Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

ISO-ISMS-LA ISO 27001:2013 ISMS - Certified Lead Auditor Questions and Answers

Questions 4

Which department maintain's contacts with law enforcement authorities, regulatory

bodies, information service providers and telecommunications service providers depending on the service required.

Options:

A.

COO

B.

CISO

C.

CSM

D.

MRO

Buy Now
Questions 5

What type of compliancy standard, regulation or legislation provides a code of practice for information security?

Options:

A.

ISO/IEC 27002 

B.

Personal data protection act

C.

Computer criminality act

D.

IT Service Management

Buy Now
Questions 6

An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.

Options:

A.

True

B.

False

Buy Now
Questions 7

Integrity of data means

Options:

A.

Accuracy and completeness of the data

B.

Data should be viewable at all times

C.

Data should be accessed by only the right people

Buy Now
Questions 8

You receive the following mail from the IT support team: Dear User,Starting next week, we will be deleting all inactive email accounts in order to create spaceshare the below details in order to continue using your account. In case of no response, 

Name:

Email ID:

Password:

DOB:

Kindly contact the webmail team for any further support. Thanks for your attention.

Which of the following is the best response?

Options:

A.

Ignore the email

B.

Respond it by saying that one should not share the password with anyone

C.

One should not respond to these mails and report such email to your supervisor 

Buy Now
Questions 9

What would be the reference for you to know who should have access to data/document?

Options:

A.

Data Classification Label

B.

Access Control List (ACL)

C.

Masterlist of Project Records (MLPR)

D.

Information Rights Management (IRM)

Buy Now
Questions 10

In the event of an Information security incident, system users' roles and responsibilities are to be observed, except:

Options:

A.

Report suspected or known incidents upon discovery through the Servicedesk

B.

Preserve evidence if necessary

C.

Cooperate with investigative personnel during investigation if needed

D.

Make the information security incident details known to all employees

Buy Now
Questions 11

__________ is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.

Options:

A.

Trojan

B.

Operating System

C.

Virus

D.

Malware

Buy Now
Questions 12

Stages of Information 

Options:

A.

creation, evolution, maintenance, use, disposition

B.

creation, use, disposition, maintenance, evolution

C.

creation, distribution, use, maintenance, disposition 

D.

creation, distribution, maintenance, disposition, use

Buy Now
Questions 13

What is an example of a human threat?

Options:

A.

a lightning strike

B.

fire

C.

phishing

D.

thunderstrom

Buy Now
Questions 14

How is the purpose of information security policy best described?

Options:

A.

An information security policy documents the analysis of risks and the search for countermeasures.

B.

An information security policy provides direction and support to the management regarding information security. 

C.

An information security policy makes the security plan concrete by providing it with the necessary details.

D.

An information security policy provides insight into threats and the possible consequences. 

Buy Now
Questions 15

What is the name of the system that guarantees the coherence of information security in the organization? 

Options:

A.

 Information Security Management System (ISMS)

B.

Rootkit

C.

Security regulations for special information for the government 

D.

Information Technology Service Management (ITSM)

Buy Now
Questions 16

A decent visitor is roaming around without visitor's ID. As an employee you should do the following, except:

Options:

A.

Say "hi" and offer coffee

B.

Call the receptionist and inform about the visitor

C.

Greet and ask him what is his business

D.

Escort him to his destination

Buy Now
Questions 17

Which of the following is not a type of Information Security attack?

Options:

A.

Legal Incidents

B.

Vehicular Incidents

C.

Technical Vulnerabilities

D.

Privacy Incidents

Buy Now
Questions 18

You work in the office of a large company. You receive a call from a person claiming to be from the Helpdesk. He asks you for your password. 

What kind of threat is this?

Options:

A.

Natural threat

B.

Organizational threat

C.

Social Engineering

D.

Arason

Buy Now
Questions 19

What type of measure involves the stopping of possible consequences of security incidents?

Options:

A.

Corrective

B.

Detective

C.

Repressive 

D.

Preventive

Buy Now
Questions 20

Backup media is kept in the same secure area as the servers. What risk may the organisation be exposed to? 

Options:

A.

Unauthorised persons will have access to both the servers and backups 

B.

Responsibility for the backups is not defined well

C.

After a fire, the information systems cannot be restored

D.

After a server crash, it will take extra time to bring it back up again

Buy Now
Questions 21

Which of the following is a technical security measure? 

Options:

A.

Encryption

B.

Security policy

C.

Safe storage of backups 

D.

User role profiles.

Buy Now
Questions 22

An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.

Options:

A.

True

B.

False

Buy Now
Questions 23

A couple of years ago you started your company which has now grown from 1 to 20 employees. Your company’s information is worth more and more and gone are the days when you could keep control yourself. You are aware that you have to take measures, but what should they be? You hire a consultant who advises you to start with a qualitative risk analysis. 

What is a qualitative risk analysis? 

Options:

A.

This analysis follows a precise statistical probability calculation in order to calculate exact loss caused by damage. 

B.

This analysis is based on scenarios and situations and produces a subjective view of the possible threats.

Buy Now
Questions 24

-------------------------is an asset like other important business assets has value to an organization and consequently needs to be protected.

Options:

A.

Infrastructure

B.

Data

C.

Information

D.

Security

Buy Now
Questions 25

Often, people do not pick up their prints from a shared printer. How can this affect the confidentiality of information?

Options:

A.

Confidentiality cannot be guaranteed

B.

Integrity cannot be guaranteed

C.

Authenticity cannot be guaranteed

D.

Availability cannot be guaranteed

Buy Now
Questions 26

What is the difference between a restricted and confidential document?

Options:

A.

Restricted - to be shared among an authorized group

Confidential - to be shared among named individuals

B.

Restricted - to be shared among named individuals 

Confidential - to be shared among an authorized group

C.

Restricted - to be shared among named individuals 

Confidential - to be shared across the organization only

D.

Restricted - to be shared among named individuals 

Confidential - to be shared with friends and family

Buy Now
Questions 27

In order to take out a fire insurance policy, an administration office must determine the value of the data that it manages. 

Which factor is [b]not[/b] important for determining the value of data for an organization?

Options:

A.

The content of data.

B.

The degree to which missing, incomplete or incorrect data can be recovered.

C.

The indispensability of data for the business processes.

D.

The importance of the business processes that make use of the data. 

Buy Now
Questions 28

A scenario wherein the city or location where the building(s) reside is / are not accessible.

Options:

A.

Component

B.

Facility

C.

City

D.

Country

Buy Now
Questions 29

Does the security have the right to ask you to display your ID badges and check your bags?

Options:

A.

True

B.

False

Buy Now
Questions 30

Which threat could occur if no physical measures are taken?

Options:

A.

Unauthorised persons viewing sensitive files

B.

Confidential prints being left on the printer 

C.

A server shutting down because of overheating 

D.

Hackers entering the corporate network 

Buy Now
Exam Code: ISO-ISMS-LA
Exam Name: ISO 27001:2013 ISMS - Certified Lead Auditor
Last Update: Apr 30, 2026
Questions: 100

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now ISO-ISMS-LA testing engine

PDF (Q&A)

$43.57  $124.49
buy now ISO-ISMS-LA pdf