Winter Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

ISO-ISMS-LA PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

ISO-ISMS-LA PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: ISO 27001:2013 ISMS - Certified Lead Auditor
  • Last Update: Feb 12, 2025
  • Questions and Answers: 100
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

ISO-ISMS-LA Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

ISO-ISMS-LA Practice Exam Questions with Answers ISO 27001:2013 ISMS - Certified Lead Auditor Certification

Question # 6

Who is responsible for Initial asset allocation to the user/custodian of the assets?

A.

Asset Manager

B.

Asset Owner

C.

Asset Practitioner

D.

Asset Stakeholder

Full Access
Question # 7

There is a scheduled fire drill in your facility. What should you do?

A.

Participate in the drill

B.

Excuse yourself by saying you have an urgent deliverable

C.

Call in sick

D.

None of the above

Full Access
Question # 8

Which of the following does an Asset Register contain? (Choose two)

A.

Asset Type

B.

Asset Owner

C.

Asset Modifier

D.

Process ID

Full Access
Question # 9

A property of Information that has the ability to prove occurrence of a claimed event.

A.

Electronic chain letters 

B.

Integrity

C.

Availability

D.

Accessibility

Full Access
Question # 10

The following are definitions of Information, except:

A.

accurate and timely data

B.

specific and organized data for a purpose

C.

mature and measurable data

D.

can lead to understanding and decrease in uncertainty

Full Access
Question # 11

An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.

A.

True

B.

False

Full Access
Question # 12

A fire breaks out in a branch office of a health insurance company. The personnel are transferred to neighboring branches to continue their work. 

Where in the incident cycle is moving to a stand-by arrangements found? 

A.

between threat and incident

B.

between recovery and threat 

C.

between damage and recovery

D.

between incident and damage

Full Access
Question # 13

The following are purposes of Information Security, except:

A.

Ensure Business Continuity

B.

Minimize Business Risk

C.

Increase Business Assets

D.

Maximize Return on Investment

Full Access
Question # 14

The following are the guidelines to protect your password, except: 

A.

Don't use the same password for various company system security access

B.

Do not share passwords with anyone

C.

For easy recall, use the same password for company and personal accounts

D.

Change a temporary password on first log-on

Full Access
Question # 15

Which of the following is a technical security measure? 

A.

Encryption

B.

Security policy

C.

Safe storage of backups 

D.

User role profiles.

Full Access
Question # 16

Below is Purpose of "Integrity", which is one of the Basic Components of Information Security

A.

the property that information is not made available or disclosed to unauthorized individuals

B.

the property of safeguarding the accuracy and completeness of assets.

C.

the property that information is not made available or disclosed to unauthorized individuals

D.

the property of being accessible and usable upon demand by an authorized entity.

Full Access
Question # 17

What is the worst possible action that an employee may receive for sharing his or her password or access with others?

A.

Forced roll off from the project

B.

The lowest rating on his or her performance assessment

C.

Three days suspension from work

D.

Termination

Full Access
Question # 18

What type of system ensures a coherent Information Security organisation? 

A.

Federal Information Security Management Act (FISMA) 

B.

Information Technology Service Management System (ITSM)

C.

Information Security Management System (ISMS) 

D.

Information Exchange Data System (IEDS)

Full Access
Question # 19

An administration office is going to determine the dangers to which it is exposed. 

What do we call a possible event that can have a disruptive effect on the reliability of information? 

A.

dependency

B.

threat

C.

vulnerability 

D.

risk 

Full Access
Question # 20

Cabling Security is associated with Power, telecommunication and network cabling carrying information are protected from interception and damage.

A.

True

B.

False

Full Access
Question # 21

Phishing is what type of Information Security Incident?

A.

Private Incidents

B.

Cracker/Hacker Attacks

C.

Technical Vulnerabilities

D.

Legal Incidents

Full Access
Question # 22

What is an example of a human threat?

A.

a lightning strike

B.

fire

C.

phishing

D.

thunderstrom

Full Access
Question # 23

A well-executed risk analysis provides a great deal of useful information. A risk analysis has four main objectives. 

What is not one of the four main objectives of a risk analysis?

A.

Identifying assets and their value

B.

Implementing counter measures

C.

Establishing a balance between the costs of an incident and the costs of a security measure

D.

Determining relevant vulnerabilities and threats  

Full Access
Question # 24

After a devastating office fire, all staff are moved to other branches of the company. At what moment in the incident management process is this measure effectuated? 

A.

Between incident and damage

B.

Between detection and classification

C.

Between recovery and normal operations 

D.

Between classification and escalation

Full Access
Question # 25

Information Security is a matter of building and maintaining ________ .

A.

Confidentiality

B.

Trust

C.

Protection

D.

Firewalls

Full Access
Question # 26

Who is authorized to change the classification of a document?

A.

The author of the document 

B.

The administrator of the document 

C.

The owner of the document

D.

The manager of the owner of the document  

Full Access
Question # 27

You see a blue color sticker on certain physical assets. What does this signify?

A.

The asset is very high critical and its failure affects the entire organization

B.

The asset with blue stickers should be kept air conditioned at all times

C.

The asset is high critical and its failure will affect a group/s/project's work in the organization

D.

The asset is critical and the impact is restricted to an employee only

Full Access
Question # 28

Which of the following is a possible event that can have a disruptive effect on the reliability of information? 

A.

Threat

B.

Risk

C.

Vulnerability

D.

Dependency

Full Access
Question # 29

Someone from a large tech company calls you on behalf of your company to check the health of your PC, and therefore needs your user-id and password. What type of threat is this? 

A.

Social engineering threat 

B.

Organisational threat

C.

Technical threat 

D.

Malware threat 

Full Access
Question # 30

What is the goal of classification of information?

A.

To create a manual about how to handle mobile devices 

B.

Applying labels making the information easier to recognize

C.

Structuring information according to its sensitivity 

Full Access