Labour Day Sale - Limited Time 60% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 575363r9

Welcome To DumpsPedia

ISO27-13-001 Sample Questions Answers

Questions 4

Which of the following does a lack of adequate security controls represent?

Options:

A.

Asset

B.

Vulnerability

C.

Impact

D.

Threat

Buy Now
Questions 5

A hacker gains access to a web server and reads the credit card numbers stored on that server. Which security principle is violated?

Options:

A.

Availability

B.

Confidentiality

C.

Integrity

D.

Authenticity

Buy Now
Questions 6

What controls can you do to protect sensitive data in your computer when you go out for lunch?

Options:

A.

You activate your favorite screen-saver

B.

You are confident to leave your computer screen as is since a password protected screensaver is installed and it is set to activate after 10 minutes of inactivity

C.

You lock your computer by pressing Windows+L or CTRL-ALT-DELETE and then click "Lock Computer".

D.

You turn off the monitor

Buy Now
Questions 7

Information Security is a matter of building and maintaining ________ .

Options:

A.

Confidentiality

B.

Trust

C.

Protection

D.

Firewalls

Buy Now
Questions 8

Which of the following is a preventive security measure?

Options:

A.

Installing logging and monitoring software

B.

Shutting down the Internet connection after an attack

C.

Storing sensitive information in a data save

Buy Now
Questions 9

The following are definitions of Information, except:

Options:

A.

accurate and timely data

B.

specific and organized data for a purpose

C.

mature and measurable data

D.

can lead to understanding and decrease in uncertainty

Buy Now
Questions 10

What is the name of the system that guarantees the coherence of information security in the organization?

Options:

A.

Information Security Management System (ISMS)

B.

Rootkit

C.

Security regulations for special information for the government

D.

Information Technology Service Management (ITSM)

Buy Now
Questions 11

-------------------------is an asset like other important business assets has value to an organization and consequently needs to be protected.

Options:

A.

Infrastructure

B.

Data

C.

Information

D.

Security

Buy Now
Questions 12

What is the purpose of an Information Security policy?

Options:

A.

An information security policy makes the security plan concrete by providing the necessary details

B.

An information security policy provides insight into threats and the possible consequences

C.

An information security policy provides direction and support to the management regarding information security

D.

An information security policy documents the analysis of risks and the search for countermeasures

Buy Now
Questions 13

Which of the following is a possible event that can have a disruptive effect on the reliability of information?

Options:

A.

Threat

B.

Risk

C.

Vulnerability

D.

Dependency

Buy Now
Questions 14

An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.

Options:

A.

True

B.

False

Buy Now
Questions 15

Which of the following factors does NOT contribute to the value of data for an organisation?

Options:

A.

The correctness of data

B.

The indispensability of data

C.

The importance of data for processes

D.

The content of data

Buy Now
Exam Code: ISO27-13-001
Exam Name: ISO 27001 : 2013 - Certified Lead Auditor
Last Update: Apr 25, 2024
Questions: 100
$64  $159.99
$48  $119.99
$40  $99.99
buy now ISO27-13-001