ISO-ISMS-LA Demo and Sample
Note: Answers are below each question.
Samples are taken from full version.
Latest ISO-ISMS-LA Exam Questions and Practice Tests 2024 - Killexams.com
ISO-ISMS-LA Dumps
ISO-ISMS-LA Braindumps ISO-ISMS-LA Real Questions ISO-ISMS-LA Practice Test
ISO-ISMS-LA Actual Questions
GAQM
ISO-ISMS-LA
ISO 27001:2023 ISMS - Certified Lead Auditor
https://killexams.com/pass4sure/exam-detail/ISO-ISMS-LA
Question: 15
Stages of Information
creation, evolution, maintenance, use, disposition
creation, use, disposition, maintenance, evolution
creation, distribution, use, maintenance, disposition
creation, distribution, maintenance, disposition, use
Answer: C Question: 16
Below is Purpose of "Integrity", which is one of the Basic Components of Information Security
the property that information is not made available or disclosed to unauthorized individuals
the property of safeguarding the accuracy and completeness of assets.
the property that information is not made available or disclosed to unauthorized individuals
the property of being accessible and usable upon demand by an authorized entity.
Answer: B Question: 17
You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called
Shoulder Surfing
Mountaineering
Phishing
Spoofing
Answer: C Question: 18
Which of the following is a preventive security measure?
Installing logging and monitoring software
Shutting down the Internet connection after an attack
Storing sensitive information in a data save
Answer: C Question: 19
Four types of Data Classification (Choose two)
Restricted Data, Confidential Data
Project Data, Highly Confidential Data
Financial Data, Highly Confidential Data
Unrestricted Data, Highly Confidential Data
Answer: A,D Question: 20
What is the name of the system that guarantees the coherence of information security in the organization?
Information Security Management System (ISMS)
Rootkit
Security regulations for special information for the government
Information Technology Service Management (ITSM)
Answer: A Question: 21
CEO sends a mail giving his views on the status of the company and the companyâs future strategy and the CEO's vision and the employee's part in it. The mail should be classified as
Internal Mail
Public Mail
Confidential Mail
Restricted Mail
Answer: A Question: 22
Which department maintain's contacts with law enforcement authorities, regulatory bodies, information service providers and telecommunications service providers depending on the service required.
COO
CISO
CSM
MRO
Answer: B Question: 23
Information has a number of reliability aspects. Reliability is constantly being threatened. Examples of threats are: a cable becomes loose, someone alters information by accident, data is used privately or is falsified.
Which of these examples is a threat to integrity?
a loose cable
accidental alteration of data
private use of data
System restart
Answer: B Question: 24
The following are definitions of Information, except:
accurate and timely data
specific and organized data for a purpose
mature and measurable data
can lead to understanding and decrease in uncertainty
Answer: C Question: 25
Which of the following does an Asset Register contain? (Choose two)
Asset Type
Asset Owner
Asset Modifier
Process ID
Answer: A,B Question: 26
Why do we need to test a disaster recovery plan regularly, and keep it up to date?
Otherwise the measures taken and the incident procedures planned may not be adequate
Otherwise it is no longer up to date with the registration of daily occurring faults
Otherwise remotely stored backups may no longer be available to the security team
Answer: A Question: 27
Information Security is a matter of building and maintaining .
Confidentiality
Trust
Protection
Firewalls
Answer: B Question: 28
An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.
True
False
Answer: B Question: 29
What is the goal of classification of information?
To create a manual about how to handle mobile devices
Applying labels making the information easier to recognize
Structuring information according to its sensitivity
Answer: C Question: 30
In which order is an Information Security Management System set up?
Implementation, operation, maintenance, establishment
Implementation, operation, improvement, maintenance
Establishment, implementation, operation, maintenance
Establishment, operation, monitoring, improvement
Answer: C
6$03/( 48(67,216
7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV
.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP
$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP
([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP
3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV
*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV
8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV
7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\
'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU
.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG
View Practice Questions »