Summer Sale Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 28522818

Home > GAQM > GAQM: ISO > ISO27-13-001

ISO27-13-001 ISO 27001 : 2013 - Certified Lead Auditor Question and Answers

Question # 4

Backup media is kept in the same secure area as the servers. What risk may the organisation be exposed to?

A.

Unauthorised persons will have access to both the servers and backups

B.

Responsibility for the backups is not defined well

C.

After a fire, the information systems cannot be restored

D.

After a server crash, it will take extra time to bring it back up again

Full Access
Question # 5

Four types of Data Classification (Choose two)

A.

Restricted Data, Confidential Data

B.

Project Data, Highly Confidential Data

C.

Financial Data, Highly Confidential Data

D.

Unrestricted Data, Highly Confidential Data

Full Access
Question # 6

CMM stands for?

A.

Capability Maturity Matrix

B.

Capacity Maturity Matrix

C.

Capability Maturity Model

D.

Capable Mature Model

Full Access
Question # 7

In which order is an Information Security Management System set up?

A.

Implementation, operation, maintenance, establishment

B.

Implementation, operation, improvement, maintenance

C.

Establishment, implementation, operation, maintenance

D.

Establishment, operation, monitoring, improvement

Full Access
Question # 8

What type of measure involves the stopping of possible consequences of security incidents?

A.

Corrective

B.

Detective

C.

Repressive

D.

Preventive

Full Access
Question # 9

How is the purpose of information security policy best described?

A.

An information security policy documents the analysis of risks and the search for countermeasures.

B.

An information security policy provides direction and support to the management regarding information security.

C.

An information security policy makes the security plan concrete by providing it with the necessary details.

D.

An information security policy provides insight into threats and the possible consequences.

Full Access
Question # 10

You have a hard copy of a customer design document that you want to dispose off. What would you do

A.

Throw it in any dustbin

B.

Shred it using a shredder

C.

Give it to the office boy to reuse it for other purposes

D.

Be environment friendly and reuse it for writing

Full Access
Question # 11

Who is responsible for Initial asset allocation to the user/custodian of the assets?

A.

Asset Manager

B.

Asset Owner

C.

Asset Practitioner

D.

Asset Stakeholder

Full Access
Question # 12

The computer room is protected by a pass reader. Only the System Management department has a pass.

What type of security measure is this?

A.

a corrective security measure

B.

a physical security measure

C.

a logical security measure

D.

a repressive security measure

Full Access
Question # 13

In what part of the process to grant access to a system does the user present a token?

A.

Authorisation

B.

Verification

C.

Authentication

D.

Identification

Full Access
Question # 14

What is the name of the system that guarantees the coherence of information security in the organization?

A.

Information Security Management System (ISMS)

B.

Rootkit

C.

Security regulations for special information for the government

D.

Information Technology Service Management (ITSM)

Full Access
Question # 15

Changes on project-managed applications or database should undergo the change control process as documented.

A.

True

B.

False

Full Access