Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

ISO 27001 : 2013 - Certified Lead Auditor

Last Update 15 hours ago Total Questions : 100

The ISO 27001 : 2013 - Certified Lead Auditor content is now fully updated, with all current exam questions added 15 hours ago. Deciding to include ISO27-13-001 practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our ISO27-13-001 exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these ISO27-13-001 sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any ISO 27001 : 2013 - Certified Lead Auditor practice test comfortably within the allotted time.

Question # 21

Access Control System, CCTV and security guards are form of:

A.

Environment Security

B.

Access Control

C.

Physical Security

D.

Compliance

Question # 22

What is social engineering?

A.

A group planning for a social activity in the organization

B.

Creating a situation wherein a third party gains confidential information from you

C.

The organization planning an activity for welfare of the neighborhood

Question # 23

We can leave laptops during weekdays or weekends in locked bins.

A.

True

B.

False

Question # 24

In acceptable use of Information Assets, which is the best practice?

A.

Access to information and communication systems are provided for business purpose only

B.

Interfering with or denying service to any user other than the employee's host

C.

Playing any computer games during office hours

D.

Accessing phone or network transmissions, including wireless or wifi transmissions

Question # 25

CEO sends a mail giving his views on the status of the company and the company’s future strategy and the CEO's vision and the employee's part in it. The mail should be classified as

A.

Internal Mail

B.

Public Mail

C.

Confidential Mail

D.

Restricted Mail

Question # 26

__________ is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.

A.

Trojan

B.

Operating System

C.

Virus

D.

Malware

Question # 27

What is the worst possible action that an employee may receive for sharing his or her password or access with others?

A.

Forced roll off from the project

B.

The lowest rating on his or her performance assessment

C.

Three days suspension from work

D.

Termination

Question # 28

A couple of years ago you started your company which has now grown from 1 to 20 employees. Your company’s information is worth more and more and gone are the days when you could keep control yourself. You are aware that you have to take measures, but what should they be? You hire a consultant who advises you to start with a qualitative risk analysis.

What is a qualitative risk analysis?

A.

This analysis follows a precise statistical probability calculation in order to calculate exact loss caused by damage.

B.

This analysis is based on scenarios and situations and produces a subjective view of the possible threats.

Question # 29

A planning process that introduced the concept of planning as a cycle that forms the basis for continuous improvement is called:

A.

time based planning.

B.

plan, do, check, act.

C.

planning for continuous improvement.

D.

RACI Matrix

Question # 30

A member of staff denies sending a particular message.

Which reliability aspect of information is in danger here?

A.

availability

B.

correctness

C.

integrity

D.

confidentiality

Go to page: