GAQM iso27-13-001 practice test

ISO 27001 : 2013 - Certified Lead Auditor Exam


Question 1

Below is Purpose of "Integrity", which is one of the Basic Components of Information Security

  • B. the property of safeguarding the accuracy and completeness of assets.
  • C. the property that information is not made available or disclosed to unauthorized individuals
  • D. the property of being accessible and usable upon demand by an authorized entity.
Answer:

B

Discussions

Question 2

-------------------------is an asset like other important business assets has value to an organization and
consequently needs to be protected.

  • A. Infrastructure
  • B. Data
  • C. Information
  • D. Security
Answer:

C

Discussions

Question 3

What is we do in ACT - From PDCA cycle

  • B. Take actions to continually improve process performance
  • C. Take actions to continually monitor process performance
  • D. Take actions to continually improve people performance
Answer:

B

Discussions

Question 4

Implement plan on a test basis - this comes under which section of PDCA

  • A. Plan
  • B. Do
  • C. Act
  • D. Check
Answer:

B

Discussions

Question 5

Which is the glue that ties the triad together

  • A. Process
  • B. People
  • C. Collaboration
  • D. Technology
Answer:

A

Discussions

Question 6

Who are allowed to access highly confidential files?

  • A. Employees with a business need-to-know
  • B. Contractors with a business need-to-know
  • C. Employees with signed NDA have a business need-to-know
  • D. Non-employees designated with approved access and have signed NDA
Answer:

C

Discussions

Question 7

Which is not a requirement of HR prior to hiring?

  • A. Undergo background verification
  • B. Applicant must complete pre-employment documentation requirements
  • C. Must undergo Awareness training on information security.
  • D. Must successfully pass Background Investigation
Answer:

C

Discussions

Question 8

CMM stands for?

  • A. Capability Maturity Matrix
  • B. Capacity Maturity Matrix
  • C. Capability Maturity Model
  • D. Capable Mature Model
Answer:

C

Discussions

Question 9

In acceptable use of Information Assets, which is the best practice?

  • A. Access to information and communication systems are provided for business purpose only
  • B. Interfering with or denying service to any user other than the employee's host
  • C. Playing any computer games during office hours
  • D. Accessing phone or network transmissions, including wireless or wifi transmissions
Answer:

A

Discussions

Question 10

All are prohibited in acceptable use of information assets, except:

  • A. Electronic chain letters
  • B. E-mail copies to non-essential readers
  • C. Company-wide e-mails with supervisor/TL permission.
  • D. Messages with very large attachments or to a large number ofrecipients.
Answer:

C

Discussions
To page 2