GAQM ISO-ISMS-LA ISO 27001:2013 ISMS – Certified Lead Auditor Online Training
GAQM ISO-ISMS-LA Online Training
The questions for ISO-ISMS-LA were last updated at Feb 19,2025.
- Exam Code: ISO-ISMS-LA
- Exam Name: ISO 27001:2013 ISMS - Certified Lead Auditor
- Certification Provider: GAQM
- Latest update: Feb 19,2025
Which threat could occur if no physical measures are taken?
- A . Unauthorised persons viewing sensitive files
- B . Confidential prints being left on the printer
- C . A server shutting down because of overheating
- D . Hackers entering the corporate network
A fire breaks out in a branch office of a health insurance company. The personnel are transferred to neighboring branches to continue their work.
Where in the incident cycle is moving to a stand-by arrangements found?
- A . between threat and incident
- B . between recovery and threat
- C . between damage and recovery
- D . between incident and damage
Changes on project-managed applications or database should undergo the change control process as documented.
- A . True
- B . False
You see a blue color sticker on certain physical assets .
What does this signify?
- A . The asset is very high critical and its failure affects the entire organization
- B . The asset with blue stickers should be kept air conditioned at all times
- C . The asset is high critical and its failure will affect a group/s/project’s work in the organization
- D . The asset is critical and the impact is restricted to an employee only
Stages of Information
- A . creation, evolution, maintenance, use, disposition
- B . creation, use, disposition, maintenance, evolution
- C . creation, distribution, use, maintenance, disposition
- D . creation, distribution, maintenance, disposition, use
Below is Purpose of "Integrity", which is one of the Basic Components of Information Security
- A . the property that information is not made available or disclosed to unauthorized individuals
- B . the property of safeguarding the accuracy and completeness of assets.
- C . the property that information is not made available or disclosed to unauthorized individuals
- D . the property of being accessible and usable upon demand by an authorized entity.
You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called
- A . Shoulder Surfing
- B . Mountaineering
- C . Phishing
- D . Spoofing
Which of the following is a preventive security measure?
- A . Installing logging and monitoring software
- B . Shutting down the Internet connection after an attack
- C . Storing sensitive information in a data save
Four types of Data Classification (Choose two)
- A . Restricted Data, Confidential Data
- B . Project Data, Highly Confidential Data
- C . Financial Data, Highly Confidential Data
- D . Unrestricted Data, Highly Confidential Data
What is the name of the system that guarantees the coherence of information security in the organization?
- A . Information Security Management System (ISMS)
- B . Rootkit
- C . Security regulations for special information for the government
- D . Information Technology Service Management (ITSM)