Summer Sale Coupon - 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: c4sbfdisc

ISO27-13-001 PDF

$44

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

ISO27-13-001 PDF + Testing Engine

$70.4

$175.99

3 Months Free Update

  • Exam Name: ISO 27001 : 2013 - Certified Lead Auditor
  • Last Update: Apr 17, 2024
  • Questions and Answers: 100
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

ISO27-13-001 Engine

$52.8

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

ISO27-13-001 Practice Exam Questions with Answers ISO 27001 : 2013 - Certified Lead Auditor Certification

Question # 6

A hacker gains access to a web server and reads the credit card numbers stored on that server. Which security principle is violated?

A.

Availability

B.

Confidentiality

C.

Integrity

D.

Authenticity

Full Access
Question # 7

As a new member of the IT department you have noticed that confidential information has been leaked several times. This may damage the reputation of the company. You have been asked to propose an

organisational measure to protect laptop computers. What is the first step in a structured approach to come up with this measure?

A.

Appoint security staff

B.

Encrypt all sensitive information

C.

Formulate a policy

D.

Set up an access control procedure

Full Access
Question # 8

All are prohibited in acceptable use of information assets, except:

A.

Electronic chain letters

B.

E-mail copies to non-essential readers

C.

Company-wide e-mails with supervisor/TL permission.

D.

Messages with very large attachments or to a large number ofrecipients.

Full Access
Question # 9

Four types of Data Classification (Choose two)

A.

Restricted Data, Confidential Data

B.

Project Data, Highly Confidential Data

C.

Financial Data, Highly Confidential Data

D.

Unrestricted Data, Highly Confidential Data

Full Access
Question # 10

Which of the following does a lack of adequate security controls represent?

A.

Asset

B.

Vulnerability

C.

Impact

D.

Threat

Full Access
Question # 11

In the event of an Information security incident, system users' roles and responsibilities are to be observed, except:

A.

Report suspected or known incidents upon discovery through the Servicedesk

B.

Preserve evidence if necessary

C.

Cooperate with investigative personnel during investigation if needed

D.

Make the information security incident details known to all employees

Full Access
Question # 12

What is an example of a human threat?

A.

a lightning strike

B.

fire

C.

phishing

D.

thunderstrom

Full Access
Question # 13

What is the goal of classification of information?

A.

To create a manual about how to handle mobile devices

B.

Applying labels making the information easier to recognize

C.

Structuring information according to its sensitivity

Full Access
Question # 14

What type of system ensures a coherent Information Security organisation?

A.

Federal Information Security Management Act (FISMA)

B.

Information Technology Service Management System (ITSM)

C.

Information Security Management System (ISMS)

D.

Information Exchange Data System (IEDS)

Full Access
Question # 15

You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called

A.

Shoulder Surfing

B.

Mountaineering

C.

Phishing

D.

Spoofing

Full Access