ISO27-13-001 Dumps ISO27-13-001 Braindumps ISO27-13-001 Real Questions ISO27-13-001 Practice Test ISO27-13-001 Actual Questions GAQM ISO27-13-001 ISO 27001:2023 - Certified Lead Auditor https://killexams.com/pass4sure/exam-detail/ISO27-13-001 Question: 16 What is the goal of classification of information? A. To create a manual about how to handle mobile devices B. Applying labels making the information easier to recognize C. Structuring information according to its sensitivity Answer: C Question: 17 You have a hard copy of a customer design document that you want to dispose off. What would you do A. Throw it in any dustbin B. Shred it using a shredder C. Give it to the office boy to reuse it for other purposes D. Be environment friendly and reuse it for writing Answer: B Question: 18 You receive the following mail from the IT support team: Dear User, Starting next week, we will be deleting all inactive email accounts in order to create spaceshare the below details in order to continue using your account. In case of no response, Name: Email ID: Password: DOB: Kindly contact the webmail team for any further support. Thanks for your attention. Which of the following is the best response? A. Ignore the email B. Respond it by saying that one should not share the password with anyone C. One should not respond to these mails and report such email to your supervisor Answer: C Question: 19 As a new member of the IT department you have noticed that confidential information has been leaked several times. This may damage the reputation of the company. You have been asked to propose an organisational measure to protect laptop computers. What is the first step in a structured approach to come up with this measure? A. Appoint security staff B. Encrypt all sensitive information C. Formulate a policy D. Set up an access control procedure Answer: C Question: 20 An administration office is going to determine the dangers to which it is exposed. What do we call a possible event that can have a disruptive effect on the reliability of information? A. dependency B. threat C. vulnerability D. risk Answer: B Question: 21 A well-executed risk analysis provides a great deal of useful information. A risk analysis has four main objectives. What is not one of the four main objectives of a risk analysis? A. Identifying assets and their value B. Implementing counter measures C. Establishing a balance between the costs of an incident and the costs of a security measure D. Determining relevant vulnerabilities and threats Answer: B Question: 22 You see a blue color sticker on certain physical assets. What does this signify? A. The asset is very high critical and its failure affects the entire organization B. The asset with blue stickers should be kept air conditioned at all times C. The asset is high critical and its failure will affect a group/s/project's work in the organization D. The asset is critical and the impact is restricted to an employee only Answer: C Question: 23 How are data and information related? A. Data is a collection of structured and unstructured information B. Information consists of facts and statistics collected together for reference or analysis C. When meaning and value are assigned to data, it becomes information Answer: C Question: 24 CMM stands for? A. Capability Maturity Matrix B. Capacity Maturity Matrix C. Capability Maturity Model D. Capable Mature Model Answer: C Question: 25 Who are allowed to access highly confidential files? A. Employees with a business need-to-know B. Contractors with a business need-to-know C. Employees with signed NDA have a business need-to-know D. Non-employees designated with approved access and have signed NDA Answer: C Question: 26 What is an example of a human threat? A. a lightning strike B. fire C. phishing D. thunderstrom Answer: C Question: 27 A property of Information that has the ability to prove occurrence of a claimed event. A. Electronic chain letters B. Integrity C. Availability D. Accessibility Answer: B Question: 28 An employee caught temporarily storing an MP3 file in his workstation will not receive an IR. A. True B. False Answer: B Question: 29 Which reliability aspect of information is compromised when a staff member denies having sent a message? A. Confidentiality B. Integrity C. Availability D. Correctness Answer: B Question: 30 What type of compliancy standard, regulation or legislation provides a code of practice for information security? A. ISO/IEC 27002 B. Personal data protection act C. Computer criminality act D. IT Service Management Answer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