Join the discussion
Question 1/35
In acceptable use of Information Assets, which is the best practice?
Correct Answer: B
Add Comments
- Other Question (35q)
- Q1. In acceptable use of Information Assets, which is the best practice?...
- Q2. CMM stands for?
- Q3. What type of system ensures a coherent Information Security organisation?...
- Q4. You have a hard copy of a customer design document that you want to dispose off. What woul...
- Q5. Which of the following is not a type of Information Security attack?...
- Q6. What type of legislation requires a proper controlled purchase process?...
- Q7. A hacker gains access to a webserver and can view a file on the server containing credit c...
- Q8. Which of the following is an information security management system standard published by ...
- Q9. Which of the following does a lack of adequate security controls represent?...
- Q10. Changes on project-managed applications or database should undergo the change control proc...
- Q11. The computer room is protected by a pass reader. Only the System Management department has...
- Q12. A member of staff denies sending a particular message. Which reliability aspect of informa...
- Q13. In what part of the process to grant access to a system does the user present a token?...
- Q14. Someone from a large tech company calls you on behalf of your company to check the health ...
- Q15. The following are purposes of Information Security, except:...
- Q16. A decent visitor is roaming around without visitor's ID. As an employee you should do the ...
- Q17. What would be the reference for you to know who should have access to data/document?...
- Q18. Who is authorized to change the classification of a document?...
- Q19. Who is responsible for Initial asset allocation to the user/custodian of the assets?...
- Q20. Which threat could occur if no physical measures are taken?...
- Q21. What is a definition of compliance?
- Q22. You are the lead auditor of the courier company SpeeDelivery. You have carried out a risk ...
- Q23. Who are allowed to access highly confidential files?...
- Q24. In order to take out a fire insurance policy, an administration office must determine the ...
- Q25. Which of the following factors does NOT contribute to the value of data for an organisatio...
- Q26. A fire breaks out in a branch office of a health insurance company. The personnel are tran...
- Q27. What is the difference between a restricted and confidential document?...
- Q28. What is social engineering?
- Q29. The following are definitions of Information, except:...
- Q30. How is the purpose of information security policy best described?...
- Q31. Stages of Information
- Q32. What is the purpose of an Information Security policy?...
- Q33. Cabling Security is associated with Power, telecommunication and network cabling carrying ...
- Q34. In which order is an Information Security Management System set up?...
- Q35. Which of the following is a preventive security measure?...

[×]
Download PDF File
Enter your email address to download PECB.ISO-IEC-27001-Lead-Auditor.v2023-06-10.q35.pdf