Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

ISO-ISMS-LA Exam Dumps - ISO 27001 : 2013 ISMS - Certified Lead Auditor

Question # 4

Cabling Security is associated with Power, telecommunication and network cabling carrying information are protected from interception and damage.

A.

True

B.

False

Full Access
Question # 5

Which of the following does an Asset Register contain? (Choose two)

A.

Asset Type

B.

Asset Owner

C.

Asset Modifier

D.

Process ID

Full Access
Question # 6

An administration office is going to determine the dangers to which it is exposed. 

What do we call a possible event that can have a disruptive effect on the reliability of information? 

A.

dependency

B.

threat

C.

vulnerability 

D.

risk 

Full Access
Question # 7

What is the difference between a restricted and confidential document?

A.

Restricted - to be shared among an authorized group

Confidential - to be shared among named individuals

B.

Restricted - to be shared among named individuals 

Confidential - to be shared among an authorized group

C.

Restricted - to be shared among named individuals 

Confidential - to be shared across the organization only

D.

Restricted - to be shared among named individuals 

Confidential - to be shared with friends and family

Full Access
Question # 8

A scenario wherein the city or location where the building(s) reside is / are not accessible.

A.

Component

B.

Facility

C.

City

D.

Country

Full Access
Question # 9

What is the relationship between data and information?

A.

Data is structured information.

B.

Information is the meaning and value assigned to a collection of data.

Full Access
Question # 10

What is the security management term for establishing whether someone's identity is correct?

A.

Identification

B.

Authentication

C.

Authorisation

D.

Verification

Full Access
Question # 11

Integrity of data means

A.

Accuracy and completeness of the data

B.

Data should be viewable at all times

C.

Data should be accessed by only the right people

Full Access
Question # 12

The following are the guidelines to protect your password, except: 

A.

Don't use the same password for various company system security access

B.

Do not share passwords with anyone

C.

For easy recall, use the same password for company and personal accounts

D.

Change a temporary password on first log-on

Full Access
Question # 13

What type of legislation requires a proper controlled purchase process?

A.

Personal data protection act 

B.

Computer criminality act 

C.

Government information act 

D.

Intellectual property rights act

Full Access
Question # 14

Why do we need to test a disaster recovery plan regularly, and keep it up to date?

A.

Otherwise the measures taken and the incident procedures planned may not be adequate

B.

Otherwise it is no longer up to date with the registration of daily occurring faults

C.

Otherwise remotely stored backups may no longer be available to the security team 

Full Access
Question # 15

Who are allowed to access highly confidential files?

A.

Employees with a business need-to-know

B.

Contractors with a business need-to-know

C.

Employees with signed NDA have a business need-to-know

D.

Non-employees designated with approved access and have signed NDA

Full Access