Summer Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ex2p65

Exact2Pass Menu

ISO / IEC 27002 - Lead Implementer

Last Update 21 hours ago Total Questions : 50

The ISO / IEC 27002 - Lead Implementer content is now fully updated, with all current exam questions added 21 hours ago. Deciding to include ISO-IEC-LI practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our ISO-IEC-LI exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these ISO-IEC-LI sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any ISO / IEC 27002 - Lead Implementer practice test comfortably within the allotted time.

Question # 4

Which of the following measures is a preventive measure?

A.

Installing a logging system that enables changes in a system to be recognized

B.

Shutting down all internet traffic after a hacker has gained access to the company systems

C.

Putting sensitive information in a safe

D.

Classifying a risk as acceptable because the cost of addressing the threat is higher than the value of the information at risk

Question # 5

You apply for a position in another company and get the job. Along with your contract, you are asked to sign a code of conduct. What is a code of conduct?

A.

A code of conduct specifies how employees are expected to conduct themselves and is the same for all companies.

B.

A code of conduct is a standard part of a labor contract.

C.

A code of conduct differs from company to company and specifies, among other things, the rules of behavior with regard to the usage of information systems.

Question # 6

Select the controls that correspond to the domain "9. ACCESS CONTROL" of ISO / 27002 (Choose three)

A.

Restriction of access to information

B.

Return of assets

C.

Management of access rights with special privileges

D.

Withdrawal or adaptation of access rights

Question # 7

What does the Information Security Policy describe?

A.

how the InfoSec-objectives will be reached

B.

which InfoSec-controls have been selected and taken

C.

what the implementation-planning of the information security management system is

D.

which Information Security-procedures are selected