Questions for the ISO IEC 27001 LEAD AUDITOR were updated on : Dec 19 ,2024
Changes on project-managed applications or database should undergo the change control process as
documented.
A
A scenario wherein the city or location where the building(s) reside is / are not accessible.
C
What would be the reference for you to know who should have access to data/document?
B
An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio
streaming, will not receive a warning for committing such act but will directly receive an IR.
A
An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.
B
What is the worst possible action that an employee may receive for sharing his or her password or
access with others?
D
Which of the following statements are correct for Clean Desk Policy?
A,B,C
__________ is a software used or created by hackers to disrupt computer operation, gather sensitive
information, or gain access to private computer systems.
D
There is a scheduled fire drill in your facility. What should you do?
A
What controls can you do to protect sensitive data in your computer when you go out for lunch?
C
An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio
streaming, will not receive a warning for committing such act but will directly receive an IR.
A
We can leave laptops during weekdays or weekends in locked bins.
B
Access Control System, CCTV and security guards are form of:
C
Which of the following does a lack of adequate security controls represent?
B
Four types of Data Classification (Choose two)
A,D