ISO-ISMS-LA Dumps

ISO-ISMS-LA Braindumps ISO-ISMS-LA Real Questions ISO-ISMS-LA Practice Test

ISO-ISMS-LA Actual Questions


GAQM


ISO-ISMS-LA


ISO 27001:2023 ISMS - Certified Lead Auditor


https://killexams.com/pass4sure/exam-detail/ISO-ISMS-LA


Question: 15


Stages of Information


  1. creation, evolution, maintenance, use, disposition

  2. creation, use, disposition, maintenance, evolution

  3. creation, distribution, use, maintenance, disposition

  4. creation, distribution, maintenance, disposition, use


Answer: C Question: 16

Below is Purpose of "Integrity", which is one of the Basic Components of Information Security


  1. the property that information is not made available or disclosed to unauthorized individuals

  2. the property of safeguarding the accuracy and completeness of assets.

  3. the property that information is not made available or disclosed to unauthorized individuals

  4. the property of being accessible and usable upon demand by an authorized entity.


Answer: B Question: 17

You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called


  1. Shoulder Surfing

  2. Mountaineering

  3. Phishing

  4. Spoofing


Answer: C Question: 18

Which of the following is a preventive security measure?


  1. Installing logging and monitoring software

  2. Shutting down the Internet connection after an attack

  3. Storing sensitive information in a data save


Answer: C Question: 19

Four types of Data Classification (Choose two)


  1. Restricted Data, Confidential Data

  2. Project Data, Highly Confidential Data

  3. Financial Data, Highly Confidential Data

  4. Unrestricted Data, Highly Confidential Data


Answer: A,D Question: 20

What is the name of the system that guarantees the coherence of information security in the organization?


  1. Information Security Management System (ISMS)

  2. Rootkit

  3. Security regulations for special information for the government

  4. Information Technology Service Management (ITSM)


Answer: A Question: 21

CEO sends a mail giving his views on the status of the company and the companyĆ¢s future strategy and the CEO's vision and the employee's part in it. The mail should be classified as


  1. Internal Mail

  2. Public Mail

  3. Confidential Mail

  4. Restricted Mail


Answer: A Question: 22

Which department maintain's contacts with law enforcement authorities, regulatory bodies, information service providers and telecommunications service providers depending on the service required.


  1. COO

  2. CISO

  3. CSM

  4. MRO


Answer: B Question: 23

Information has a number of reliability aspects. Reliability is constantly being threatened. Examples of threats are: a cable becomes loose, someone alters information by accident, data is used privately or is falsified.


Which of these examples is a threat to integrity?

  1. a loose cable

  2. accidental alteration of data

  3. private use of data

  4. System restart


Answer: B Question: 24

The following are definitions of Information, except:


  1. accurate and timely data

  2. specific and organized data for a purpose

  3. mature and measurable data

  4. can lead to understanding and decrease in uncertainty


Answer: C Question: 25

Which of the following does an Asset Register contain? (Choose two)


  1. Asset Type

  2. Asset Owner

  3. Asset Modifier

  4. Process ID


Answer: A,B Question: 26

Why do we need to test a disaster recovery plan regularly, and keep it up to date?


  1. Otherwise the measures taken and the incident procedures planned may not be adequate

  2. Otherwise it is no longer up to date with the registration of daily occurring faults

  3. Otherwise remotely stored backups may no longer be available to the security team


Answer: A Question: 27

Information Security is a matter of building and maintaining .


  1. Confidentiality

  2. Trust

  3. Protection

  4. Firewalls


Answer: B Question: 28

An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.


  1. True

  2. False


Answer: B Question: 29

What is the goal of classification of information?


  1. To create a manual about how to handle mobile devices

  2. Applying labels making the information easier to recognize

  3. Structuring information according to its sensitivity


Answer: C Question: 30

In which order is an Information Security Management System set up?


  1. Implementation, operation, maintenance, establishment

  2. Implementation, operation, improvement, maintenance

  3. Establishment, implementation, operation, maintenance

  4. Establishment, operation, monitoring, improvement


Answer: C