Labour Day Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

GAQM ISO27-13-001 Dumps

ISO 27001 : 2013 - Certified Lead Auditor Questions and Answers

Question 1

What is social engineering?

Options:

A.

A group planning for a social activity in the organization

B.

Creating a situation wherein a third party gains confidential information from you

C.

The organization planning an activity for welfare of the neighborhood

Question 2

Which is the glue that ties the triad together

Options:

A.

Process

B.

People

C.

Collaboration

D.

Technology

Question 3

What is an example of a human threat?

Options:

A.

a lightning strike

B.

fire

C.

phishing

D.

thunderstrom

Question 4

Integrity of data means

Options:

A.

Accuracy and completeness of the data

B.

Data should be viewable at all times

C.

Data should be accessed by only the right people

Question 5

Changes to the information processing facilities shall be done in controlled manner.

Options:

A.

True

B.

False

Question 6

Stages of Information

Options:

A.

creation, evolution, maintenance, use, disposition

B.

creation, use, disposition, maintenance, evolution

C.

creation, distribution, use, maintenance, disposition

D.

creation, distribution, maintenance, disposition, use

Question 7

Four types of Data Classification (Choose two)

Options:

A.

Restricted Data, Confidential Data

B.

Project Data, Highly Confidential Data

C.

Financial Data, Highly Confidential Data

D.

Unrestricted Data, Highly Confidential Data

Question 8

Which threat could occur if no physical measures are taken?

Options:

A.

Unauthorised persons viewing sensitive files

B.

Confidential prints being left on the printer

C.

A server shutting down because of overheating

D.

Hackers entering the corporate network

Question 9

Cabling Security is associated with Power, telecommunication and network cabling carrying information are protected from interception and damage.

Options:

A.

True

B.

False

Question 10

CMM stands for?

Options:

A.

Capability Maturity Matrix

B.

Capacity Maturity Matrix

C.

Capability Maturity Model

D.

Capable Mature Model

Question 11

Someone from a large tech company calls you on behalf of your company to check the health of your PC, and therefore needs your user-id and password. What type of threat is this?

Options:

A.

Social engineering threat

B.

Organisational threat

C.

Technical threat

D.

Malware threat

Question 12

Why do we need to test a disaster recovery plan regularly, and keep it up to date?

Options:

A.

Otherwise the measures taken and the incident procedures planned may not be adequate

B.

Otherwise it is no longer up to date with the registration of daily occurring faults

C.

Otherwise remotely stored backups may no longer be available to the security team

Question 13

Information or data that are classified as ______ do not require labeling.

Options:

A.

Public

B.

Internal

C.

Confidential

D.

Highly Confidential

Question 14

A member of staff denies sending a particular message.

Which reliability aspect of information is in danger here?

Options:

A.

availability

B.

correctness

C.

integrity

D.

confidentiality

Question 15

An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.

Options:

A.

True

B.

False