ISO27-13-001 Demo and Sample
Note: Answers are below each question.
Samples are taken from full version.
Latest ISO27-13-001 Exam Questions and Practice Tests 2024 - Killexams.com
ISO27-13-001 Dumps
ISO27-13-001 Braindumps ISO27-13-001 Real Questions ISO27-13-001 Practice Test ISO27-13-001 Actual Questions
GAQM
ISO27-13-001
ISO 27001:2023 - Certified Lead Auditor
https://killexams.com/pass4sure/exam-detail/ISO27-13-001
Question: 16
What is the goal of classification of information?
To create a manual about how to handle mobile devices
Applying labels making the information easier to recognize
Structuring information according to its sensitivity
Answer: C Question: 17
You have a hard copy of a customer design document that you want to dispose off. What would you do
Throw it in any dustbin
Shred it using a shredder
Give it to the office boy to reuse it for other purposes
Be environment friendly and reuse it for writing
Answer: B Question: 18
You receive the following mail from the IT support team: Dear User, Starting next week, we will be deleting all inactive email accounts in order to create spaceshare the below details in order to continue using your account.
In case of no response, Name:
Email ID: Password: DOB:
Kindly contact the webmail team for any further support. Thanks for your attention. Which of the following is the best response?
Ignore the email
Respond it by saying that one should not share the password with anyone
One should not respond to these mails and report such email to your supervisor
Answer: C Question: 19
As a new member of the IT department you have noticed that confidential information has been leaked several times.
This may damage the reputation of the company. You have been asked to propose an
organisational measure to protect laptop computers.
What is the first step in a structured approach to come up with this measure?
Appoint security staff
Encrypt all sensitive information
Formulate a policy
Set up an access control procedure
Answer: C Question: 20
An administration office is going to determine the dangers to which it is exposed.
What do we call a possible event that can have a disruptive effect on the reliability of information?
dependency
threat
vulnerability
risk
Answer: B Question: 21
A well-executed risk analysis provides a great deal of useful information. A risk analysis has four main objectives. What is not one of the four main objectives of a risk analysis?
Identifying assets and their value
Implementing counter measures
Establishing a balance between the costs of an incident and the costs of a security measure
Determining relevant vulnerabilities and threats
Answer: B Question: 22
You see a blue color sticker on certain physical assets. What does this signify?
The asset is very high critical and its failure affects the entire organization
The asset with blue stickers should be kept air conditioned at all times
The asset is high critical and its failure will affect a group/s/project's work in the organization
The asset is critical and the impact is restricted to an employee only
Answer: C Question: 23
How are data and information related?
Data is a collection of structured and unstructured information
Information consists of facts and statistics collected together for reference or analysis
When meaning and value are assigned to data, it becomes information
Answer: C Question: 24 CMM stands for?
Capability Maturity Matrix
Capacity Maturity Matrix
Capability Maturity Model
Capable Mature Model
Answer: C Question: 25
Who are allowed to access highly confidential files?
Employees with a business need-to-know
Contractors with a business need-to-know
Employees with signed NDA have a business need-to-know
Non-employees designated with approved access and have signed NDA
Answer: C Question: 26
What is an example of a human threat?
a lightning strike
fire
phishing
thunderstrom
Answer: C Question: 27
A property of Information that has the ability to prove occurrence of a claimed event.
Electronic chain letters
Integrity
Availability
Accessibility
Answer: B Question: 28
An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.
True
False
Answer: B Question: 29
Which reliability aspect of information is compromised when a staff member denies having sent a message?
Confidentiality
Integrity
Availability
Correctness
Answer: B Question: 30
What type of compliancy standard, regulation or legislation provides a code of practice for information security?
ISO/IEC 27002
Personal data protection act
Computer criminality act
IT Service Management
Answer: A
6$03/( 48(67,216
7KHVH TXHVWLRQV DUH IRU GHPR SXUSRVH RQO\ )XOO YHUVLRQ LV XS WR GDWH DQG FRQWDLQV DFWXDO TXHVWLRQV DQG DQVZHUV
.LOOH[DPV FRP LV DQ RQOLQH SODWIRUP WKDW RIIHUV D ZLGH UDQJH RI VHUYLFHV UHODWHG WR FHUWLILFDWLRQ H[DP SUHSDUDWLRQ 7KH SODWIRUP SURYLGHV DFWXDO TXHVWLRQV H[DP GXPSV DQG SUDFWLFH WHVWV WR KHOS LQGLYLGXDOV SUHSDUH IRU YDULRXV FHUWLILFDWLRQ H[DPV ZLWK FRQILGHQFH +HUH DUH VRPH NH\ IHDWXUHV DQG VHUYLFHV RIIHUHG E\ .LOOH[DPV FRP
$FWXDO ([DP 4XHVWLRQV .LOOH[DPV FRP SURYLGHV DFWXDO H[DP TXHVWLRQV WKDW DUH H[SHULHQFHG LQ WHVW FHQWHUV 7KHVH TXHVWLRQV DUH XSGDWHG UHJXODUO\ WR HQVXUH WKH\ DUH XS WR GDWH DQG UHOHYDQW WR WKH ODWHVW H[DP V\OODEXV %\ VWXG\LQJ WKHVH DFWXDO TXHVWLRQV FDQGLGDWHV FDQ IDPLOLDUL]H WKHPVHOYHV ZLWK WKH FRQWHQW DQG IRUPDW RI WKH UHDO H[DP
([DP 'XPSV .LOOH[DPV FRP RIIHUV H[DP GXPSV LQ 3') IRUPDW 7KHVH GXPSV FRQWDLQ D FRPSUHKHQVLYH FROOHFWLRQ RI TXHVWLRQV DQG DQVZHUV WKDW FRYHU WKH H[DP WRSLFV %\ XVLQJ WKHVH GXPSV FDQGLGDWHV FDQ HQKDQFH WKHLU NQRZOHGJH DQG LPSURYH WKHLU FKDQFHV RI VXFFHVV LQ WKH FHUWLILFDWLRQ H[DP
3UDFWLFH 7HVWV .LOOH[DPV FRP SURYLGHV SUDFWLFH WHVWV WKURXJK WKHLU GHVNWRS 9&( H[DP VLPXODWRU DQG RQOLQH WHVW HQJLQH 7KHVH SUDFWLFH WHVWV VLPXODWH WKH UHDO H[DP HQYLURQPHQW DQG KHOS FDQGLGDWHV DVVHVV WKHLU UHDGLQHVV IRU WKH DFWXDO H[DP 7KH SUDFWLFH WHVWV FRYHU D ZLGH UDQJH RI TXHVWLRQV DQG HQDEOH FDQGLGDWHV WR LGHQWLI\ WKHLU VWUHQJWKV DQG ZHDNQHVVHV
*XDUDQWHHG 6XFFHVV .LOOH[DPV FRP RIIHUV D VXFFHVV JXDUDQWHH ZLWK WKHLU H[DP GXPSV 7KH\ FODLP WKDW E\ XVLQJ WKHLU PDWHULDOV FDQGLGDWHV ZLOO SDVV WKHLU H[DPV RQ WKH ILUVW DWWHPSW RU WKH\ ZLOO UHIXQG WKH SXUFKDVH SULFH 7KLV JXDUDQWHH SURYLGHV DVVXUDQFH DQG FRQILGHQFH WR LQGLYLGXDOV SUHSDULQJ IRU FHUWLILFDWLRQ H[DPV
8SGDWHG &RQWHQW .LOOH[DPV FRP UHJXODUO\ XSGDWHV LWV TXHVWLRQ EDQN DQG H[DP GXPSV WR HQVXUH WKDW WKH\ DUH FXUUHQW DQG UHIOHFW WKH ODWHVW FKDQJHV LQ WKH H[DP V\OODEXV 7KLV KHOSV FDQGLGDWHV VWD\ XS WR GDWH ZLWK WKH H[DP FRQWHQW DQG LQFUHDVHV WKHLU FKDQFHV RI VXFFHVV
7HFKQLFDO 6XSSRUW .LOOH[DPV FRP SURYLGHV IUHH [ WHFKQLFDO VXSSRUW WR DVVLVW FDQGLGDWHV ZLWK DQ\ TXHULHV RU LVVXHV WKH\ PD\ HQFRXQWHU ZKLOH XVLQJ WKHLU VHUYLFHV 7KHLU FHUWLILHG H[SHUWV DUH DYDLODEOH WR SURYLGH JXLGDQFH DQG KHOS FDQGLGDWHV WKURXJKRXW WKHLU H[DP SUHSDUDWLRQ MRXUQH\
'PS .PSF FYBNT WJTJU IUUQT LJMMFYBNT DPN WFOEPST FYBN MJTU
.LOO \RXU H[DP DW )LUVW $WWHPSW *XDUDQWHHG
View Practice Questions »