Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: force70

Pass the PECB ISO 27002 ISO-IEC-27002-Foundation Questions and answers with CertsForce

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Why should an organization integrate information security into project management?

Options:

A.

To ensure the effective application of ISO/IEC 27001 principles related to projects and deliverables


B.

To ensure information security audits on the project and deliverables are regularly conducted


C.

To ensure information security risks related to projects and deliverables are effectively addressed


Expert Solution
Questions # 2:

Which of the following controls aims to ensure the integrity of operational systems and prevent exploitation of technical vulnerabilities?

Options:

A.

Control 8.19 Installation of software on operational systems


B.

Control 8.15 Logging


C.

Control 8.17 Clock synchronization


Expert Solution
Questions # 3:

What is the purpose of Control 8.20 Network security of ISO/IEC 27002?

Options:

A.

To protect information in networks and its supporting information processing facilities from compromise via the network


B.

To ensure security in the use of network services


C.

To split the network in security boundaries


Expert Solution
Questions # 4:

Which of the following is an example of an organizational asset in cyberspace?

Options:

A.

Medical data


B.

Digital customer identity


C.

Intellectual property


Expert Solution
Questions # 5:

Which situation presented below indicates that the confidentiality of information has been breached?

Options:

A.

Employees of all departments of an organization have access to personal data of their colleagues


B.

The Customer Service Department is not able to access customers’ phone numbers due to an equipment failure


C.

One of the employees of the Financial Department of an organization accidentally modified banking information of other staff members


Expert Solution
Questions # 6:

What does information security determine?

Options:

A.

What information needs to be protected and why it should be protected


B.

How to protect information and what to protect it from


C.

Both A and B


Expert Solution
Questions # 7:

What should NOT be taken into account when locating and constructing physical premises?

Options:

A.

Local topography


B.

Urban threats


C.

System requirements


Expert Solution
Questions # 8:

What should the management of the organization do to ensure that all personnel are aware of and fulfill their information security responsibilities?

Options:

A.

Require all personnel to apply information security in accordance with the established information security policy, topic-specific policies and procedures of the organization


B.

Require all personnel to establish and approve information security policies, topic-specific policies and procedures of the organization


C.

Require all personnel to read the guidelines of ISO/IEC 27002


Expert Solution
Questions # 9:

What should the organization’s management define and approve to ensure appropriate direction and support for information security?

Options:

A.

An information policy


B.

A risk management program


C.

The list of assets that should be protected


Expert Solution
Questions # 10:

Which of the following controls should the organization implement to ensure that its approach to managing information security continues to be suitable, adequate and effective?

Options:

A.

Control 5.4 Management responsibilities


B.

Control 5.35 Independent review of information security


C.

Control 5.24 Information security incident management planning and preparation


Expert Solution
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions