Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GAQM ISO-ISMS-LA - ISO 27001:2013 ISMS - Certified Lead Auditor

Page: 2 / 3
Total 100 questions

An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.

A.

True

B.

False

Which of the following factors does NOT contribute to the value of data for an organisation?

A.

The correctness of data 

B.

The indispensability of data  

C.

The importance of data for processes 

D.

The content of data

How is the purpose of information security policy best described?

A.

An information security policy documents the analysis of risks and the search for countermeasures.

B.

An information security policy provides direction and support to the management regarding information security. 

C.

An information security policy makes the security plan concrete by providing it with the necessary details.

D.

An information security policy provides insight into threats and the possible consequences. 

The following are the guidelines to protect your password, except: 

A.

Don't use the same password for various company system security access

B.

Do not share passwords with anyone

C.

For easy recall, use the same password for company and personal accounts

D.

Change a temporary password on first log-on

What type of compliancy standard, regulation or legislation provides a code of practice for information security?

A.

ISO/IEC 27002 

B.

Personal data protection act

C.

Computer criminality act

D.

IT Service Management

A scenario wherein the city or location where the building(s) reside is / are not accessible.

A.

Component

B.

Facility

C.

City

D.

Country

What is an example of a human threat?

A.

a lightning strike

B.

fire

C.

phishing

D.

thunderstrom

You have a hard copy of a customer design document that you want to dispose off. What would you do

A.

Throw it in any dustbin

B.

Shred it using a shredder

C.

Give it to the office boy to reuse it for other purposes

D.

Be environment friendly and reuse it for writing

What is the goal of classification of information?

A.

To create a manual about how to handle mobile devices 

B.

Applying labels making the information easier to recognize

C.

Structuring information according to its sensitivity 

A member of staff denies sending a particular message. 

Which reliability aspect of information is in danger here? 

A.

availability 

B.

correctness 

C.

integrity

D.

confidentiality