  • D. None of the above
Answer:

A

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 10

What controls can you do to protect sensitive data in your computer when you go out for lunch?

  • A. You activate your favorite screen-saver
  • B. You are confident to leave your computer screen as is since a password protected screensaver is installed and it is set to activate after 10 minutes of inactivity
  • C. You lock your computer by pressing Windows+L or CTRL-ALT-DELETE and then click "Lock Computer".
  • D. You turn off the monitor
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 11

An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio
streaming, will not receive a warning for committing such act but will directly receive an IR.

  • A. True
  • B. False
Answer:

A

User Votes:
A
50%
B
50%

Discussions
vote your answer:
A
B
0 / 1000

Question 12

We can leave laptops during weekdays or weekends in locked bins.

  • A. True
  • B. False
Answer:

B

User Votes:
A
50%
B
50%

Discussions
vote your answer:
A
B
0 / 1000

Question 13

Access Control System, CCTV and security guards are form of:

  • A. Environment Security
  • B. Access Control
  • C. Physical Security
  • D. Compliance
Answer:

C

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 14

Which of the following does a lack of adequate security controls represent?

  • A. Asset
  • B. Vulnerability
  • C. Impact
  • D. Threat
Answer:

B

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000

Question 15

Four types of Data Classification (Choose two)

  • A. Restricted Data, Confidential Data
  • B. Project Data, Highly Confidential Data
  • C. Financial Data, Highly Confidential Data
  • D. Unrestricted Data, Highly Confidential Data
Answer:

A,D

User Votes:
A
50%
B
50%
C
50%
D
50%

Discussions
vote your answer:
A
B
C
D
0 / 1000
To page 2