Black Friday Special Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: mxmas70

Home > GAQM > GAQM: ISO > ISO-ISMS-LA

ISO-ISMS-LA ISO 27001:2013 ISMS - Certified Lead Auditor Question and Answers

Question # 4

What is the security management term for establishing whether someone's identity is correct?

A.

Identification

B.

Authentication

C.

Authorisation

D.

Verification

Full Access
Question # 5

In which order is an Information Security Management System set up? 

A.

Implementation, operation, maintenance, establishment

B.

Implementation, operation, improvement, maintenance 

C.

Establishment, implementation, operation, maintenance

D.

Establishment, operation, monitoring, improvement 

Full Access
Question # 6

What is the standard definition of ISMS? 

A.

Is an information security systematic approach to achieve business objectives for implementation, establishing, reviewing,operating and maintaining organization's reputation.

B.

A company wide business objectives to achieve information security awareness for establishing, implementing, operating, monitoring, reviewing, maintaining and improving

C.

A project-based approach to achieve business objectives for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organization’s information security

D.

A systematic approach for establishing, implementing, operating,monitoring, reviewing,  maintaining and improving an organization’s information security to achieve business objectives.

Full Access
Question # 7

Which department maintain's contacts with law enforcement authorities, regulatory

bodies, information service providers and telecommunications service providers depending on the service required.

A.

COO

B.

CISO

C.

CSM

D.

MRO

Full Access
Question # 8

What is a definition of compliance? 

A.

Laws, considered collectively or the process of making or enacting laws 

B.

The state or fact of according with or meeting rules or standards

C.

An official or authoritative instruction 

D.

A rule or directive made and maintained by an authority.

Full Access
Question # 9

You have a hard copy of a customer design document that you want to dispose off. What would you do

A.

Throw it in any dustbin

B.

Shred it using a shredder

C.

Give it to the office boy to reuse it for other purposes

D.

Be environment friendly and reuse it for writing

Full Access
Question # 10

A property of Information that has the ability to prove occurrence of a claimed event.

A.

Electronic chain letters 

B.

Integrity

C.

Availability

D.

Accessibility

Full Access
Question # 11

Information Security is a matter of building and maintaining ________ .

A.

Confidentiality

B.

Trust

C.

Protection

D.

Firewalls

Full Access
Question # 12

All are prohibited in acceptable use of information assets, except:

A.

Electronic chain letters

B.

E-mail copies to non-essential readers

C.

Company-wide e-mails with supervisor/TL permission.

D.

Messages with very large attachments or to a large number ofrecipients.

Full Access
Question # 13

The following are definitions of Information, except:

A.

accurate and timely data

B.

specific and organized data for a purpose

C.

mature and measurable data

D.

can lead to understanding and decrease in uncertainty

Full Access
Question # 14

An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.

A.

True

B.

False

Full Access
Question # 15

A hacker gains access to a web server and reads the credit card numbers stored on that server. Which security principle is violated? 

A.

Availability

B.

Confidentiality

C.

Integrity 

D.

Authenticity 

Full Access