GAQM ISO27-13-001 ISO 27001 : 2013 – Certified Lead Auditor Online Training
GAQM ISO27-13-001 Online Training
The questions for ISO27-13-001 were last updated at Nov 22,2024.
- Exam Code: ISO27-13-001
- Exam Name: ISO 27001 : 2013 - Certified Lead Auditor
- Certification Provider: GAQM
- Latest update: Nov 22,2024
Why do we need to test a disaster recovery plan regularly, and keep it up to date?
- A . Otherwise the measures taken and the incident procedures planned may not be adequate
- B . Otherwise it is no longer up to date with the registration of daily occurring faults
- C . Otherwise remotely stored backups may no longer be available to the security team
Phishing is what type of Information Security Incident?
- A . Private Incidents
- B . Cracker/Hacker Attacks
- C . Technical Vulnerabilities
- D . Legal Incidents
CEO sends a mail giving his views on the status of the company and the company’s future strategy and the CEO’s vision and the employee’s part in it. The mail should be classified as
- A . Internal Mail
- B . Public Mail
- C . Confidential Mail
- D . Restricted Mail
A member of staff denies sending a particular message.
Which reliability aspect of information is in danger here?
- A . availability
- B . correctness
- C . integrity
- D . confidentiality
What is social engineering?
- A . A group planning for a social activity in the organization
- B . Creating a situation wherein a third party gains confidential information from you
- C . The organization planning an activity for welfare of the neighborhood
What is the goal of classification of information?
- A . To create a manual about how to handle mobile devices
- B . Applying labels making the information easier to recognize
- C . Structuring information according to its sensitivity
You have a hard copy of a customer design document that you want to dispose off.
What would you do
- A . Throw it in any dustbin
- B . Shred it using a shredder
- C . Give it to the office boy to reuse it for other purposes
- D . Be environment friendly and reuse it for writing
You receive the following mail from the IT support team: Dear User, Starting next week, we will be deleting all inactive email accounts in order to create spaceshare the below details in order to continue using your account.
In case of no response,
Name:
Email ID:
Password:
DOB:
Kindly contact the webmail team for any further support. Thanks for your attention.
Which of the following is the best response?
- A . Ignore the email
- B . Respond it by saying that one should not share the password with anyone
- C . One should not respond to these mails and report such email to your supervisor
As a new member of the IT department you have noticed that confidential information has been leaked several times. This may damage the reputation of the company. You have been asked to propose an
organisational measure to protect laptop computers.
What is the first step in a structured approach to come up with this measure?
- A . Appoint security staff
- B . Encrypt all sensitive information
- C . Formulate a policy
- D . Set up an access control procedure
An administration office is going to determine the dangers to which it is exposed.
What do we call a possible event that can have a disruptive effect on the reliability of information?
- A . dependency
- B . threat
- C . vulnerability
- D . risk