Big Black Friday Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

ISO 27001:2013 ISMS - Certified Lead Auditor Question and Answers

ISO 27001:2013 ISMS - Certified Lead Auditor

Last Update Nov 30, 2025
Total Questions : 100

We are offering FREE ISO-ISMS-LA GAQM exam questions. All you do is to just go and sign up. Give your details, prepare ISO-ISMS-LA free exam questions and then go for complete pool of ISO 27001:2013 ISMS - Certified Lead Auditor test questions that will help you more.

ISO-ISMS-LA pdf

ISO-ISMS-LA PDF

$36.75  $104.99
ISO-ISMS-LA Engine

ISO-ISMS-LA Testing Engine

$43.75  $124.99
ISO-ISMS-LA PDF + Engine

ISO-ISMS-LA PDF + Testing Engine

$57.75  $164.99
Questions 1

What is the relationship between data and information?

Options:

A.  

Data is structured information.

B.  

Information is the meaning and value assigned to a collection of data.

Discussion 0
Questions 2

In order to take out a fire insurance policy, an administration office must determine the value of the data that it manages. 

Which factor is [b]not[/b] important for determining the value of data for an organization?

Options:

A.  

The content of data.

B.  

The degree to which missing, incomplete or incorrect data can be recovered.

C.  

The indispensability of data for the business processes.

D.  

The importance of the business processes that make use of the data. 

Discussion 0
Questions 3

Who are allowed to access highly confidential files?

Options:

A.  

Employees with a business need-to-know

B.  

Contractors with a business need-to-know

C.  

Employees with signed NDA have a business need-to-know

D.  

Non-employees designated with approved access and have signed NDA

Discussion 0
Questions 4

Four types of Data Classification (Choose two)

Options:

A.  

Restricted Data, Confidential Data

B.  

Project Data, Highly Confidential Data

C.  

Financial Data, Highly Confidential Data

D.  

Unrestricted Data, Highly Confidential Data

Discussion 0
Questions 5

A scenario wherein the city or location where the building(s) reside is / are not accessible.

Options:

A.  

Component

B.  

Facility

C.  

City

D.  

Country

Discussion 0
Questions 6

A well-executed risk analysis provides a great deal of useful information. A risk analysis has four main objectives. 

What is not one of the four main objectives of a risk analysis?

Options:

A.  

Identifying assets and their value

B.  

Implementing counter measures

C.  

Establishing a balance between the costs of an incident and the costs of a security measure

D.  

Determining relevant vulnerabilities and threats  

Discussion 0
Questions 7

A member of staff denies sending a particular message. 

Which reliability aspect of information is in danger here? 

Options:

A.  

availability 

B.  

correctness 

C.  

integrity

D.  

confidentiality

Discussion 0
Questions 8

We can leave laptops during weekdays or weekends in locked bins.

Options:

A.  

True

B.  

False

Discussion 0
Questions 9

Which measure is a preventive measure? 

Options:

A.  

Installing a logging system that enables changes in a system to be recognized 

B.  

Shutting down all internet traffic after a hacker has gained access to the company systems

C.  

Putting sensitive information in a safe

Discussion 0
Questions 10

What is a definition of compliance? 

Options:

A.  

Laws, considered collectively or the process of making or enacting laws 

B.  

The state or fact of according with or meeting rules or standards

C.  

An official or authoritative instruction 

D.  

A rule or directive made and maintained by an authority.

Discussion 0
Questions 11

CMM stands for?

Options:

A.  

Capability Maturity Matrix

B.  

Capacity Maturity Matrix

C.  

Capability Maturity Model

D.  

Capable Mature Model

Discussion 0
Questions 12

In what part of the process to grant access to a system does the user present a token?

Options:

A.  

Authorisation

B.  

Verification

C.  

Authentication 

D.  

Identification 

Discussion 0
Questions 13

Which of the following statements are correct for Clean Desk Policy?

Options:

A.  

Don't leave confidential documents on your desk.

B.  

Don't leave valuable items on your desk if you are not in your work area.

C.  

Don't leave highly confidential items.

D.  

Don't leave laptops without cable lock.

Discussion 0
Questions 14

An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.

Options:

A.  

True

B.  

False

Discussion 0
Questions 15

There is a network printer in the hallway of the company where you work. Many employees don’t pick up their printouts immediately and leave them on the printer. 

What are the consequences of this to the reliability of the information?

Options:

A.  

The integrity of the information is no longer guaranteed.

B.  

The availability of the information is no longer guaranteed.

C.  

The confidentiality of the information is no longer guaranteed.

D.  

The Security of the information is no longer guaranteed.

Discussion 0