PECB ISO-IEC-27001-Lead-Implementer Exam
ISO/IEC 27001 Lead Implementer (Page 5 )

Updated On: 7-Feb-2026
View Related Case Study

According to scenario 15, the team prevented a potential attack based on knowledge gained from previous incidents. Is this acceptable?

  1. No, before responding to an information security incident, an information security incident management policy must be established
  2. No, every information security incident is different, hence knowledge gained from previous incidents cannot prevent potential attacks
  3. Yes, in the absence of an information security incident management policy, lessons learned can be applied

Answer(s): C



View Related Case Study

Based on scenario 15, what else should Texas H&H Inc. do when responding to the incident?

  1. Decide to stop using cloud services in order to eliminate the risk of similar incidents happening in the future
  2. Record and document the incident which serves as input for future corrective actions
  3. Communicate the updated information security policy only to the top management of the company

Answer(s): B



View Related Case Study

Which situation described in scenario 15 indicates that Texas H&H Inc. implemented a detective control?

  1. Texas H&H Inc integrated the incident management policy in its information security policy
  2. Texas H&H Inc. tested its system for malicious activity and checked cloud-based email settings
  3. Texas H&H Inc. hired an expert to conduct a forensic analysis

Answer(s): B



View Related Case Study

Following a reported event, an information security event ticket has been completed and its priority has been assigned. Then, the event has been evaluated to determine if it is an information security incident. Which phase of the incident management has been completed?

  1. Initial assessment and decision
  2. Detection and reporting
  3. Evaluation and confirmation

Answer(s): A



View Related Case Study

What should an organization demonstrate through documentation?

  1. That the complexity of processes and their interactions is documented
  2. That the distribution of paper copies is regularly complete
  3. That its security controls are implemented based on risk scenarios

Answer(s): C



Viewing page 5 of 28
Viewing questions 21 - 25 out of 215 questions



Post your Comments and Discuss PECB ISO-IEC-27001-Lead-Implementer exam prep with other Community members:

Join the ISO-IEC-27001-Lead-Implementer Discussion