Free Sales Ending Soon - 100% Valid ISO-ISMS-LA Exam Dumps with 99 Questions [Q40-Q55]

Share

Free Sales Ending Soon - 100% Valid ISO-ISMS-LA Exam Dumps with 99 Questions

Verified ISO-ISMS-LA dumps Q&As on your GAQM: ISO Exam Questions Certain Success!

NEW QUESTION 40
In order to take out a fire insurance policy, an administration office must determine the value of the data that it manages.
Which factor is [b]not[/b] important for determining the value of data for an organization?

  • A. The degree to which missing, incomplete or incorrect data can be recovered.
  • B. The content of data.
  • C. The indispensability of data for the business processes.
  • D. The importance of the business processes that make use of the data.

Answer: B

 

NEW QUESTION 41
Which is the glue that ties the triad together

  • A. Process
  • B. People
  • C. Technology
  • D. Collaboration

Answer: A

 

NEW QUESTION 42
Changes to the information processing facilities shall be done in controlled manner.

  • A. False
  • B. True

Answer: B

 

NEW QUESTION 43
Who are allowed to access highly confidential files?

  • A. Employees with signed NDA have a business need-to-know
  • B. Contractors with a business need-to-know
  • C. Non-employees designated with approved access and have signed NDA
  • D. Employees with a business need-to-know

Answer: A

 

NEW QUESTION 44
You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called

  • A. Shoulder Surfing
  • B. Phishing
  • C. Spoofing
  • D. Mountaineering

Answer: B

 

NEW QUESTION 45
__________ is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.

  • A. Virus
  • B. Operating System
  • C. Trojan
  • D. Malware

Answer: D

 

NEW QUESTION 46
What is the standard definition of ISMS?

  • A. A company wide business objectives to achieve information security awareness for establishing, implementing, operating, monitoring, reviewing, maintaining and improving
  • B. A project-based approach to achieve business objectives for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organization's information security
  • C. Is an information security systematic approach to achieve business objectives for implementation, establishing, reviewing,operating and maintaining organization's reputation.
  • D. A systematic approach for establishing, implementing, operating,monitoring, reviewing, maintaining and improving an organization's information security to achieve business objectives.

Answer: D

 

NEW QUESTION 47
What is social engineering?

  • A. A group planning for a social activity in the organization
  • B. The organization planning an activity for welfare of the neighborhood
  • C. Creating a situation wherein a third party gains confidential information from you

Answer: C

 

NEW QUESTION 48
What type of legislation requires a proper controlled purchase process?

  • A. Intellectual property rights act
  • B. Government information act
  • C. Personal data protection act
  • D. Computer criminality act

Answer: A

 

NEW QUESTION 49
In the event of an Information security incident, system users' roles and responsibilities are to be observed, except:

  • A. Cooperate with investigative personnel during investigation if needed
  • B. Preserve evidence if necessary
  • C. Make the information security incident details known to all employees
  • D. Report suspected or known incidents upon discovery through the Servicedesk

Answer: C

 

NEW QUESTION 50
Who is authorized to change the classification of a document?

  • A. The author of the document
  • B. The owner of the document
  • C. The administrator of the document
  • D. The manager of the owner of the document

Answer: B

 

NEW QUESTION 51
What is the difference between a restricted and confidential document?

  • A. Restricted - to be shared among named individuals
    Confidential - to be shared with friends and family
  • B. Restricted - to be shared among named individuals
    Confidential - to be shared across the organization only
  • C. Restricted - to be shared among an authorized group
    Confidential - to be shared among named individuals
  • D. Restricted - to be shared among named individuals
    Confidential - to be shared among an authorized group

Answer: D

 

NEW QUESTION 52
A planning process that introduced the concept of planning as a cycle that forms the basis for continuous improvement is called:

  • A. planning for continuous improvement.
  • B. RACI Matrix
  • C. plan, do, check, act.
  • D. time based planning.

Answer: C

 

NEW QUESTION 53
Implement plan on a test basis - this comes under which section of PDCA

  • A. Plan
  • B. Do
  • C. Act
  • D. Check

Answer: B

 

NEW QUESTION 54
You have a hard copy of a customer design document that you want to dispose off. What would you do

  • A. Shred it using a shredder
  • B. Throw it in any dustbin
  • C. Give it to the office boy to reuse it for other purposes
  • D. Be environment friendly and reuse it for writing

Answer: A

 

NEW QUESTION 55
......

ISO-ISMS-LA Exam Dumps - 100% Marks In ISO-ISMS-LA Exam: https://www.actual4exams.com/ISO-ISMS-LA-valid-dump.html