Leads4pass > GAQM > GAQM: ISO > ISO-ISMS-LA > ISO-ISMS-LA Online Practice Questions and Answers

ISO-ISMS-LA Online Practice Questions and Answers

Questions 4

The following are purposes of Information Security, except:

A. Ensure Business Continuity

B. Minimize Business Risk

C. Increase Business Assets

D. Maximize Return on Investment

Buy Now
Questions 5

Which threat could occur if no physical measures are taken?

A. Unauthorised persons viewing sensitive files

B. Confidential prints being left on the printer

C. A server shutting down because of overheating

D. Hackers entering the corporate network

Buy Now
Questions 6

Information has a number of reliability aspects. Reliability is constantly being threatened. Examples of

threats are: a cable becomes loose, someone alters information by accident, data is used privately or is

falsified.

Which of these examples is a threat to integrity?

A. a loose cable

B. accidental alteration of data

C. private use of data

D. System restart

Buy Now
Questions 7

What type of measure involves the stopping of possible consequences of security incidents?

A. Corrective

B. Detective

C. Repressive

D. Preventive

Buy Now
Questions 8

After a devastating office fire, all staff are moved to other branches of the company. At what moment in the incident management process is this measure effectuated?

A. Between incident and damage

B. Between detection and classification

C. Between recovery and normal operations

D. Between classification and escalation

Buy Now
Questions 9

What is a reason for the classification of information?

A. To provide clear identification tags

B. To structure the information according to its sensitivity

C. Creating a manual describing the BYOD policy

Buy Now
Questions 10

What controls can you do to protect sensitive data in your computer when you go out for lunch?

A. You activate your favorite screen-saver

B. You are confident to leave your computer screen as is since a password protected screensaver is installed and it is set to activate after 10 minutes of inactivity

C. You lock your computer by pressing Windows+L or CTRL-ALT-DELETE and then click "Lock Computer".

D. You turn off the monitor

Buy Now
Questions 11

A decent visitor is roaming around without visitor's ID. As an employee you should do the following, except:

A. Say "hi" and offer coffee

B. Call the receptionist and inform about the visitor

C. Greet and ask him what is his business

D. Escort him to his destination

Buy Now
Questions 12

What type of compliancy standard, regulation or legislation provides a code of practice for information security?

A. ISO/IEC 27002

B. Personal data protection act

C. Computer criminality act

D. IT Service Management

Buy Now
Questions 13

A planning process that introduced the concept of planning as a cycle that forms the basis for continuous improvement is called:

A. time based planning.

B. plan, do, check, act.

C. planning for continuous improvement.

D. RACI Matrix

Buy Now
Exam Code: ISO-ISMS-LA
Exam Name: ISO 27001:2013 ISMS - Certified Lead Auditor
Last Update: Nov 18, 2024
Questions: 100
10%OFF Coupon Code: SAVE10

PDF (Q&A)

$49.99

VCE

$55.99

PDF + VCE

$65.99