ISO27-13-001 Dumps

ISO27-13-001 Braindumps ISO27-13-001 Real Questions ISO27-13-001 Practice Test ISO27-13-001 Actual Questions


GAQM


ISO27-13-001


ISO 27001:2023 - Certified Lead Auditor


https://killexams.com/pass4sure/exam-detail/ISO27-13-001


Question: 16


What is the goal of classification of information?


  1. To create a manual about how to handle mobile devices

  2. Applying labels making the information easier to recognize

  3. Structuring information according to its sensitivity


Answer: C Question: 17

You have a hard copy of a customer design document that you want to dispose off. What would you do

  1. Throw it in any dustbin

  2. Shred it using a shredder

  3. Give it to the office boy to reuse it for other purposes

  4. Be environment friendly and reuse it for writing


Answer: B Question: 18

You receive the following mail from the IT support team: Dear User, Starting next week, we will be deleting all inactive email accounts in order to create spaceshare the below details in order to continue using your account.


In case of no response, Name:

Email ID: Password: DOB:

Kindly contact the webmail team for any further support. Thanks for your attention. Which of the following is the best response?

  1. Ignore the email

  2. Respond it by saying that one should not share the password with anyone

  3. One should not respond to these mails and report such email to your supervisor

Answer: C Question: 19

As a new member of the IT department you have noticed that confidential information has been leaked several times.

This may damage the reputation of the company. You have been asked to propose an


organisational measure to protect laptop computers.


What is the first step in a structured approach to come up with this measure?


  1. Appoint security staff

  2. Encrypt all sensitive information

  3. Formulate a policy

  4. Set up an access control procedure


Answer: C Question: 20

An administration office is going to determine the dangers to which it is exposed.


What do we call a possible event that can have a disruptive effect on the reliability of information?


  1. dependency

  2. threat

  3. vulnerability

  4. risk


Answer: B Question: 21

A well-executed risk analysis provides a great deal of useful information. A risk analysis has four main objectives. What is not one of the four main objectives of a risk analysis?

  1. Identifying assets and their value

  2. Implementing counter measures

  3. Establishing a balance between the costs of an incident and the costs of a security measure

  4. Determining relevant vulnerabilities and threats


Answer: B Question: 22

You see a blue color sticker on certain physical assets. What does this signify?

  1. The asset is very high critical and its failure affects the entire organization

  2. The asset with blue stickers should be kept air conditioned at all times

  3. The asset is high critical and its failure will affect a group/s/project's work in the organization

  4. The asset is critical and the impact is restricted to an employee only


Answer: C Question: 23

How are data and information related?


  1. Data is a collection of structured and unstructured information

  2. Information consists of facts and statistics collected together for reference or analysis

  3. When meaning and value are assigned to data, it becomes information


Answer: C Question: 24 CMM stands for?

  1. Capability Maturity Matrix

  2. Capacity Maturity Matrix

  3. Capability Maturity Model

  4. Capable Mature Model


Answer: C Question: 25

Who are allowed to access highly confidential files?


  1. Employees with a business need-to-know

  2. Contractors with a business need-to-know

  3. Employees with signed NDA have a business need-to-know

  4. Non-employees designated with approved access and have signed NDA


Answer: C Question: 26

What is an example of a human threat?


  1. a lightning strike

  2. fire

  3. phishing

  4. thunderstrom


Answer: C Question: 27

A property of Information that has the ability to prove occurrence of a claimed event.

  1. Electronic chain letters

  2. Integrity

  3. Availability

  4. Accessibility


Answer: B Question: 28

An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.


  1. True

  2. False


Answer: B Question: 29

Which reliability aspect of information is compromised when a staff member denies having sent a message?


  1. Confidentiality

  2. Integrity

  3. Availability

  4. Correctness


Answer: B Question: 30

What type of compliancy standard, regulation or legislation provides a code of practice for information security?


  1. ISO/IEC 27002

  2. Personal data protection act

  3. Computer criminality act

  4. IT Service Management


Answer: A