Summer Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sixtybuddy

ISO-ISMS-LA ISO 27001:2013 ISMS - Certified Lead Auditor Questions and Answers

Questions 4

What type of measure involves the stopping of possible consequences of security incidents?

Options:

A.

Corrective

B.

Detective

C.

Repressive 

D.

Preventive

Buy Now
Questions 5

An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.

Options:

A.

True

B.

False

Buy Now
Questions 6

There was a fire in a branch of the company Midwest Insurance. The fire department quickly arrived at the scene and could extinguish the fire before it spread and burned down the entire premises. The server, however, was destroyed in the fire. The backup tapes kept in another room had melted and many other documents were lost for good. 

What is an example of the indirect damage caused by this fire?

Options:

A.

Melted backup tapes

B.

Burned computer systems

C.

Burned documents

D.

Water damage due to the fire extinguishers 

Buy Now
Questions 7

There is a network printer in the hallway of the company where you work. Many employees don’t pick up their printouts immediately and leave them on the printer. 

What are the consequences of this to the reliability of the information?

Options:

A.

The integrity of the information is no longer guaranteed.

B.

The availability of the information is no longer guaranteed.

C.

The confidentiality of the information is no longer guaranteed.

D.

The Security of the information is no longer guaranteed.

Buy Now
Questions 8

What is the name of the system that guarantees the coherence of information security in the organization? 

Options:

A.

 Information Security Management System (ISMS)

B.

Rootkit

C.

Security regulations for special information for the government 

D.

Information Technology Service Management (ITSM)

Buy Now
Questions 9

Who is responsible for Initial asset allocation to the user/custodian of the assets?

Options:

A.

Asset Manager

B.

Asset Owner

C.

Asset Practitioner

D.

Asset Stakeholder

Buy Now
Questions 10

What type of compliancy standard, regulation or legislation provides a code of practice for information security?

Options:

A.

ISO/IEC 27002 

B.

Personal data protection act

C.

Computer criminality act

D.

IT Service Management

Buy Now
Questions 11

Who are allowed to access highly confidential files?

Options:

A.

Employees with a business need-to-know

B.

Contractors with a business need-to-know

C.

Employees with signed NDA have a business need-to-know

D.

Non-employees designated with approved access and have signed NDA

Buy Now
Questions 12

What type of system ensures a coherent Information Security organisation? 

Options:

A.

Federal Information Security Management Act (FISMA) 

B.

Information Technology Service Management System (ITSM)

C.

Information Security Management System (ISMS) 

D.

Information Exchange Data System (IEDS)

Buy Now
Questions 13

Information Security is a matter of building and maintaining ________ .

Options:

A.

Confidentiality

B.

Trust

C.

Protection

D.

Firewalls

Buy Now
Questions 14

Which of the following is a possible event that can have a disruptive effect on the reliability of information? 

Options:

A.

Threat

B.

Risk

C.

Vulnerability

D.

Dependency

Buy Now
Questions 15

In acceptable use of Information Assets, which is the best practice?

Options:

A.

Access to information and communication systems are provided for business purpose only

B.

Interfering with or denying service to any user other than the employee's host

C.

Playing any computer games during office hours

D.

Accessing phone or network transmissions, including wireless or wifi transmissions

Buy Now
Exam Code: ISO-ISMS-LA
Exam Name: ISO 27001:2013 ISMS - Certified Lead Auditor
Last Update: Apr 20, 2024
Questions: 100

PDF + Testing Engine

$130

Testing Engine

$95

PDF (Q&A)

$80