Spring Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

ISO27-13-001 ISO 27001 : 2013 - Certified Lead Auditor Questions and Answers

Questions 4

The following are the guidelines to protect your password, except:

Options:

A.

Don't use the same password for various company system security access

B.

Do not share passwords with anyone

C.

For easy recall, use the same password for company and personal accounts

D.

Change a temporary password on first log-on

Buy Now
Questions 5

A scenario wherein the city or location where the building(s) reside is / are not accessible.

Options:

A.

Component

B.

Facility

C.

City

D.

Country

Buy Now
Questions 6

Who are allowed to access highly confidential files?

Options:

A.

Employees with a business need-to-know

B.

Contractors with a business need-to-know

C.

Employees with signed NDA have a business need-to-know

D.

Non-employees designated with approved access and have signed NDA

Buy Now
Questions 7

What type of legislation requires a proper controlled purchase process?

Options:

A.

Personal data protection act

B.

Computer criminality act

C.

Government information act

D.

Intellectual property rights act

Buy Now
Questions 8

Information has a number of reliability aspects. Reliability is constantly being threatened. Examples of threats are: a cable becomes loose, someone alters information by accident, data is used privately or is falsified.

Which of these examples is a threat to integrity?

Options:

A.

a loose cable

B.

accidental alteration of data

C.

private use of data

D.

System restart

Buy Now
Questions 9

Below is Purpose of "Integrity", which is one of the Basic Components of Information Security

Options:

A.

the property that information is not made available or disclosed to unauthorized individuals

B.

the property of safeguarding the accuracy and completeness of assets.

C.

the property that information is not made available or disclosed to unauthorized individuals

D.

the property of being accessible and usable upon demand by an authorized entity.

Buy Now
Questions 10

What is we do in ACT - From PDCA cycle

Options:

A.

Take actions to continually monitor process performance

B.

Take actions to continually improve process performance

C.

Take actions to continually monitor process performance

D.

Take actions to continually improve people performance

Buy Now
Questions 11

The computer room is protected by a pass reader. Only the System Management department has a pass.

What type of security measure is this?

Options:

A.

a corrective security measure

B.

a physical security measure

C.

a logical security measure

D.

a repressive security measure

Buy Now
Questions 12

After a devastating office fire, all staff are moved to other branches of the company. At what moment in the incident management process is this measure effectuated?

Options:

A.

Between incident and damage

B.

Between detection and classification

C.

Between recovery and normal operations

D.

Between classification and escalation

Buy Now
Questions 13

Four types of Data Classification (Choose two)

Options:

A.

Restricted Data, Confidential Data

B.

Project Data, Highly Confidential Data

C.

Financial Data, Highly Confidential Data

D.

Unrestricted Data, Highly Confidential Data

Buy Now
Questions 14

You receive the following mail from the IT support team: Dear User,Starting next week, we will be deleting all inactive email accounts in order to create spaceshare the below details in order to continue using your account. In case of no response,

Name:

Email ID:

Password:

DOB:

Kindly contact the webmail team for any further support. Thanks for your attention.

Which of the following is the best response?

Options:

A.

Ignore the email

B.

Respond it by saying that one should not share the password with anyone

C.

One should not respond to these mails and report such email to your supervisor

Buy Now
Questions 15

How is the purpose of information security policy best described?

Options:

A.

An information security policy documents the analysis of risks and the search for countermeasures.

B.

An information security policy provides direction and support to the management regarding information security.

C.

An information security policy makes the security plan concrete by providing it with the necessary details.

D.

An information security policy provides insight into threats and the possible consequences.

Buy Now
Questions 16

You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called

Options:

A.

Shoulder Surfing

B.

Mountaineering

C.

Phishing

D.

Spoofing

Buy Now
Questions 17

The following are purposes of Information Security, except:

Options:

A.

Ensure Business Continuity

B.

Minimize Business Risk

C.

Increase Business Assets

D.

Maximize Return on Investment

Buy Now
Questions 18

What is a repressive measure in case of a fire?

Options:

A.

Taking out a fire insurance

B.

Putting out a fire after it has been detected by a fire detector

C.

Repairing damage caused by the fire

Buy Now
Questions 19

Integrity of data means

Options:

A.

Accuracy and completeness of the data

B.

Data should be viewable at all times

C.

Data should be accessed by only the right people

Buy Now
Questions 20

In what part of the process to grant access to a system does the user present a token?

Options:

A.

Authorisation

B.

Verification

C.

Authentication

D.

Identification

Buy Now
Questions 21

Which reliability aspect of information is compromised when a staff member denies having sent a message?

Options:

A.

Confidentiality

B.

Integrity

C.

Availability

D.

Correctness

Buy Now
Questions 22

Does the security have the right to ask you to display your ID badges and check your bags?

Options:

A.

True

B.

False

Buy Now
Questions 23

How are data and information related?

Options:

A.

Data is a collection of structured and unstructured information

B.

Information consists of facts and statistics collected together for reference or analysis

C.

When meaning and value are assigned to data, it becomes information

Buy Now
Questions 24

CEO sends a mail giving his views on the status of the company and the company’s future strategy and the CEO's vision and the employee's part in it. The mail should be classified as

Options:

A.

Internal Mail

B.

Public Mail

C.

Confidential Mail

D.

Restricted Mail

Buy Now
Questions 25

You work in the office of a large company. You receive a call from a person claiming to be from the Helpdesk. He asks you for your password.

What kind of threat is this?

Options:

A.

Natural threat

B.

Organizational threat

C.

Social Engineering

D.

Arason

Buy Now
Questions 26

Which of the following does a lack of adequate security controls represent?

Options:

A.

Asset

B.

Vulnerability

C.

Impact

D.

Threat

Buy Now
Questions 27

Which of the following is not a type of Information Security attack?

Options:

A.

Legal Incidents

B.

Vehicular Incidents

C.

Technical Vulnerabilities

D.

Privacy Incidents

Buy Now
Questions 28

There is a scheduled fire drill in your facility. What should you do?

Options:

A.

Participate in the drill

B.

Excuse yourself by saying you have an urgent deliverable

C.

Call in sick

D.

None of the above

Buy Now
Questions 29

A hacker gains access to a web server and reads the credit card numbers stored on that server. Which security principle is violated?

Options:

A.

Availability

B.

Confidentiality

C.

Integrity

D.

Authenticity

Buy Now
Questions 30

We can leave laptops during weekdays or weekends in locked bins.

Options:

A.

True

B.

False

Buy Now
Exam Code: ISO27-13-001
Exam Name: ISO 27001 : 2013 - Certified Lead Auditor
Last Update: Apr 30, 2026
Questions: 100

PDF + Testing Engine

$63.52  $181.49

Testing Engine

$50.57  $144.49
buy now ISO27-13-001 testing engine

PDF (Q&A)

$43.57  $124.49
buy now ISO27-13-001 pdf