Halloween Special Sale - 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: best70

Page: 1 / 3
Total 30 questions
Exam Code: ISO-ISMS-LA                Update: Oct 31, 2025
Exam Name: ISO 27001:2013 ISMS - Certified Lead Auditor

GAQM ISO 27001:2013 ISMS - Certified Lead Auditor ISO-ISMS-LA Exam Dumps: Updated Questions & Answers (October 2025)

Question # 1

The following are purposes of Information Security, except:

A.

Ensure Business Continuity

B.

Minimize Business Risk

C.

Increase Business Assets

D.

Maximize Return on Investment

Question # 2

All are prohibited in acceptable use of information assets, except:

A.

Electronic chain letters

B.

E-mail copies to non-essential readers

C.

Company-wide e-mails with supervisor/TL permission.

D.

Messages with very large attachments or to a large number ofrecipients.

Question # 3

The computer room is protected by a pass reader. Only the System Management department has a pass. 

What type of security measure is this?

A.

a corrective security measure

B.

a physical security measure

C.

a logical security measure 

D.

a repressive security measure

Question # 4

A fire breaks out in a branch office of a health insurance company. The personnel are transferred to neighboring branches to continue their work. 

Where in the incident cycle is moving to a stand-by arrangements found? 

A.

between threat and incident

B.

between recovery and threat 

C.

between damage and recovery

D.

between incident and damage

Question # 5

A member of staff denies sending a particular message. 

Which reliability aspect of information is in danger here? 

A.

availability 

B.

correctness 

C.

integrity

D.

confidentiality

Question # 6

A planning process that introduced the concept of planning as a cycle that forms the basis for continuous improvement is called:

A.

 time based planning.

B.

plan, do, check, act.

C.

planning for continuous improvement.

D.

RACI Matrix

Question # 7

Which of the following is a possible event that can have a disruptive effect on the reliability of information? 

A.

Threat

B.

Risk

C.

Vulnerability

D.

Dependency

Question # 8

Which is not a requirement of HR prior to hiring?

A.

Undergo background verification

B.

Applicant must complete pre-employment documentation requirements

C.

Must undergo Awareness training on information security.

D.

Must successfully pass Background Investigation

Question # 9

You receive an E-mail from some unknown person claiming to be representative of your bank and asking for your account number and password so that they can fix your account. Such an attempt of social engineering is called

A.

Shoulder Surfing

B.

Mountaineering

C.

Phishing

D.

Spoofing

Question # 10

In what part of the process to grant access to a system does the user present a token?

A.

Authorisation

B.

Verification

C.

Authentication 

D.

Identification 

Page: 1 / 3
Total 30 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 31 Oct 2025