Join the discussion
Question 1/43
How does SunDee's negligence affect the ISMS certificate? Refer to scenario 8.
Correct Answer: A
Add Comments
- Other Question (43q)
- Q1. How does SunDee's negligence affect the ISMS certificate? Refer to scenario 8....
- Q2. Scenario 3: Socket Inc is a telecommunications company offering mainly wireless products a...
- Q3. Based on scenario 3. which information security control of Annex A of ISO/IEC 27001 did So...
- Q4. What is the next step that Operaze's ISMS implementation team should take after drafting t...
- Q5. Which statement is an example of risk retention?...
- Q6. Diana works as a customer service representative for a large e-commerce company. One day, ...
- Q7. Which of these control objectives are NOT in the domain "12.OPERATIONAL SAFETY"?...
- Q8. Physical labels and ________ are two common forms of labeling which are mentioned in ISO 2...
- Q9. Scenario 4: TradeB. a commercial bank that has just entered the market, accepts deposits f...
- Q10. What is an example of a security incident?
- Q11. Who should be involved, among others, in the draft, review, and validation of information ...
- Q12. An organization has decided to conduct information security awareness and training session...
- Q13. Who is accountable to classify information assets?...
- Q14. In scenario 1, HealthGenic experienced a number of service interruptions due to the loss o...
- Q15. What is the ISO / IEC 27002 standard?
- Q16. Based on scenario 4, what type of assets were identified during risk assessment?...
- Q17. Which of the following measures is a preventive measure?...
- Q18. One of the ways Internet of Things (IoT) devices can communicate with each other (or 'the ...
- Q19. Based on scenario 7. InfoSec contracted Anna as an external consultant. Based on her tasks...
- Q20. Which security controls must be implemented to comply with ISO/IEC 27001?...
- Q21. Scenario 8: SunDee is an American biopharmaceutical company, headquartered in California, ...
- Q22. FinanceX, a well-known financial institution, uses an online banking platform that enables...
- Q23. Based on scenario 8. did the nonconformity report include all the necessary aspects?...
- Q24. The company Midwest Insurance has taken many measures to protect its information. It uses ...
- Q25. A company decided to use an algorithm that analyzes various attributes of customer behavio...
- Q26. Scenario 10: NetworkFuse develops, manufactures, and sells network hardware. The company h...
- Q27. An organization has adopted a new authentication method to ensure secure access to sensiti...
- Q28. Based on scenario 1. what is a potential impact of the loss of integrity of information in...
- Q29. According to scenario 2. Beauty has reviewed all user access rights. What type of control ...
- Q30. Based on scenario 9. did the ISMS project manager complete the corrective action process a...
- Q31. It is allowed that employees and contractors are provided with an anonymous reporting chan...
- Q32. The identified owner of an asset is always an individual...
- Q33. Which approach should organizations use to implement an ISMS based on ISO/IEC 27001?...
- Q34. Scenario 6: Skyver offers worldwide shipping of electronic products, including gaming cons...
- Q35. Based on scenario 4, the fact that TradeB defined the level of risk based on three nonnume...
- Q36. Can Socket Inc. find out that no persistent backdoor was placed and that the attack was in...
- Q37. You have juststarted working at a large organization. You have been asked to sign a code o...
- Q38. Of the following, which is the best organization or set of organizations to contribute to ...
- Q39. What are the data protection principles set out in the GDPR?...
- Q40. Midwest Insurance grades the monthly report of all claimed losses per insured as confident...
- Q41. An employee in the administrative department of Smiths Consultants Inc. finds out that the...
- Q42. An organization uses Platform as a Services (PaaS) to host its cloud-based services As suc...
- Q43. Which of the following statements regarding information security risk is NOT correct?...

[×]
Download PDF File
Enter your email address to download PECB.ISO-IEC-27001-Lead-Implementer.v2023-11-30.q43.pdf