New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

PECB ISO-IEC-27001-Lead-Auditor Exam - Topic 4 Question 20 Discussion

Actual exam question for PECB's ISO-IEC-27001-Lead-Auditor exam
Question #: 20
Topic #: 4
[All ISO-IEC-27001-Lead-Auditor Questions]

Information Security is a matter of building and maintaining ________ .

Show Suggested Answer Hide Answer
Suggested Answer: B

Contribute your Thoughts:

0/2000 characters
Pearly
4 months ago
Wait, can we really build trust in security?
upvoted 0 times
...
Carmen
4 months ago
I think confidentiality is super important too.
upvoted 0 times
...
Carolynn
4 months ago
Firewalls are just one part of the puzzle.
upvoted 0 times
...
Jina
4 months ago
Definitely protection is key!
upvoted 0 times
...
Theodora
4 months ago
It's all about building trust.
upvoted 0 times
...
Joni
5 months ago
"Firewalls" seems too specific; I think it’s more about the broader concept of "Trust" in security.
upvoted 0 times
...
Melodie
5 months ago
I’m leaning towards "Confidentiality," but I could be mixing it up with another topic we covered.
upvoted 0 times
...
Nickolas
5 months ago
I feel like I’ve seen a question like this before, and "Protection" sounds familiar, but I’m not entirely sure.
upvoted 0 times
...
Lang
5 months ago
I think it might be "Trust," but I remember something about confidentiality being really important too.
upvoted 0 times
...
Devorah
5 months ago
I'm feeling pretty confident about this one. The key is that the question is asking about what should happen before requirements elicitation. That means the correct answer is likely something that sets the stage or provides important context. I think option B, defining how the solution will be evaluated, is the best choice.
upvoted 0 times
...
Margart
5 months ago
Okay, I think I know the answer to this one. The key is to use the "serverless" keyword in the twistcli command, but I'm not sure about the exact syntax. I'll have to double-check the options.
upvoted 0 times
...
Alyssa
5 months ago
Okay, I've got it! TAILS is a live system that's designed to protect the user's privacy and anonymity online. So the correct answer is option A - it allows the user to run a self-contained computer from a USB device, which helps keep their activities and data secure.
upvoted 0 times
...
Harrison
5 months ago
CloudFront access logs might also have the status codes because they track requests to the distribution... I think that could be one of the answers.
upvoted 0 times
...

Save Cancel