Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Free and Premium PECB ISO-IEC-27002-Foundation Dumps Questions Answers

ISO/IEC 27002 Foundation Exam Questions and Answers

Question 1

What does information security determine?

Options:

A.

What information needs to be protected and why it should be protected

B.

How to protect information and what to protect it from

C.

Both A and B

Buy Now
Question 2

Which control of ISO/IEC 27002 helps organizations ensure that employees and contractors are suitable for their roles?

Options:

A.

Control 6.1 Screening

B.

Control 6.4 Disciplinary process

C.

Control 6.7 Remote working

Question 3

Which statement below describes the principle of confidentiality?

Options:

A.

Property that information is not made available or disclosed to unauthorized individuals, entities, or processes

B.

Property of accuracy and completeness

C.

Property of being accessible and usable upon demand by an authorized entity

Question 4

When can clock synchronization be difficult?

Options:

A.

When using only on-premises services

B.

When using multiple cloud services

C.

Both A and B

Question 5

What, among others, should be considered when using cryptography?

Options:

A.

The roles and responsibilities for the key management

B.

Security checkpoints in projects

C.

Restricting and filtering systems connection to the network

Question 6

Which control should an organization implement to ensure that the software is written securely and the number of potential vulnerabilities in the software is reduced?

Options:

A.

Control 8.29 Security testing in development and acceptance

B.

Control 8.26 Application security requirements

C.

Control 8.28 Secure coding

Question 7

What does ISO/IEC 27002 provide?

Options:

A.

Guidance for the implementation of information security controls

B.

Requirements for the implementation of information security controls

C.

Guidance for the management of information security risks

Question 8

According to Control 5.1 Policies for information security, regarding which of the following, among others, should an information security policy contain statements?

Options:

A.

Regarding the procedures for recovering from a data breach

B.

Regarding the procedures for handling exemptions and exceptions

C.

Regarding the procedures for using automated information systems

Question 9

During which phase of the Plan-Do-Check-Act cycle do organizations maintain and improve the information security management system?

Options:

A.

Act

B.

Do

C.

Check

Question 10

What should NOT be taken into account when locating and constructing physical premises?

Options:

A.

Local topography

B.

Urban threats

C.

System requirements

Question 11

Which situation presented below indicates that the confidentiality of information has been breached?

Options:

A.

Employees of all departments of an organization have access to personal data of their colleagues

B.

The Customer Service Department is not able to access customers’ phone numbers due to an equipment failure

C.

One of the employees of the Financial Department of an organization accidentally modified banking information of other staff members

Question 12

In which group of controls does Control 5.7 Threat intelligence belong?

Options:

A.

Technological

B.

People

C.

Organizational