Weekend Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

GAQM ISO27-13-001 - ISO 27001 : 2013 - Certified Lead Auditor

Page: 2 / 3
Total 100 questions

There is a network printer in the hallway of the company where you work. Many employees don’t pick up their printouts immediately and leave them on the printer.

What are the consequences of this to the reliability of the information?

A.

The integrity of the information is no longer guaranteed.

B.

The availability of the information is no longer guaranteed.

C.

The confidentiality of the information is no longer guaranteed.

D.

The Security of the information is no longer guaranteed.

You work in the office of a large company. You receive a call from a person claiming to be from the Helpdesk. He asks you for your password.

What kind of threat is this?

A.

Natural threat

B.

Organizational threat

C.

Social Engineering

D.

Arason

What would be the reference for you to know who should have access to data/document?

A.

Data Classification Label

B.

Access Control List (ACL)

C.

Masterlist of Project Records (MLPR)

D.

Information Rights Management (IRM)

Changes on project-managed applications or database should undergo the change control process as documented.

A.

True

B.

False

In the event of an Information security incident, system users' roles and responsibilities are to be observed, except:

A.

Report suspected or known incidents upon discovery through the Servicedesk

B.

Preserve evidence if necessary

C.

Cooperate with investigative personnel during investigation if needed

D.

Make the information security incident details known to all employees

What is the standard definition of ISMS?

A.

Is an information security systematic approach to achieve business objectives for implementation, establishing, reviewing,operating and maintaining organization's reputation.

B.

A company wide business objectives to achieve information security awareness for establishing, implementing, operating, monitoring, reviewing, maintaining and improving

C.

A project-based approach to achieve business objectives for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organization’s information security

D.

A systematic approach for establishing, implementing,operating,monitoring, reviewing, maintaining and improving an organization’s information security to achieve business objectives.

Which of the following is a possible event that can have a disruptive effect on the reliability of information?

A.

Threat

B.

Risk

C.

Vulnerability

D.

Dependency

After a fire has occurred, what repressive measure can be taken?

A.

Extinguishing the fire after the fire alarm sounds

B.

Buying in a proper fire insurance policy

C.

Repairing all systems after the fire

What is we do in ACT - From PDCA cycle

A.

Take actions to continually monitor process performance

B.

Take actions to continually improve process performance

C.

Take actions to continually monitor process performance

D.

Take actions to continually improve people performance

You receive the following mail from the IT support team: Dear User,Starting next week, we will be deleting all inactive email accounts in order to create spaceshare the below details in order to continue using your account. In case of no response,

Name:

Email ID:

Password:

DOB:

Kindly contact the webmail team for any further support. Thanks for your attention.

Which of the following is the best response?

A.

Ignore the email

B.

Respond it by saying that one should not share the password with anyone

C.

One should not respond to these mails and report such email to your supervisor