Black Friday Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

GAQM ISO-ISMS-LA ISO 27001:2013 ISMS - Certified Lead Auditor Exam Practice Test

Page: 1 / 10
Total 100 questions

ISO 27001:2013 ISMS - Certified Lead Auditor Questions and Answers

Question 1

We can leave laptops during weekdays or weekends in locked bins.

Options:

A.

True

B.

False

Question 2

You see a blue color sticker on certain physical assets. What does this signify?

Options:

A.

The asset is very high critical and its failure affects the entire organization

B.

The asset with blue stickers should be kept air conditioned at all times

C.

The asset is high critical and its failure will affect a group/s/project's work in the organization

D.

The asset is critical and the impact is restricted to an employee only

Question 3

-------------------------is an asset like other important business assets has value to an organization and consequently needs to be protected.

Options:

A.

Infrastructure

B.

Data

C.

Information

D.

Security

Question 4

What is the name of the system that guarantees the coherence of information security in the organization? 

Options:

A.

 Information Security Management System (ISMS)

B.

Rootkit

C.

Security regulations for special information for the government 

D.

Information Technology Service Management (ITSM)

Question 5

You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called

Options:

A.

Shoulder Surfing

B.

Mountaineering

C.

Phishing

D.

Spoofing

Question 6

What type of measure involves the stopping of possible consequences of security incidents?

Options:

A.

Corrective

B.

Detective

C.

Repressive 

D.

Preventive

Question 7

Implement plan on a test basis - this comes under which section of PDCA

Options:

A.

Plan

B.

Do

C.

Act

D.

Check

Question 8

An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.

Options:

A.

True

B.

False

Question 9

There was a fire in a branch of the company Midwest Insurance. The fire department quickly arrived at the scene and could extinguish the fire before it spread and burned down the entire premises. The server, however, was destroyed in the fire. The backup tapes kept in another room had melted and many other documents were lost for good. 

What is an example of the indirect damage caused by this fire?

Options:

A.

Melted backup tapes

B.

Burned computer systems

C.

Burned documents

D.

Water damage due to the fire extinguishers 

Question 10

What is the worst possible action that an employee may receive for sharing his or her password or access with others?

Options:

A.

Forced roll off from the project

B.

The lowest rating on his or her performance assessment

C.

Three days suspension from work

D.

Termination

Question 11

Does the security have the right to ask you to display your ID badges and check your bags?

Options:

A.

True

B.

False

Question 12

A decent visitor is roaming around without visitor's ID. As an employee you should do the following, except:

Options:

A.

Say "hi" and offer coffee

B.

Call the receptionist and inform about the visitor

C.

Greet and ask him what is his business

D.

Escort him to his destination

Question 13

What is we do in ACT - From PDCA cycle

Options:

A.

Take actions to continually monitor process performance

B.

Take actions to continually improve process performance

C.

Take actions to continually monitor process performance

D.

Take actions to continually improve people performance

Question 14

What is a reason for the classification of information? 

Options:

A.

To provide clear identification tags

B.

To structure the information according to its sensitivity 

C.

Creating a manual describing the BYOD policy

Question 15

__________ is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.

Options:

A.

Trojan

B.

Operating System

C.

Virus

D.

Malware

Page: 1 / 10
Total 100 questions