GAQM ISO-ISMS-LA ISO 27001:2013 ISMS – Certified Lead Auditor Online Training
GAQM ISO-ISMS-LA Online Training
The questions for ISO-ISMS-LA were last updated at Nov 19,2024.
- Exam Code: ISO-ISMS-LA
- Exam Name: ISO 27001:2013 ISMS - Certified Lead Auditor
- Certification Provider: GAQM
- Latest update: Nov 19,2024
In acceptable use of Information Assets, which is the best practice?
- A . Access to information and communication systems are provided for business purpose only
- B . Interfering with or denying service to any user other than the employee’s host
- C . Playing any computer games during office hours
- D . Accessing phone or network transmissions, including wireless or wifi transmissions
An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.
- A . True
- B . False
Information or data that are classified as ______ do not require labeling.
- A . Public
- B . Internal
- C . Confidential
- D . Highly Confidential
Often, people do not pick up their prints from a shared printer .
How can this affect the confidentiality of information?
- A . Confidentiality cannot be guaranteed
- B . Integrity cannot be guaranteed
- C . Authenticity cannot be guaranteed
- D . Availability cannot be guaranteed
Which measure is a preventive measure?
- A . Installing a logging system that enables changes in a system to be recognized
- B . Shutting down all internet traffic after a hacker has gained access to the company systems
- C . Putting sensitive information in a safe
There was a fire in a branch of the company Midwest Insurance. The fire department quickly arrived at the scene and could extinguish the fire before it spread and burned down the entire premises. The server, however, was destroyed in the fire. The backup tapes kept in another room had melted and many other documents were lost for good.
What is an example of the indirect damage caused by this fire?
- A . Melted backup tapes
- B . Burned computer systems
- C . Burned documents
- D . Water damage due to the fire extinguishers
What is a definition of compliance?
- A . Laws, considered collectively or the process of making or enacting laws
- B . The state or fact of according with or meeting rules or standards
- C . An official or authoritative instruction
- D . A rule or directive made and maintained by an authority.
A member of staff denies sending a particular message.
Which reliability aspect of information is in danger here?
- A . availability
- B . correctness
- C . integrity
- D . confidentiality
What is the purpose of an Information Security policy?
- A . An information security policy makes the security plan concrete by providing the necessary details
- B . An information security policy provides insight into threats and the possible consequences
- C . An information security policy provides direction and support to the management regarding information security
- D . An information security policy documents the analysis of risks and the search for countermeasures
The following are purposes of Information Security, except:
- A . Ensure Business Continuity
- B . Minimize Business Risk
- C . Increase Business Assets
- D . Maximize Return on Investment