Cyber Monday Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 2
Total 15 questions
Exam Code: ISO-IEC-LI                Update: Dec 5, 2025
Exam Name: ISO / IEC 27002 - Lead Implementer

GAQM ISO / IEC 27002 - Lead Implementer ISO-IEC-LI Exam Dumps: Updated Questions & Answers (December 2025)

Question # 1

You are the owner of the courier company SpeeDelivery. You have carried out a risk analysis and now want to determine your risk strategy. You decide to take measures for the large risks but not for the small risks. What is this risk strategy called?

A.

Risk bearing

B.

Risk avoiding 

C.

Risk neutral

D.

Risk passing

Question # 2

What is the greatest risk for an organization if no information security policy has been defined?

A.

If everyone works with the same account, it is impossible to find out who worked on what.

B.

Information security activities are carried out by only a few people.

C.

Too many measures are implemented.

D.

It is not possible for an organization to implement information security in a consistent manner.

Question # 3

Midwest Insurance grades the monthly report of all claimed losses per insured as confidential. What is accomplished if all other reports from this insurance office are also assigned the appropriate grading?

A.

The costs for automating are easier to charge to the responsible departments.

B.

A determination can be made as to which report should be printed first and which ones can wait a little longer.

C.

Everyone can easily see how sensitive the reports' contents are by consulting the grading label.

D.

Reports can be developed more easily and with fewer errors.

Question # 4

Select the controls that correspond to the domain "9. ACCESS CONTROL" of ISO / 27002 (Choose three)

A.

Restriction of access to information

B.

Return of assets

C.

Management of access rights with special privileges

D.

Withdrawal or adaptation of access rights

Question # 5

Prior to employment, _________ as well as terms & conditions of employment are included as controls in ISO 27002 to ensure that employees and contractors understand their responsibilities and are suitable for the roles for which they are considered.

A.

screening

B.

authorizing

C.

controlling

D.

flexing

Question # 6

What is the best description of a risk analysis?

A.

A risk analysis is a method of mapping risks without looking at company processes.

B.

A risk analysis helps to estimate the risks and develop the appropriate security measures.

C.

A risk analysis calculates the exact financial consequences of damages.

Question # 7

Which of the following measures is a corrective measure?

A.

Incorporating an Intrusion Detection System (IDS) in the design of a computer center

B.

Installing a virus scanner in an information system

C.

Making a backup of the data that has been created or altered that day

D.

Restoring a backup of the correct database after a corrupt copy of the database was written over the original

Question # 8

What is an example of a good physical security measure?

A.

All employees and visitors carry an access pass.

B.

Printers that are defective or have been replaced are immediately removed and given away as garbage for recycling.

C.

Maintenance staff can be given quick and unimpeded access to the server area in the event of disaster.

Question # 9

What are the data protection principles set out in the GDPR?

A.

Purpose limitation, proportionality, availability, data minimisation

B.

Purpose limitation, proportionality, data minimisation, transparency

C.

Target group, proportionality, transparency, data minimisation

D.

Purpose limitation, pudicity, transparency, data minimisation

Question # 10

What sort of security does a Public Key Infrastructure (PKI) offer?

A.

It provides digital certificates that can be used to digitally sign documents. Such signatures irrefutably determine from whom a document was sent.

B.

Having a PKI shows customers that a web-based business is secure.

C.

By providing agreements, procedures and an organization structure, a PKI defines which person or which system belongs to which specific public key.

D.

A PKI ensures that backups of company data are made on a regular basis.

Page: 1 / 2
Total 15 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 05 Dec 2025