Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

GAQM ISO-IEC-LI Dumps

Page: 1 / 2
Total 50 questions

ISO / IEC 27002 - Lead Implementer Questions and Answers

Question 1

What should be used to protect data on removable media if data confidentiality or integrity are important considerations?

Options:

A.

backup on another removable medium

B.

cryptographic techniques

C.

a password

D.

logging

Question 2

Select risk control activities for domain "10. Encryption" of ISO / 27002: 2013 (Choose two)

Options:

A.

Work in safe areas

B.

Cryptographic Controls Use Policy

C.

Physical security perimeter

D.

Key management

Question 3

Who is accountable to classify information assets?

Options:

A.

the CEO

B.

the CISO

C.

the Information Security Team

D.

the asset owner

Question 4

ISO 27002 provides guidance in the following area

Options:

A.

PCI environment scoping

B.

Information handling recommendations

C.

Framework for an overall security and compliance program

D.

Detailed lists of required policies and procedures

Question 5

An employee in the administrative department of Smiths Consultants Inc. finds out that the expiry date of a contract with one of the clients is earlier than the start date. What type of measure could prevent this error?

Options:

A.

Availability measure

B.

Integrity measure

C.

Organizational measure

D.

Technical measure

Question 6

You are a consultant and are regularly hired by the Ministry of Defense to perform analysis. Since the assignments are irregular, you outsource the administration of your business to temporary workers. You don't want the temporary workers to have access to your reports.

Which reliability aspect of the information in your reports must you protect?

Options:

A.

Availability

B.

Integrity

C.

Confidentiality

Question 7

What is the best way to comply with legislation and regulations for personal data protection?

Options:

A.

Performing a threat analysis

B.

Maintaining an incident register

C.

Performing a vulnerability analysis

D.

Appointing the responsibility to someone

Page: 1 / 2
Total 50 questions