New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

PECB ISO-IEC-27001-Lead-Implementer Exam - Topic 5 Question 33 Discussion

Actual exam question for PECB's ISO-IEC-27001-Lead-Implementer exam
Question #: 33
Topic #: 5
[All ISO-IEC-27001-Lead-Implementer Questions]

The purpose of control 5.9 inventory of Information and other associated assets of ISO/IEC 27001 is to identify organization's information and other associated assets in order to preserve their information security and assign ownership. Which of the following actions docs NOT fulfill this purpose?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Susana
3 months ago
I thought regular reviews were just a formality, not a necessity.
upvoted 0 times
...
Lura
3 months ago
Establishing access rules is definitely part of the process.
upvoted 0 times
...
Peggie
3 months ago
Wait, are we sure about that? Seems like all options are important.
upvoted 0 times
...
Edna
4 months ago
Totally agree, assigning ownership is key!
upvoted 0 times
...
Jaime
4 months ago
Regular reviews are essential for asset management.
upvoted 0 times
...
Reita
4 months ago
I'm a bit confused; I thought all these actions were important for asset management. Maybe option C is the one that doesn't quite fit?
upvoted 0 times
...
Luisa
4 months ago
I practiced a similar question where we had to determine the purpose of asset management controls. I feel like option A is definitely part of the process.
upvoted 0 times
...
Shawn
4 months ago
I think option B might not directly relate to identifying assets, since it's more about access control rather than inventorying them.
upvoted 0 times
...
Simona
5 months ago
I remember that control 5.9 is all about identifying and managing assets, but I'm not sure which option doesn't fit.
upvoted 0 times
...
Wilford
5 months ago
The key here is to identify the action that doesn't fulfill the purpose of identifying and assigning ownership of information assets. I think I've got this.
upvoted 0 times
...
Catrice
5 months ago
I'm not totally confident about this one, but I'll give it my best shot and eliminate the options that don't seem to align with the purpose.
upvoted 0 times
...
Garry
5 months ago
Okay, I need to focus on the key purpose of the control, which is to identify and assign ownership of information assets. The options seem to be testing my understanding of that.
upvoted 0 times
...
Tesha
5 months ago
Hmm, I'm a bit unsure about the purpose of this control. Let me re-read the question carefully.
upvoted 0 times
...
Ozell
5 months ago
This question seems straightforward, I think I can handle it.
upvoted 0 times
...
Bo
5 months ago
Hmm, I'm a bit confused on this one. I'm not sure if I should go with the Master-detail relationships or the Lookup relationships. I'll need to think it through carefully before answering.
upvoted 0 times
...
Paola
5 months ago
I'm a little confused on this one. I was thinking the purpose was more about identifying the specific risk factors, so I was leaning towards C - "What exactly is being exposed to the risk?". But now I'm second-guessing myself after hearing the other options. Guess I'll have to re-read the question carefully and think it through.
upvoted 0 times
...
Dianne
5 months ago
Hmm, I'm a bit unsure about this one. I know we covered web service references in class, but I can't quite recall all the details. I'll have to think this through carefully.
upvoted 0 times
...
Annabelle
9 months ago
I'm pretty sure the answer is B. Controlling access is like the foundation of information security, not something that's optional.
upvoted 0 times
...
Brandon
9 months ago
Hmm, I don't know. Maybe I should just 'asset' my way through this question and hope for the best.
upvoted 0 times
Lashaunda
8 months ago
I think option B does NOT fulfill the purpose
upvoted 0 times
...
Leota
8 months ago
C) Assigning the responsibility for appropriately classifying and protecting information and other associated assets to the asset owners
upvoted 0 times
...
Tamekia
8 months ago
B) Establishing rules to control physical and logical access to Information and other associated assets
upvoted 0 times
...
Garry
8 months ago
A) Conducting regular reviews of identified information and other associated assets
upvoted 0 times
...
Suzan
9 months ago
C) Assigning the responsibility for appropriately classifying and protecting information and other associated assets to the asset owners
upvoted 0 times
...
Eric
9 months ago
B) Establishing rules to control physical and logical access to Information and other associated assets
upvoted 0 times
...
Jesse
9 months ago
A) Conducting regular reviews of identified information and other associated assets
upvoted 0 times
...
...
Clorinda
10 months ago
Wait, are we supposed to be protecting the assets or the assets' feelings? Because if it's the latter, then option C is the way to go.
upvoted 0 times
Alise
8 months ago
C) Assigning the responsibility for appropriately classifying and protecting information and other associated assets to the asset owners
upvoted 0 times
...
Paulina
8 months ago
B) Establishing rules to control physical and logical access to Information and other associated assets
upvoted 0 times
...
Macy
10 months ago
A) Conducting regular reviews of identified information and other associated assets
upvoted 0 times
...
...
Octavio
10 months ago
Option A seems like the right choice to me. Conducting regular reviews to ensure the identified assets are up-to-date is essential for this control.
upvoted 0 times
Tarra
8 months ago
I think all the options fulfill the purpose of control 5.9 inventory of Information and other associated assets.
upvoted 0 times
...
Salena
8 months ago
Assigning responsibility to asset owners is key in protecting information and assets.
upvoted 0 times
...
Arlette
10 months ago
Establishing rules for controlling access is also important to ensure information security.
upvoted 0 times
...
Millie
10 months ago
I agree, conducting regular reviews is crucial for keeping track of the organization's assets.
upvoted 0 times
...
...
Rebbecca
11 months ago
I think option B is the correct answer. Establishing rules to control access is crucial for preserving information security, not something that doesn't fulfill the purpose.
upvoted 0 times
Marcelle
10 months ago
User 2: I agree, establishing rules to control access is crucial for preserving information security.
upvoted 0 times
...
Bev
10 months ago
User 1: I think option B is the correct answer.
upvoted 0 times
...
...
Alex
11 months ago
I think the answer is C) Assigning the responsibility for appropriately classifying and protecting information and other associated assets to the asset owners because it directly relates to assigning ownership and preserving information security.
upvoted 0 times
...
Julian
11 months ago
I disagree, I believe the answer is B) Establishing rules to control physical and logical access to Information and other associated assets.
upvoted 0 times
...
Barb
11 months ago
I think the answer is A) Conducting regular reviews of identified information and other associated assets.
upvoted 0 times
...

Save Cancel