Pre-Summer Sale Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > PECB > ISO 27002 > ISO-IEC-27002-Foundation

ISO-IEC-27002-Foundation ISO/IEC 27002 Foundation Exam Question and Answers

Question # 4

Why should an organization integrate information security into project management?

A.

To ensure the effective application of ISO/IEC 27001 principles related to projects and deliverables

B.

To ensure information security audits on the project and deliverables are regularly conducted

C.

To ensure information security risks related to projects and deliverables are effectively addressed

Full Access
Question # 5

When can clock synchronization be difficult?

A.

When using only on-premises services

B.

When using multiple cloud services

C.

Both A and B

Full Access
Question # 6

Which control of ISO/IEC 27002 aims to ensure the correct and secure operation of information processing facilities?

A.

Control 7.2 Physical entry

B.

Control 5.37 Documented operating procedures

C.

Control 5.35 Independent review of information security

Full Access
Question # 7

Which of the following controls should the organization implement to ensure that its approach to managing information security continues to be suitable, adequate and effective?

A.

Control 5.4 Management responsibilities

B.

Control 5.35 Independent review of information security

C.

Control 5.24 Information security incident management planning and preparation

Full Access
Question # 8

What should the organization do with regard to the information security roles and responsibilities of an employee who is leaving or changing the job role?

A.

It should identify and transfer them to another employee

B.

It should document them in the termination of employment policy

C.

It should outsource them to an external party

Full Access
Question # 9

Which situation presented below indicates that the confidentiality of information has been breached?

A.

Employees of all departments of an organization have access to personal data of their colleagues

B.

The Customer Service Department is not able to access customers’ phone numbers due to an equipment failure

C.

One of the employees of the Financial Department of an organization accidentally modified banking information of other staff members

Full Access
Question # 10

Which control should an organization implement to ensure that the software is written securely and the number of potential vulnerabilities in the software is reduced?

A.

Control 8.29 Security testing in development and acceptance

B.

Control 8.26 Application security requirements

C.

Control 8.28 Secure coding

Full Access
Question # 11

According to Control 5.1 Policies for information security, regarding which of the following, among others, should an information security policy contain statements?

A.

Regarding the procedures for recovering from a data breach

B.

Regarding the procedures for handling exemptions and exceptions

C.

Regarding the procedures for using automated information systems

Full Access
Question # 12

What is continual improvement?

A.

The process of increasing the effectiveness and efficiency of the organization to fulfill its policy and objectives

B.

A method of examining the nature of something or of determining its essential features and their relations

C.

The action taken to eliminate a detected nonconformity

Full Access