Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: netbudy65

ISO27-13-001 ISO 27001 : 2013 - Certified Lead Auditor Questions and Answers

Questions 4

There is a network printer in the hallway of the company where you work. Many employees don’t pick up their printouts immediately and leave them on the printer.

What are the consequences of this to the reliability of the information?

Options:

A.

The integrity of the information is no longer guaranteed.

B.

The availability of the information is no longer guaranteed.

C.

The confidentiality of the information is no longer guaranteed.

D.

The Security of the information is no longer guaranteed.

Buy Now
Questions 5

As a new member of the IT department you have noticed that confidential information has been leaked several times. This may damage the reputation of the company. You have been asked to propose an

organisational measure to protect laptop computers. What is the first step in a structured approach to come up with this measure?

Options:

A.

Appoint security staff

B.

Encrypt all sensitive information

C.

Formulate a policy

D.

Set up an access control procedure

Buy Now
Questions 6

An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.

Options:

A.

True

B.

False

Buy Now
Questions 7

Which of the following does a lack of adequate security controls represent?

Options:

A.

Asset

B.

Vulnerability

C.

Impact

D.

Threat

Buy Now
Questions 8

In acceptable use of Information Assets, which is the best practice?

Options:

A.

Access to information and communication systems are provided for business purpose only

B.

Interfering with or denying service to any user other than the employee's host

C.

Playing any computer games during office hours

D.

Accessing phone or network transmissions, including wireless or wifi transmissions

Buy Now
Questions 9

What is we do in ACT - From PDCA cycle

Options:

A.

Take actions to continually monitor process performance

B.

Take actions to continually improve process performance

C.

Take actions to continually monitor process performance

D.

Take actions to continually improve people performance

Buy Now
Questions 10

A hacker gains access to a web server and reads the credit card numbers stored on that server. Which security principle is violated?

Options:

A.

Availability

B.

Confidentiality

C.

Integrity

D.

Authenticity

Buy Now
Questions 11

Who is authorized to change the classification of a document?

Options:

A.

The author of the document

B.

The administrator of the document

C.

The owner of the document

D.

The manager of the owner of the document

Buy Now
Questions 12

Which is the glue that ties the triad together

Options:

A.

Process

B.

People

C.

Collaboration

D.

Technology

Buy Now
Questions 13

Phishing is what type of Information Security Incident?

Options:

A.

Private Incidents

B.

Cracker/Hacker Attacks

C.

Technical Vulnerabilities

D.

Legal Incidents

Buy Now
Questions 14

Which measure is a preventive measure?

Options:

A.

Installing a logging system that enables changes in a system to be recognized

B.

Shutting down all internet traffic after a hacker has gained access to the company systems

C.

Putting sensitive information in a safe

Buy Now
Questions 15

Integrity of data means

Options:

A.

Accuracy and completeness of the data

B.

Data should be viewable at all times

C.

Data should be accessed by only the right people

Buy Now
Exam Code: ISO27-13-001
Exam Name: ISO 27001 : 2013 - Certified Lead Auditor
Last Update: Apr 29, 2024
Questions: 100

PDF + Testing Engine

$130

Testing Engine

$95

PDF (Q&A)

$80