Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

ISO-IEC-27002-Foundation Exam Dumps - ISO/IEC 27002 Foundation Exam

Searching for workable clues to ace the PECB ISO-IEC-27002-Foundation Exam? You’re on the right place! ExamCert has realistic, trusted and authentic exam prep tools to help you achieve your desired credential. ExamCert’s ISO-IEC-27002-Foundation PDF Study Guide, Testing Engine and Exam Dumps follow a reliable exam preparation strategy, providing you the most relevant and updated study material that is crafted in an easy to learn format of questions and answers. ExamCert’s study tools aim at simplifying all complex and confusing concepts of the exam and introduce you to the real exam scenario and practice it with the help of its testing engine and real exam dumps

Go to page:
Question # 9

An organization has set up a fire alarm. What type of control is this?

A.

Corrective and managerial

B.

Detective and technical

C.

Preventive and legal

Full Access
Question # 10

What does ISO/IEC 27002 recommend regarding audit testing?

A.

Audit tests should be planned and agreed upon between the tester and the appropriate management

B.

Audit tests and other assurance activities should be conducted ad hoc to determine the effectiveness of operational systems and business processes

C.

The organization should temporarily stop its operational systems and business processes during audits and other assurance activities

Full Access
Question # 11

Which of the following controls should the organization implement to ensure that its approach to managing information security continues to be suitable, adequate and effective?

A.

Control 5.4 Management responsibilities

B.

Control 5.35 Independent review of information security

C.

Control 5.24 Information security incident management planning and preparation

Full Access
Question # 12

An organization does NOT authenticate the identity of persons that enter the server room, so unauthorized persons can easily gain access to the server. Which control of ISO/IEC 27002 should the organization implement to solve this problem?

A.

Control 8.6 Capacity management

B.

Control 7.2 Physical entry

C.

Control 8.4 Access to source code

Full Access
Go to page: