A decent visitor is roaming around without visitor's ID. As an employee you should do the following, except:
A. Say "hi" and offer coffee
B. Call the receptionist and inform about the visitor
C. Greet and ask him what is his business
D. Escort him to his destination
Which is the glue that ties the triad together
A. Process
B. People
C. Collaboration
D. Technology
An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.
A. True
B. False
What is the standard definition of ISMS?
A. Is an information security systematic approach to achieve business objectives for implementation, establishing, reviewing,operating and maintaining organization's reputation.
B. A company wide business objectives to achieve information security awareness for establishing, implementing, operating, monitoring, reviewing, maintaining and improving
C. A project-based approach to achieve business objectives for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organization's information security
D. A systematic approach for establishing, implementing, operating,monitoring, reviewing, maintaining and improving an organization's information security to achieve business objectives.
What is the name of the system that guarantees the coherence of information security in the organization?
A. Information Security Management System (ISMS)
B. Rootkit
C. Security regulations for special information for the government
D. Information Technology Service Management (ITSM)
CMM stands for?
A. Capability Maturity Matrix
B. Capacity Maturity Matrix
C. Capability Maturity Model
D. Capable Mature Model
What is social engineering?
A. A group planning for a social activity in the organization
B. Creating a situation wherein a third party gains confidential information from you
C. The organization planning an activity for welfare of the neighborhood
What controls can you do to protect sensitive data in your computer when you go out for lunch?
A. You activate your favorite screen-saver
B. You are confident to leave your computer screen as is since a password protected screensaver is installed and it is set to activate after 10 minutes of inactivity
C. You lock your computer by pressing Windows+L or CTRL-ALT-DELETE and then click "Lock Computer".
D. You turn off the monitor
What is a definition of compliance?
A. Laws, considered collectively or the process of making or enacting laws
B. The state or fact of according with or meeting rules or standards
C. An official or authoritative instruction
D. A rule or directive made and maintained by an authority.
Why do we need to test a disaster recovery plan regularly, and keep it up to date?
A. Otherwise the measures taken and the incident procedures planned may not be adequate
B. Otherwise it is no longer up to date with the registration of daily occurring faults
C. Otherwise remotely stored backups may no longer be available to the security team
Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only PECB exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ISO-IEC-27001-LEAD-AUDITOR exam preparations and PECB certification application, do not hesitate to visit our Vcedump.com to find your solutions here.