Spring Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the PECB ISO 27002 ISO-IEC-27002-Foundation Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam ISO-IEC-27002-Foundation Premium Access

View all detail and faqs for the ISO-IEC-27002-Foundation exam


0 Students Passed

0% Average Score

0% Same Questions
Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which information security principle is compromised by accidental changes in information?

Options:

A.

Availability

B.

Integrity

C.

Confidentiality

Questions # 2:

An organization does NOT authenticate the identity of persons that enter the server room, so unauthorized persons can easily gain access to the server. Which control of ISO/IEC 27002 should the organization implement to solve this problem?

Options:

A.

Control 8.6 Capacity management

B.

Control 7.2 Physical entry

C.

Control 8.4 Access to source code

Questions # 3:

Which control should an organization implement to ensure that the software is written securely and the number of potential vulnerabilities in the software is reduced?

Options:

A.

Control 8.29 Security testing in development and acceptance

B.

Control 8.26 Application security requirements

C.

Control 8.28 Secure coding

Questions # 4:

How can organizations manage the security of large networks?

Options:

A.

By dividing networks into separate network domains and separating them from the public network

B.

By dividing networks into separate network domains and including them into the public network

C.

By avoiding the integration of information services, users, and information systems into large networks

Questions # 5:

According to Control 5.27 Learning from information security incidents, how can organizations use the information gained from the evaluation of information security incidents?

Options:

A.

To enhance user awareness and training

B.

Both A and C

C.

To enhance the incident management plan

Questions # 6:

During which phase of the Plan-Do-Check-Act cycle do organizations maintain and improve the information security management system?

Options:

A.

Act

B.

Do

C.

Check

Questions # 7:

Which control of ISO/IEC 27002 aims to ensure the correct and secure operation of information processing facilities?

Options:

A.

Control 7.2 Physical entry

B.

Control 5.37 Documented operating procedures

C.

Control 5.35 Independent review of information security

Questions # 8:

What should an organization do if it detects a vulnerability that does not have a corresponding threat?

Options:

A.

Recognize the vulnerability

B.

Both A and C

C.

Monitor the vulnerability for changes

Questions # 9:

What, among others, should be considered when using cryptography?

Options:

A.

The roles and responsibilities for the key management

B.

Security checkpoints in projects

C.

Restricting and filtering systems connection to the network

Questions # 10:

Which of the following controls aims to ensure the integrity of operational systems and prevent exploitation of technical vulnerabilities?

Options:

A.

Control 8.19 Installation of software on operational systems

B.

Control 8.15 Logging

C.

Control 8.17 Clock synchronization

Viewing page 1 out of 2 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.