Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

ISO-IEC-27002-Foundation ISO/IEC 27002 Foundation Exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

ISO-IEC-27002-Foundation Practice Questions

ISO/IEC 27002 Foundation Exam

Last Update 3 days ago
Total Questions : 40

Dive into our fully updated and stable ISO-IEC-27002-Foundation practice test platform, featuring all the latest ISO 27002 exam questions added this week. Our preparation tool is more than just a PECB study aid; it's a strategic advantage.

Our free ISO 27002 practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about ISO-IEC-27002-Foundation. Use this test to pinpoint which areas you need to focus your study on.

ISO-IEC-27002-Foundation PDF

ISO-IEC-27002-Foundation PDF (Printable)
$43.75
$124.99

ISO-IEC-27002-Foundation Testing Engine

ISO-IEC-27002-Foundation PDF (Printable)
$50.75
$144.99

ISO-IEC-27002-Foundation PDF + Testing Engine

ISO-IEC-27002-Foundation PDF (Printable)
$63.7
$181.99
Question # 1

An organization has established and maintains contact with special interest groups with which it shares and obtains information about security threats, vulnerabilities, trends, etc. Based on ISO/IEC 27002, is this a good practice?

Options:

A.  

No, organizations should avoid sharing or exchanging information about new threats or vulnerabilities

B.  

No, organizations should share such information only with the authorities

C.  

Yes, it is recommended for organizations to establish and maintain contact with special interest groups regarding security threats, trends, etc.

Discussion 0
Question # 2

What should the management of the organization do to ensure that all personnel are aware of and fulfill their information security responsibilities?

Options:

A.  

Require all personnel to apply information security in accordance with the established information security policy, topic-specific policies and procedures of the organization

B.  

Require all personnel to establish and approve information security policies, topic-specific policies and procedures of the organization

C.  

Require all personnel to read the guidelines of ISO/IEC 27002

Discussion 0
Question # 3

Company A has configured its employees’ browsers to block the IP address of malicious websites. Which information security control has been implemented by Company A?

Options:

A.  

Control 8.11 Data masking

B.  

Control 8.23 Web filtering

C.  

Control 5.18 Access rights

Discussion 0
Question # 4

Which control should an organization implement to ensure that the software is written securely and the number of potential vulnerabilities in the software is reduced?

Options:

A.  

Control 8.29 Security testing in development and acceptance

B.  

Control 8.26 Application security requirements

C.  

Control 8.28 Secure coding

Discussion 0
Question # 5

What, among others, should be considered when using cryptography?

Options:

A.  

The roles and responsibilities for the key management

B.  

Security checkpoints in projects

C.  

Restricting and filtering systems connection to the network

Discussion 0
Question # 6

Which information security principle is compromised by accidental changes in information?

Options:

A.  

Availability

B.  

Integrity

C.  

Confidentiality

Discussion 0
Question # 7

An organization has set up a fire alarm. What type of control is this?

Options:

A.  

Corrective and managerial

B.  

Detective and technical

C.  

Preventive and legal

Discussion 0
Question # 8

What does information security determine?

Options:

A.  

What information needs to be protected and why it should be protected

B.  

How to protect information and what to protect it from

C.  

Both A and B

Discussion 0
Question # 9

Which statement below describes the principle of confidentiality?

Options:

A.  

Property that information is not made available or disclosed to unauthorized individuals, entities, or processes

B.  

Property of accuracy and completeness

C.  

Property of being accessible and usable upon demand by an authorized entity

Discussion 0
Question # 10

Which situation presented below indicates that the confidentiality of information has been breached?

Options:

A.  

Employees of all departments of an organization have access to personal data of their colleagues

B.  

The Customer Service Department is not able to access customers’ phone numbers due to an equipment failure

C.  

One of the employees of the Financial Department of an organization accidentally modified banking information of other staff members

Discussion 0
Get ISO-IEC-27002-Foundation dumps and pass your exam in 24 hours!

Free Exams Sample Questions