Labour Day Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: scxmas70

ISO27-13-001 Exam Dumps - ISO 27001 : 2013 - Certified Lead Auditor

Question # 4

As a new member of the IT department you have noticed that confidential information has been leaked several times. This may damage the reputation of the company. You have been asked to propose an

organisational measure to protect laptop computers. What is the first step in a structured approach to come up with this measure?

A.

Appoint security staff

B.

Encrypt all sensitive information

C.

Formulate a policy

D.

Set up an access control procedure

Full Access
Question # 5

Which measure is a preventive measure?

A.

Installing a logging system that enables changes in a system to be recognized

B.

Shutting down all internet traffic after a hacker has gained access to the company systems

C.

Putting sensitive information in a safe

Full Access
Question # 6

CMM stands for?

A.

Capability Maturity Matrix

B.

Capacity Maturity Matrix

C.

Capability Maturity Model

D.

Capable Mature Model

Full Access
Question # 7

In the event of an Information security incident, system users' roles and responsibilities are to be observed, except:

A.

Report suspected or known incidents upon discovery through the Servicedesk

B.

Preserve evidence if necessary

C.

Cooperate with investigative personnel during investigation if needed

D.

Make the information security incident details known to all employees

Full Access
Question # 8

Information or data that are classified as ______ do not require labeling.

A.

Public

B.

Internal

C.

Confidential

D.

Highly Confidential

Full Access
Question # 9

Phishing is what type of Information Security Incident?

A.

Private Incidents

B.

Cracker/Hacker Attacks

C.

Technical Vulnerabilities

D.

Legal Incidents

Full Access
Question # 10

You work in the office of a large company. You receive a call from a person claiming to be from the Helpdesk. He asks you for your password.

What kind of threat is this?

A.

Natural threat

B.

Organizational threat

C.

Social Engineering

D.

Arason

Full Access
Question # 11

In what part of the process to grant access to a system does the user present a token?

A.

Authorisation

B.

Verification

C.

Authentication

D.

Identification

Full Access
Question # 12

Backup media is kept in the same secure area as the servers. What risk may the organisation be exposed to?

A.

Unauthorised persons will have access to both the servers and backups

B.

Responsibility for the backups is not defined well

C.

After a fire, the information systems cannot be restored

D.

After a server crash, it will take extra time to bring it back up again

Full Access
Question # 13

How is the purpose of information security policy best described?

A.

An information security policy documents the analysis of risks and the search for countermeasures.

B.

An information security policy provides direction and support to the management regarding information security.

C.

An information security policy makes the security plan concrete by providing it with the necessary details.

D.

An information security policy provides insight into threats and the possible consequences.

Full Access
Question # 14

What is the goal of classification of information?

A.

To create a manual about how to handle mobile devices

B.

Applying labels making the information easier to recognize

C.

Structuring information according to its sensitivity

Full Access
Question # 15

What is the standard definition of ISMS?

A.

Is an information security systematic approach to achieve business objectives for implementation, establishing, reviewing,operating and maintaining organization's reputation.

B.

A company wide business objectives to achieve information security awareness for establishing, implementing, operating, monitoring, reviewing, maintaining and improving

C.

A project-based approach to achieve business objectives for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organization’s information security

D.

A systematic approach for establishing, implementing,operating,monitoring, reviewing, maintaining and improving an organization’s information security to achieve business objectives.

Full Access