Summer Sale Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: s2p65

Easiest Solution 2 Pass Your Certification Exams

ISO-IEC-LI GAQM ISO / IEC 27002 - Lead Implementer Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GAQM ISO-IEC-LI ISO / IEC 27002 - Lead Implementer certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 1
Total 50 questions

What is an example of a security incident?

A.

The lighting in the department no longer works.

B.

A member of staff loses a laptop.

C.

You cannot set the correct fonts in your word processing software.

D.

A file is saved under an incorrect name.

An employee in the administrative department of Smiths Consultants Inc. finds out that the expiry date of a contract with one of the clients is earlier than the start date. What type of measure could prevent this error?

A.

Availability measure

B.

Integrity measure

C.

Organizational measure

D.

Technical measure

Responsibilities for information security in projects should be defined and allocated to:

A.

the project manager

B.

specified roles defined in the used project management method of the organization

C.

the InfoSec officer

D.

the owner of the involved asset

It is allowed that employees and contractors are provided with an anonymous reporting channel to report violations of information security policies or procedures (“whistle blowing”)

A.

True

B.

False

One of the ways Internet of Things (IoT) devices can communicate with each other (or ‘the outside world’) is using a so-called short-range radio protocol. Which kind of short-range radio protocol makes it possible to use your phone as a credit card?

A.

Near Field Communication (NFC)

B.

Bluetooth

C.

Radio Frequency Identification (RFID)

D.

The 4G protocol

Which of the following measures is a corrective measure?

A.

Incorporating an Intrusion Detection System (IDS) in the design of a computer center

B.

Installing a virus scanner in an information system

C.

Making a backup of the data that has been created or altered that day

D.

Restoring a backup of the correct database after a corrupt copy of the database was written over the original

The company Midwest Insurance has taken many measures to protect its information. It uses an Information Security Management System, the input and output of data in applications is validated, confidential documents are sent in encrypted form and staff use tokens to access information systems. Which of these is not a technical measure?

A.

Information Security Management System

B.

The use of tokens to gain access to information systems

C.

Validation of input and output data in applications

D.

Encryption of information

Of the following, which is the best organization or set of organizations to contribute to compliance?

A.

IT only

B.

IT, business management, HR and legal

C.

IT and management

D.

IT and legal

You are a consultant and are regularly hired by the Ministry of Defense to perform analysis. Since the assignments are irregular, you outsource the administration of your business to temporary workers. You don't want the temporary workers to have access to your reports.

Which reliability aspect of the information in your reports must you protect?

A.

Availability

B.

Integrity

C.

Confidentiality

What should be used to protect data on removable media if data confidentiality or integrity are important considerations?

A.

backup on another removable medium

B.

cryptographic techniques

C.

a password

D.

logging

What is the ISO / IEC 27002 standard?

A.

It is a guide of good practices that describes the control objectives and recommended controls regarding information security.

B.

It is a guide that focuses on the critical aspects necessary for the successful design and implementation of an ISMS in accordance with ISO / IEC 27001

C.

It is a guide for the development and use of applicable metrics and measurement techniques to determine the effectiveness of an ISMS and the controls or groups of controls implemented according to ISO / IEC 27001.

Who is authorized to change the classification of a document?

A.

 The author of the document

B.

The administrator of the document

C.

The owner of the document

D.

The manager of the owner of the document

What is the best way to comply with legislation and regulations for personal data protection?

A.

Performing a threat analysis

B.

Maintaining an incident register

C.

Performing a vulnerability analysis

D.

Appointing the responsibility to someone

You are the owner of a growing company, SpeeDelivery, which provides courier services. You decide that it is time to draw up a risk analysis for your information system. This includes an inventory of threats and risks. What is the relation between a threat, risk and risk analysis?

A.

A risk analysis identifies threats from the known risks.

B.

A risk analysis is used to clarify which threats are relevant and what risks they involve.

C.

A risk analysis is used to remove the risk of a threat.

D.

Risk analyses help to find a balance between threats and risks.

Midwest Insurance grades the monthly report of all claimed losses per insured as confidential. What is accomplished if all other reports from this insurance office are also assigned the appropriate grading?

A.

The costs for automating are easier to charge to the responsible departments.

B.

A determination can be made as to which report should be printed first and which ones can wait a little longer.

C.

Everyone can easily see how sensitive the reports' contents are by consulting the grading label.

D.

Reports can be developed more easily and with fewer errors.

Page: 1 / 1
Total 50 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved