ISO-ISMS-LA Dumps ISO-ISMS-LA Braindumps ISO-ISMS-LA Real Questions ISO-ISMS-LA Practice Test ISO-ISMS-LA Actual Questions GAQM ISO-ISMS-LA ISO 27001:2023 ISMS - Certified Lead Auditor https://killexams.com/pass4sure/exam-detail/ISO-ISMS-LA Question: 15 Stages of Information A. creation, evolution, maintenance, use, disposition B. creation, use, disposition, maintenance, evolution C. creation, distribution, use, maintenance, disposition D. creation, distribution, maintenance, disposition, use Answer: C Question: 16 Below is Purpose of "Integrity", which is one of the Basic Components of Information Security A. the property that information is not made available or disclosed to unauthorized individuals B. the property of safeguarding the accuracy and completeness of assets. C. the property that information is not made available or disclosed to unauthorized individuals D. the property of being accessible and usable upon demand by an authorized entity. Answer: B Question: 17 You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called A. Shoulder Surfing B. Mountaineering C. Phishing D. Spoofing Answer: C Question: 18 Which of the following is a preventive security measure? A. Installing logging and monitoring software B. Shutting down the Internet connection after an attack C. Storing sensitive information in a data save Answer: C Question: 19 Four types of Data Classification (Choose two) A. Restricted Data, Confidential Data B. Project Data, Highly Confidential Data C. Financial Data, Highly Confidential Data D. Unrestricted Data, Highly Confidential Data Answer: A,D Question: 20 What is the name of the system that guarantees the coherence of information security in the organization? A. Information Security Management System (ISMS) B. Rootkit C. Security regulations for special information for the government D. Information Technology Service Management (ITSM) Answer: A Question: 21 CEO sends a mail giving his views on the status of the company and the companyâs future strategy and the CEO's vision and the employee's part in it. The mail should be classified as A. Internal Mail B. Public Mail C. Confidential Mail D. Restricted Mail Answer: A Question: 22 Which department maintain's contacts with law enforcement authorities, regulatory bodies, information service providers and telecommunications service providers depending on the service required. A. COO B. CISO C. CSM D. MRO Answer: B Question: 23 Information has a number of reliability aspects. Reliability is constantly being threatened. Examples of threats are: a cable becomes loose, someone alters information by accident, data is used privately or is falsified. Which of these examples is a threat to integrity? A. a loose cable B. accidental alteration of data C. private use of data D. System restart Answer: B Question: 24 The following are definitions of Information, except: A. accurate and timely data B. specific and organized data for a purpose C. mature and measurable data D. can lead to understanding and decrease in uncertainty Answer: C Question: 25 Which of the following does an Asset Register contain? (Choose two) A. Asset Type B. Asset Owner C. Asset Modifier D. Process ID Answer: A,B Question: 26 Why do we need to test a disaster recovery plan regularly, and keep it up to date? A. Otherwise the measures taken and the incident procedures planned may not be adequate B. Otherwise it is no longer up to date with the registration of daily occurring faults C. Otherwise remotely stored backups may no longer be available to the security team Answer: A Question: 27 Information Security is a matter of building and maintaining ________ . A. Confidentiality B. Trust C. Protection D. Firewalls Answer: B Question: 28 An employee caught temporarily storing an MP3 file in his workstation will not receive an IR. A. True B. False Answer: B Question: 29 What is the goal of classification of information? A. To create a manual about how to handle mobile devices B. Applying labels making the information easier to recognize C. Structuring information according to its sensitivity Answer: C Question: 30 In which order is an Information Security Management System set up? A. Implementation, operation, maintenance, establishment B. Implementation, operation, improvement, maintenance C. Establishment, implementation, operation, maintenance D. Establishment, operation, monitoring, improvement Answer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