Month End Special - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: spcl70

ISO27-13-001 PDF

$33

$109.99

3 Months Free Update

  • Printable Format
  • Value of Money
  • 100% Pass Assurance
  • Verified Answers
  • Researched by Industry Experts
  • Based on Real Exams Scenarios
  • 100% Real Questions

ISO27-13-001 PDF + Testing Engine

$52.8

$175.99

3 Months Free Update

  • Exam Name: ISO 27001 : 2013 - Certified Lead Auditor
  • Last Update: Jan 26, 2025
  • Questions and Answers: 100
  • Free Real Questions Demo
  • Recommended by Industry Experts
  • Best Economical Package
  • Immediate Access

ISO27-13-001 Engine

$39.6

$131.99

3 Months Free Update

  • Best Testing Engine
  • One Click installation
  • Recommended by Teachers
  • Easy to use
  • 3 Modes of Learning
  • State of Art Technology
  • 100% Real Questions included

ISO27-13-001 Practice Exam Questions with Answers ISO 27001 : 2013 - Certified Lead Auditor Certification

Question # 6

Information Security is a matter of building and maintaining ________ .

A.

Confidentiality

B.

Trust

C.

Protection

D.

Firewalls

Full Access
Question # 7

Which of the following is a possible event that can have a disruptive effect on the reliability of information?

A.

Threat

B.

Risk

C.

Vulnerability

D.

Dependency

Full Access
Question # 8

Stages of Information

A.

creation, evolution, maintenance, use, disposition

B.

creation, use, disposition, maintenance, evolution

C.

creation, distribution, use, maintenance, disposition

D.

creation, distribution, maintenance, disposition, use

Full Access
Question # 9

What type of compliancy standard, regulation or legislation provides a code of practice for information security?

A.

ISO/IEC 27002

B.

Personal data protection act

C.

Computer criminality act

D.

IT Service Management

Full Access
Question # 10

You see a blue color sticker on certain physical assets. What does this signify?

A.

The asset is very high critical and its failure affects the entire organization

B.

The asset with blue stickers should be kept air conditioned at all times

C.

The asset is high critical and its failure will affect a group/s/project's work in the organization

D.

The asset is critical and the impact is restricted to an employee only

Full Access
Question # 11

There was a fire in a branch of the company Midwest Insurance. The fire department quickly arrived at the scene and could extinguish the fire before it spread and burned down the entire premises. The server, however, was destroyed in the fire. The backup tapes kept in another room had melted and many other documents were lost for good.

What is an example of the indirect damage caused by this fire?

A.

Melted backup tapes

B.

Burned computer systems

C.

Burned documents

D.

Water damage due to the fire extinguishers

Full Access
Question # 12

A member of staff denies sending a particular message.

Which reliability aspect of information is in danger here?

A.

availability

B.

correctness

C.

integrity

D.

confidentiality

Full Access
Question # 13

There is a network printer in the hallway of the company where you work. Many employees don’t pick up their printouts immediately and leave them on the printer.

What are the consequences of this to the reliability of the information?

A.

The integrity of the information is no longer guaranteed.

B.

The availability of the information is no longer guaranteed.

C.

The confidentiality of the information is no longer guaranteed.

D.

The Security of the information is no longer guaranteed.

Full Access
Question # 14

Which of the following is an information security management system standard published by the International Organization for Standardization?

A.

ISO9008

B.

ISO27001

C.

ISO5501

D.

ISO22301

Full Access
Question # 15

The following are definitions of Information, except:

A.

accurate and timely data

B.

specific and organized data for a purpose

C.

mature and measurable data

D.

can lead to understanding and decrease in uncertainty

Full Access
Question # 16

Which department maintain's contacts with law enforcement authorities, regulatory bodies, information service providers and telecommunications service providers depending on the service required.

A.

COO

B.

CISO

C.

CSM

D.

MRO

Full Access
Question # 17

What controls can you do to protect sensitive data in your computer when you go out for lunch?

A.

You activate your favorite screen-saver

B.

You are confident to leave your computer screen as is since a password protected screensaver is installed and it is set to activate after 10 minutes of inactivity

C.

You lock your computer by pressing Windows+L or CTRL-ALT-DELETE and then click "Lock Computer".

D.

You turn off the monitor

Full Access
Question # 18

Access Control System, CCTV and security guards are form of:

A.

Environment Security

B.

Access Control

C.

Physical Security

D.

Compliance

Full Access
Question # 19

Which is the glue that ties the triad together

A.

Process

B.

People

C.

Collaboration

D.

Technology

Full Access
Question # 20

There is a scheduled fire drill in your facility. What should you do?

A.

Participate in the drill

B.

Excuse yourself by saying you have an urgent deliverable

C.

Call in sick

D.

None of the above

Full Access
Question # 21

Changes to the information processing facilities shall be done in controlled manner.

A.

True

B.

False

Full Access
Question # 22

A fire breaks out in a branch office of a health insurance company. The personnel are transferred to neighboring branches to continue their work.

Where in the incident cycle is moving to a stand-by arrangements found?

A.

between threat and incident

B.

between recovery and threat

C.

between damage and recovery

D.

between incident and damage

Full Access
Question # 23

An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.

A.

True

B.

False

Full Access
Question # 24

What is a reason for the classification of information?

A.

To provide clear identification tags

B.

To structure the information according to its sensitivity

C.

Creating a manual describing the BYOD policy

Full Access
Question # 25

__________ is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.

A.

Trojan

B.

Operating System

C.

Virus

D.

Malware

Full Access
Question # 26

The following are purposes of Information Security, except:

A.

Ensure Business Continuity

B.

Minimize Business Risk

C.

Increase Business Assets

D.

Maximize Return on Investment

Full Access
Question # 27

Which reliability aspect of information is compromised when a staff member denies having sent a message?

A.

Confidentiality

B.

Integrity

C.

Availability

D.

Correctness

Full Access
Question # 28

What is a repressive measure in case of a fire?

A.

Taking out a fire insurance

B.

Putting out a fire after it has been detected by a fire detector

C.

Repairing damage caused by the fire

Full Access
Question # 29

CMM stands for?

A.

Capability Maturity Matrix

B.

Capacity Maturity Matrix

C.

Capability Maturity Model

D.

Capable Mature Model

Full Access
Question # 30

Information has a number of reliability aspects. Reliability is constantly being threatened. Examples of threats are: a cable becomes loose, someone alters information by accident, data is used privately or is falsified.

Which of these examples is a threat to integrity?

A.

a loose cable

B.

accidental alteration of data

C.

private use of data

D.

System restart

Full Access