Free ISO-IEC-27001-Lead-Implementer Exam Braindumps (page: 12)

Page 11 of 35
View Related Case Study

Security controls, such as _____________ ensure that information is accessible when and where required.

  1. Conducting regular data backup procedures
  2. Implementing web access controls
  3. Securing offices through locks on doors

Answer(s): A



View Related Case Study

The application used by an organization has a complicated user interface. What does the complicated user interface represent in this case?

  1. An intrinsic vulnerability, since it is a characteristic of the asset
  2. An extrinsic vulnerability, since it is an external factor that impacts the asset
  3. A type of threat, since it may result in an unwanted incident

Answer(s): A



View Related Case Study

Which of the following practices indicates that Company A has implemented clock synchronization?

  1. Logs that record activities and other relevant events are stored and analyzed
  2. Information processing systems are coordinated according to an approved time source
  3. Suspected information security events are reported in a timely manner through an appropriate channel

Answer(s): B



View Related Case Study

The purpose of control 7.2 Physical entry of ISO/IEC 27001 is to ensure only authorized access to the organization's information and other associated assets occur. Which action below does NOT fulfill this purpose?

  1. Verifying items of equipment containing storage media
  2. Using appropriate entry controls
  3. Implementing access points

Answer(s): A






Post your Comments and Discuss PECB ISO-IEC-27001-Lead-Implementer exam with other Community members:

ISO-IEC-27001-Lead-Implementer Discussions & Posts