What is the goal of classification of information?
A. To create a manual about how to handle mobile devices
B. Applying labels making the information easier to recognize
C. Structuring information according to its sensitivity
As a new member of the IT department you have noticed that confidential information has been leaked several times. This may damage the reputation of the company. You have been asked to propose an organisational measure to protect laptop computers. What is the first step in a structured approach to come up with this measure?
A. Appoint security staff
B. Encrypt all sensitive information
C. Formulate a policy
D. Set up an access control procedure
How is the purpose of information security policy best described?
A. An information security policy documents the analysis of risks and the search for countermeasures.
B. An information security policy provides direction and support to the management regarding information security.
C. An information security policy makes the security plan concrete by providing it with the necessary details.
D. An information security policy provides insight into threats and the possible consequences.
Backup media is kept in the same secure area as the servers. What risk may the organisation be exposed to?
A. Unauthorised persons will have access to both the servers and backups
B. Responsibility for the backups is not defined well
C. After a fire, the information systems cannot be restored
D. After a server crash, it will take extra time to bring it back up again
You have a hard copy of a customer design document that you want to dispose off. What would you do?
A. Throw it in any dustbin
B. Shred it using a shredder
C. Give it to the office boy to reuse it for other purposes
D. Be environment friendly and reuse it for writing
What would be the reference for you to know who should have access to data/document?
A. Data Classification Label
B. Access Control List (ACL)
C. Masterlist of Project Records (MLPR)
D. Information Rights Management (IRM)
Which of the following factors does NOT contribute to the value of data for an organisation?
A. The correctness of data
B. The indispensability of data
C. The importance of data for processes
D. The content of data
After a fire has occurred, what repressive measure can be taken?
A. Extinguishing the fire after the fire alarm sounds
B. Buying in a proper fire insurance policy
C. Repairing all systems after the fire
A scenario wherein the city or location where the building(s) reside is / are not accessible.
A. Component
B. Facility
C. City
D. Country
What type of legislation requires a proper controlled purchase process?
A. Personal data protection act
B. Computer criminality act
C. Government information act
D. Intellectual property rights act
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only PECB exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ISO-IEC-27001-LEAD-AUDITOR exam preparations and PECB certification application, do not hesitate to visit our Vcedump.com to find your solutions here.