New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

PECB ISO-IEC-27001-Lead-Auditor Exam - Topic 3 Question 59 Discussion

Actual exam question for PECB's ISO-IEC-27001-Lead-Auditor exam
Question #: 59
Topic #: 3
[All ISO-IEC-27001-Lead-Auditor Questions]

You are an experienced ISMS audit team leader. You are providing an introduction to ISO/IEC 27001:2022 to a class of Quality Management System Auditors who are seeking to retrain to enable them to carry out information security management system audits.

You ask them which of the following characteristics of information does an information security management system seek to preserve?

Which three answers should they provide?

Show Suggested Answer Hide Answer
Suggested Answer: E, F, G

These three characteristics are the fundamental properties of information security, as defined by the ISO/IEC 27000 standard, which provides the overview and vocabulary of information security, cybersecurity, and privacy protection12. They are also the basis for the information security objectives and controls of the ISO/IEC 27001 standard, which specifies the requirements for establishing, implementing, maintaining, and continually improving an information security management system34. The definitions of these characteristics are as follows12:

* Availability: The property of being accessible and usable upon demand by an authorized entity.

* Confidentiality: The property that information is not made available or disclosed to unauthorized individuals, entities, or processes.

* Integrity: The property of safeguarding the accuracy and completeness of information and processing methods.

The other characteristics listed in the question, such as clarity, accessibility, completeness, importance, and efficiency, are not directly related to information security, although they may be relevant for other aspects of information management, such as quality, usability, or performance.


Contribute your Thoughts:

0/2000 characters
Mozelle
2 months ago
Totally agree with the three main ones!
upvoted 0 times
...
Leonardo
2 months ago
Availability and integrity are key, but I’m not sure about confidentiality.
upvoted 0 times
...
Milly
3 months ago
Wait, are we really leaving out accessibility? That seems off.
upvoted 0 times
...
Carin
3 months ago
I thought clarity was important too, but I guess not for ISMS?
upvoted 0 times
...
Josphine
3 months ago
Definitely confidentiality, integrity, and availability!
upvoted 0 times
...
Penney
3 months ago
I feel like clarity and completeness might be important too, but they don't seem to fit the main focus of an ISMS. I guess I should stick with the more common terms like confidentiality and integrity.
upvoted 0 times
...
Gaston
4 months ago
I practiced a similar question before, and I think it was about the CIA triad. So, I would go with confidentiality, integrity, and availability for sure.
upvoted 0 times
...
Brock
4 months ago
I'm not entirely sure about the options. I remember something about integrity and availability, but I can't recall if confidentiality is definitely one of them.
upvoted 0 times
...
Louvenia
4 months ago
I think the key characteristics we need to focus on are confidentiality, integrity, and availability. Those seem to be the core principles of information security, right?
upvoted 0 times
...
Meaghan
4 months ago
This is a good test of our understanding of information security fundamentals. I'll review the options and make sure to choose the three that align with the CIA triad - confidentiality, integrity, and availability.
upvoted 0 times
...
Erick
4 months ago
Okay, I've got this. An ISMS is all about maintaining the confidentiality, integrity, and availability of information. Those are the three main things it seeks to protect. I'll make sure to select those options.
upvoted 0 times
...
Antonio
5 months ago
Hmm, I'm a bit unsure about this one. I know information security is about protecting data, but I'm not totally clear on the specific characteristics it aims to preserve. I'll need to think this through carefully.
upvoted 0 times
...
Cristina
5 months ago
This seems like a straightforward question about the core principles of information security. I'll focus on the key triad of confidentiality, integrity, and availability.
upvoted 0 times
...

Save Cancel