ISO-ISMS-LA Dumps
ISO-ISMS-LA Braindumps ISO-ISMS-LA Real Questions ISO-ISMS-LA Practice Test
ISO-ISMS-LA Actual Questions
ISO 27001:2023 ISMS - Certified Lead Auditor
https://killexams.com/pass4sure/exam-detail/ISO-ISMS-LA
Stages of Information
creation, evolution, maintenance, use, disposition
creation, use, disposition, maintenance, evolution
creation, distribution, use, maintenance, disposition
creation, distribution, maintenance, disposition, use
Below is Purpose of "Integrity", which is one of the Basic Components of Information Security
the property that information is not made available or disclosed to unauthorized individuals
the property of safeguarding the accuracy and completeness of assets.
the property that information is not made available or disclosed to unauthorized individuals
the property of being accessible and usable upon demand by an authorized entity.
You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called
Shoulder Surfing
Mountaineering
Phishing
Spoofing
Which of the following is a preventive security measure?
Installing logging and monitoring software
Shutting down the Internet connection after an attack
Storing sensitive information in a data save
Four types of Data Classification (Choose two)
Restricted Data, Confidential Data
Project Data, Highly Confidential Data
Financial Data, Highly Confidential Data
Unrestricted Data, Highly Confidential Data
What is the name of the system that guarantees the coherence of information security in the organization?
Information Security Management System (ISMS)
Rootkit
Security regulations for special information for the government
Information Technology Service Management (ITSM)
CEO sends a mail giving his views on the status of the company and the companyĆ¢s future strategy and the CEO's vision and the employee's part in it. The mail should be classified as
Internal Mail
Public Mail
Confidential Mail
Restricted Mail
Which department maintain's contacts with law enforcement authorities, regulatory bodies, information service providers and telecommunications service providers depending on the service required.
COO
CISO
CSM
MRO
Information has a number of reliability aspects. Reliability is constantly being threatened. Examples of threats are: a cable becomes loose, someone alters information by accident, data is used privately or is falsified.
Which of these examples is a threat to integrity?
a loose cable
accidental alteration of data
private use of data
System restart
The following are definitions of Information, except:
accurate and timely data
specific and organized data for a purpose
mature and measurable data
can lead to understanding and decrease in uncertainty
Which of the following does an Asset Register contain? (Choose two)
Asset Type
Asset Owner
Asset Modifier
Process ID
Why do we need to test a disaster recovery plan regularly, and keep it up to date?
Otherwise the measures taken and the incident procedures planned may not be adequate
Otherwise it is no longer up to date with the registration of daily occurring faults
Otherwise remotely stored backups may no longer be available to the security team
Information Security is a matter of building and maintaining .
Confidentiality
Trust
Protection
Firewalls
An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.
True
False
What is the goal of classification of information?
To create a manual about how to handle mobile devices
Applying labels making the information easier to recognize
Structuring information according to its sensitivity
In which order is an Information Security Management System set up?
Implementation, operation, maintenance, establishment
Implementation, operation, improvement, maintenance
Establishment, implementation, operation, maintenance
Establishment, operation, monitoring, improvement