New Year Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70percent

GAQM ISO-ISMS-LA ISO 27001:2013 ISMS - Certified Lead Auditor Exam Practice Test

Demo: 15 questions
Total 100 questions

ISO 27001:2013 ISMS - Certified Lead Auditor Questions and Answers

Question 1

An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.

Options:

A.

True

B.

False

Question 2

A member of staff denies sending a particular message. 

Which reliability aspect of information is in danger here? 

Options:

A.

availability 

B.

correctness 

C.

integrity

D.

confidentiality

Question 3

Which reliability aspect of information is compromised when a staff member denies having sent a message?

Options:

A.

Confidentiality

B.

Integrity 

C.

Availability

D.

Correctness

Question 4

Information Security is a matter of building and maintaining ________ .

Options:

A.

Confidentiality

B.

Trust

C.

Protection

D.

Firewalls

Question 5

Often, people do not pick up their prints from a shared printer. How can this affect the confidentiality of information?

Options:

A.

Confidentiality cannot be guaranteed

B.

Integrity cannot be guaranteed

C.

Authenticity cannot be guaranteed

D.

Availability cannot be guaranteed

Question 6

Does the security have the right to ask you to display your ID badges and check your bags?

Options:

A.

True

B.

False

Question 7

What is a definition of compliance? 

Options:

A.

Laws, considered collectively or the process of making or enacting laws 

B.

The state or fact of according with or meeting rules or standards

C.

An official or authoritative instruction 

D.

A rule or directive made and maintained by an authority.

Question 8

What is the standard definition of ISMS? 

Options:

A.

Is an information security systematic approach to achieve business objectives for implementation, establishing, reviewing,operating and maintaining organization's reputation.

B.

A company wide business objectives to achieve information security awareness for establishing, implementing, operating, monitoring, reviewing, maintaining and improving

C.

A project-based approach to achieve business objectives for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organization’s information security

D.

A systematic approach for establishing, implementing, operating,monitoring, reviewing,  maintaining and improving an organization’s information security to achieve business objectives.

Question 9

Which of the following statements are correct for Clean Desk Policy?

Options:

A.

Don't leave confidential documents on your desk.

B.

Don't leave valuable items on your desk if you are not in your work area.

C.

Don't leave highly confidential items.

D.

Don't leave laptops without cable lock.

Question 10

Backup media is kept in the same secure area as the servers. What risk may the organisation be exposed to? 

Options:

A.

Unauthorised persons will have access to both the servers and backups 

B.

Responsibility for the backups is not defined well

C.

After a fire, the information systems cannot be restored

D.

After a server crash, it will take extra time to bring it back up again

Question 11

Which of the following does an Asset Register contain? (Choose two)

Options:

A.

Asset Type

B.

Asset Owner

C.

Asset Modifier

D.

Process ID

Question 12

The following are purposes of Information Security, except:

Options:

A.

Ensure Business Continuity

B.

Minimize Business Risk

C.

Increase Business Assets

D.

Maximize Return on Investment

Question 13

Implement plan on a test basis - this comes under which section of PDCA

Options:

A.

Plan

B.

Do

C.

Act

D.

Check

Question 14

Who is authorized to change the classification of a document?

Options:

A.

The author of the document 

B.

The administrator of the document 

C.

The owner of the document

D.

The manager of the owner of the document  

Question 15

What would be the reference for you to know who should have access to data/document?

Options:

A.

Data Classification Label

B.

Access Control List (ACL)

C.

Masterlist of Project Records (MLPR)

D.

Information Rights Management (IRM)

Demo: 15 questions
Total 100 questions