Pre-Summer Sale Discount Flat 70% Offer - Ends in 0d 00h 00m 00s - Coupon code: 70diswrap

PECB ISO-IEC-27002-Foundation Dumps

ISO/IEC 27002 Foundation Exam Questions and Answers

Question 1

What should an organization do if it detects a vulnerability that does not have a corresponding threat?

Options:

A.

Recognize the vulnerability

B.

Both A and C

C.

Monitor the vulnerability for changes

Question 2

An organization has set up a fire alarm. What type of control is this?

Options:

A.

Corrective and managerial

B.

Detective and technical

C.

Preventive and legal

Question 3

Which situation presented below indicates that the confidentiality of information has been breached?

Options:

A.

Employees of all departments of an organization have access to personal data of their colleagues

B.

The Customer Service Department is not able to access customers’ phone numbers due to an equipment failure

C.

One of the employees of the Financial Department of an organization accidentally modified banking information of other staff members

Question 4

What is the purpose of Control 8.20 Network security of ISO/IEC 27002?

Options:

A.

To protect information in networks and its supporting information processing facilities from compromise via the network

B.

To ensure security in the use of network services

C.

To split the network in security boundaries

Question 5

According to Control 5.27 Learning from information security incidents, how can organizations use the information gained from the evaluation of information security incidents?

Options:

A.

To enhance user awareness and training

B.

Both A and C

C.

To enhance the incident management plan

Question 6

During which phase of the Plan-Do-Check-Act cycle do organizations maintain and improve the information security management system?

Options:

A.

Act

B.

Do

C.

Check

Question 7

What is continual improvement?

Options:

A.

The process of increasing the effectiveness and efficiency of the organization to fulfill its policy and objectives

B.

A method of examining the nature of something or of determining its essential features and their relations

C.

The action taken to eliminate a detected nonconformity

Question 8

According to Control 5.1 Policies for information security, regarding which of the following, among others, should an information security policy contain statements?

Options:

A.

Regarding the procedures for recovering from a data breach

B.

Regarding the procedures for handling exemptions and exceptions

C.

Regarding the procedures for using automated information systems

Question 9

An organization uses an access control software that allows only authorized employees to access sensitive files. What type of control is this?

Options:

A.

Detective

B.

Corrective

C.

Preventive

Question 10

What, among others, should be considered when using cryptography?

Options:

A.

The roles and responsibilities for the key management

B.

Security checkpoints in projects

C.

Restricting and filtering systems connection to the network

Question 11

What should NOT be taken into account when locating and constructing physical premises?

Options:

A.

Local topography

B.

Urban threats

C.

System requirements

Question 12

Some employees of an organization find the data processing procedures complicated and have been struggling to follow them effectively. Which of the following threats is the organization facing in this case?

Options:

A.

Data input error by employees

B.

Hacking

C.

Information theft

Page: 1 / 4
Total 40 questions