Pre-Summer Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: Board70

ISO-IEC-27002-Foundation Exam Dumps - PECB ISO 27002 Questions and Answers

Question # 4

Which of the following is an example of an organizational asset in cyberspace?

Options:

A.

Medical data

B.

Digital customer identity

C.

Intellectual property

Buy Now
Question # 5

How can organizations manage the security of large networks?

Options:

A.

By dividing networks into separate network domains and separating them from the public network

B.

By dividing networks into separate network domains and including them into the public network

C.

By avoiding the integration of information services, users, and information systems into large networks

Buy Now
Question # 6

What is the purpose of Control 8.20 Network security of ISO/IEC 27002?

Options:

A.

To protect information in networks and its supporting information processing facilities from compromise via the network

B.

To ensure security in the use of network services

C.

To split the network in security boundaries

Buy Now
Question # 7

What should be considered, among others, when establishing a remote working policy?

Options:

A.

The threat of unauthorized access to information or resources from other persons in public places

B.

The positioning of information processing facilities handling sensitive data

C.

The maintenance of authorization process and record of all privileges allocated

Buy Now
Question # 8

Company A has configured its employees’ browsers to block the IP address of malicious websites. Which information security control has been implemented by Company A?

Options:

A.

Control 8.11 Data masking

B.

Control 8.23 Web filtering

C.

Control 5.18 Access rights

Buy Now
Question # 9

Some employees of an organization find the data processing procedures complicated and have been struggling to follow them effectively. Which of the following threats is the organization facing in this case?

Options:

A.

Data input error by employees

B.

Hacking

C.

Information theft

Buy Now
Question # 10

Which of the following controls aims to ensure the integrity of operational systems and prevent exploitation of technical vulnerabilities?

Options:

A.

Control 8.19 Installation of software on operational systems

B.

Control 8.15 Logging

C.

Control 8.17 Clock synchronization

Buy Now
Question # 11

Which control should an organization implement to ensure that the software is written securely and the number of potential vulnerabilities in the software is reduced?

Options:

A.

Control 8.29 Security testing in development and acceptance

B.

Control 8.26 Application security requirements

C.

Control 8.28 Secure coding

Buy Now
Question # 12

An organization uses an access control software that allows only authorized employees to access sensitive files. What type of control is this?

Options:

A.

Detective

B.

Corrective

C.

Preventive

Buy Now
Question # 13

According to ISO/IEC 27002, which of the following statements is correct?

Options:

A.

Equipment should be sited securely and protected to reduce the risks from environmental and physical threats

B.

Equipment is NOT affected by power failures or other disruptions

C.

Supporting utilities should be tested only at the beginning of the process

Buy Now
Exam Name: ISO/IEC 27002 Foundation Exam
Last Update: May 9, 2026
Questions: 40
ISO-IEC-27002-Foundation pdf

ISO-IEC-27002-Foundation PDF

$25.5  $84.99
ISO-IEC-27002-Foundation Engine

ISO-IEC-27002-Foundation Testing Engine

$28.5  $94.99
ISO-IEC-27002-Foundation PDF + Engine

ISO-IEC-27002-Foundation PDF + Testing Engine

$40.5  $134.99