Big Black Friday Sale 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

ExamsBrite Dumps

ISO 27001 : 2013 - Certified Lead Auditor Question and Answers

ISO 27001 : 2013 - Certified Lead Auditor

Last Update Nov 30, 2025
Total Questions : 100

We are offering FREE ISO27-13-001 GAQM exam questions. All you do is to just go and sign up. Give your details, prepare ISO27-13-001 free exam questions and then go for complete pool of ISO 27001 : 2013 - Certified Lead Auditor test questions that will help you more.

ISO27-13-001 pdf

ISO27-13-001 PDF

$36.75  $104.99
ISO27-13-001 Engine

ISO27-13-001 Testing Engine

$43.75  $124.99
ISO27-13-001 PDF + Engine

ISO27-13-001 PDF + Testing Engine

$57.75  $164.99
Questions 1

You receive the following mail from the IT support team: Dear User,Starting next week, we will be deleting all inactive email accounts in order to create spaceshare the below details in order to continue using your account. In case of no response,

Name:

Email ID:

Password:

DOB:

Kindly contact the webmail team for any further support. Thanks for your attention.

Which of the following is the best response?

Options:

A.  

Ignore the email

B.  

Respond it by saying that one should not share the password with anyone

C.  

One should not respond to these mails and report such email to your supervisor

Discussion 0
Questions 2

Which threat could occur if no physical measures are taken?

Options:

A.  

Unauthorised persons viewing sensitive files

B.  

Confidential prints being left on the printer

C.  

A server shutting down because of overheating

D.  

Hackers entering the corporate network

Discussion 0
Questions 3

All are prohibited in acceptable use of information assets, except:

Options:

A.  

Electronic chain letters

B.  

E-mail copies to non-essential readers

C.  

Company-wide e-mails with supervisor/TL permission.

D.  

Messages with very large attachments or to a large number ofrecipients.

Discussion 0
Questions 4

After a devastating office fire, all staff are moved to other branches of the company. At what moment in the incident management process is this measure effectuated?

Options:

A.  

Between incident and damage

B.  

Between detection and classification

C.  

Between recovery and normal operations

D.  

Between classification and escalation

Discussion 0
Questions 5

A scenario wherein the city or location where the building(s) reside is / are not accessible.

Options:

A.  

Component

B.  

Facility

C.  

City

D.  

Country

Discussion 0
Questions 6

In acceptable use of Information Assets, which is the best practice?

Options:

A.  

Access to information and communication systems are provided for business purpose only

B.  

Interfering with or denying service to any user other than the employee's host

C.  

Playing any computer games during office hours

D.  

Accessing phone or network transmissions, including wireless or wifi transmissions

Discussion 0
Questions 7

A property of Information that has the ability to prove occurrence of a claimed event.

Options:

A.  

Electronic chain letters

B.  

Integrity

C.  

Availability

D.  

Accessibility

Discussion 0
Questions 8

In order to take out a fire insurance policy, an administration office must determine the value of the data that it manages.

Which factor is [b]not[/b] important for determining the value of data for an organization?

Options:

A.  

The content of data.

B.  

The degree to which missing, incomplete or incorrect data can be recovered.

C.  

The indispensability of data for the business processes.

D.  

The importance of the business processes that make use of the data.

Discussion 0
Questions 9

In the event of an Information security incident, system users' roles and responsibilities are to be observed, except:

Options:

A.  

Report suspected or known incidents upon discovery through the Servicedesk

B.  

Preserve evidence if necessary

C.  

Cooperate with investigative personnel during investigation if needed

D.  

Make the information security incident details known to all employees

Discussion 0
Questions 10

Access Control System, CCTV and security guards are form of:

Options:

A.  

Environment Security

B.  

Access Control

C.  

Physical Security

D.  

Compliance

Discussion 0
Questions 11

What is the relationship between data and information?

Options:

A.  

Data is structured information.

B.  

Information is the meaning and value assigned to a collection of data.

Discussion 0
Questions 12

What is the worst possible action that an employee may receive for sharing his or her password or access with others?

Options:

A.  

Forced roll off from the project

B.  

The lowest rating on his or her performance assessment

C.  

Three days suspension from work

D.  

Termination

Discussion 0
Questions 13

Which of the following does an Asset Register contain? (Choose two)

Options:

A.  

Asset Type

B.  

Asset Owner

C.  

Asset Modifier

D.  

Process ID

Discussion 0
Questions 14

You see a blue color sticker on certain physical assets. What does this signify?

Options:

A.  

The asset is very high critical and its failure affects the entire organization

B.  

The asset with blue stickers should be kept air conditioned at all times

C.  

The asset is high critical and its failure will affect a group/s/project's work in the organization

D.  

The asset is critical and the impact is restricted to an employee only

Discussion 0
Questions 15

After a fire has occurred, what repressive measure can be taken?

Options:

A.  

Extinguishing the fire after the fire alarm sounds

B.  

Buying in a proper fire insurance policy

C.  

Repairing all systems after the fire

Discussion 0