Labour Day Special - 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sdisc65

ISO-ISMS-LA PDF

$38.5

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

ISO-ISMS-LA PDF + Testing Engine

$61.6

$175.99

3 Months Free Update

  • Exam Name: ISO 27001:2013 ISMS - Certified Lead Auditor
  • Last Update: May 4, 2024
  • Questions and Answers: 100
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

ISO-ISMS-LA Engine

$46.2

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

ISO-ISMS-LA Practice Exam Questions with Answers ISO 27001:2013 ISMS - Certified Lead Auditor Certification

Question # 6

Changes to the information processing facilities shall be done in controlled manner.

A.

True

B.

False

Full Access
Question # 7

Which reliability aspect of information is compromised when a staff member denies having sent a message?

A.

Confidentiality

B.

Integrity 

C.

Availability

D.

Correctness

Full Access
Question # 8

Cabling Security is associated with Power, telecommunication and network cabling carrying information are protected from interception and damage.

A.

True

B.

False

Full Access
Question # 9

A well-executed risk analysis provides a great deal of useful information. A risk analysis has four main objectives. 

What is not one of the four main objectives of a risk analysis?

A.

Identifying assets and their value

B.

Implementing counter measures

C.

Establishing a balance between the costs of an incident and the costs of a security measure

D.

Determining relevant vulnerabilities and threats  

Full Access
Question # 10

Which is not a requirement of HR prior to hiring?

A.

Undergo background verification

B.

Applicant must complete pre-employment documentation requirements

C.

Must undergo Awareness training on information security.

D.

Must successfully pass Background Investigation

Full Access
Question # 11

Which department maintain's contacts with law enforcement authorities, regulatory

bodies, information service providers and telecommunications service providers depending on the service required.

A.

COO

B.

CISO

C.

CSM

D.

MRO

Full Access
Question # 12

In the event of an Information security incident, system users' roles and responsibilities are to be observed, except:

A.

Report suspected or known incidents upon discovery through the Servicedesk

B.

Preserve evidence if necessary

C.

Cooperate with investigative personnel during investigation if needed

D.

Make the information security incident details known to all employees

Full Access
Question # 13

A hacker gains access to a web server and reads the credit card numbers stored on that server. Which security principle is violated? 

A.

Availability

B.

Confidentiality

C.

Integrity 

D.

Authenticity 

Full Access
Question # 14

In what part of the process to grant access to a system does the user present a token?

A.

Authorisation

B.

Verification

C.

Authentication 

D.

Identification 

Full Access
Question # 15

The following are purposes of Information Security, except:

A.

Ensure Business Continuity

B.

Minimize Business Risk

C.

Increase Business Assets

D.

Maximize Return on Investment

Full Access