New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

PECB ISO-IEC-27001-Lead-Auditor Exam - Topic 1 Question 19 Discussion

Actual exam question for PECB's ISO-IEC-27001-Lead-Auditor exam
Question #: 19
Topic #: 1
[All ISO-IEC-27001-Lead-Auditor Questions]

All are prohibited in acceptable use of information assets, except:

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Jesse
4 months ago
I thought electronic chain letters were still a thing?
upvoted 0 times
...
Danilo
4 months ago
B is definitely a no-go, too many unnecessary replies!
upvoted 0 times
...
Charlesetta
4 months ago
Wait, are we really allowed to send company-wide emails?
upvoted 0 times
...
Olive
4 months ago
Totally agree, C makes sense with permission.
upvoted 0 times
...
Dottie
4 months ago
C is the only acceptable one here.
upvoted 0 times
...
Tess
5 months ago
I’m leaning towards C too, but I’m worried I might be mixing it up with another question we did in class.
upvoted 0 times
...
Celestina
5 months ago
I practiced a similar question, and I think D is also a no-go because of the large attachments.
upvoted 0 times
...
Mariann
5 months ago
I'm not entirely sure, but I feel like C might be the right answer since it mentions getting permission.
upvoted 0 times
...
Jenelle
5 months ago
I remember we discussed acceptable use policies, and I think options A and B are definitely prohibited.
upvoted 0 times
...
Aretha
5 months ago
This seems like a straightforward question. I think the answer is Chart Markers, which allow you to dynamically highlight certain values on the bar chart.
upvoted 0 times
...
Vivan
5 months ago
I've got this! Equivalence partitioning is one of my strengths. I'm confident I can solve this question quickly.
upvoted 0 times
...
Skye
5 months ago
Hmm, I'm not quite sure about the different embedding options for DataV. I'll need to think this through carefully.
upvoted 0 times
...
Tamala
5 months ago
Hmm, I'm a bit unsure about this one. I know Proof of Work is used by Bitcoin, but I can't remember if that's the algorithm that was specifically adopted by the creator.
upvoted 0 times
...
Flo
5 months ago
Okay, I've got an idea. Instituting Privacy by Design principles across the organization seems like the most comprehensive and proactive approach. That way, privacy is baked in from the start.
upvoted 0 times
...

Save Cancel