Month End Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmaspas7

Easiest Solution 2 Pass Your Certification Exams

ISO-ISMS-LA GAQM ISO 27001:2013 ISMS - Certified Lead Auditor Free Practice Exam Questions (2025 Updated)

Prepare effectively for your GAQM ISO-ISMS-LA ISO 27001:2013 ISMS - Certified Lead Auditor certification with our extensive collection of free, high-quality practice questions. Each question is designed to mirror the actual exam format and objectives, complete with comprehensive answers and detailed explanations. Our materials are regularly updated for 2025, ensuring you have the most current resources to build confidence and succeed on your first attempt.

Page: 1 / 2
Total 100 questions

How are data and information related? 

A.

Data is a collection of structured and unstructured information 

B.

Information consists of facts and statistics collected together for reference or analysis

C.

When meaning and value are assigned to data, it becomes information

Which reliability aspect of information is compromised when a staff member denies having sent a message?

A.

Confidentiality

B.

Integrity 

C.

Availability

D.

Correctness

There is a network printer in the hallway of the company where you work. Many employees don’t pick up their printouts immediately and leave them on the printer. 

What are the consequences of this to the reliability of the information?

A.

The integrity of the information is no longer guaranteed.

B.

The availability of the information is no longer guaranteed.

C.

The confidentiality of the information is no longer guaranteed.

D.

The Security of the information is no longer guaranteed.

Changes on project-managed applications or database should undergo the change control process as documented.

A.

True

B.

False

In which order is an Information Security Management System set up? 

A.

Implementation, operation, maintenance, establishment

B.

Implementation, operation, improvement, maintenance 

C.

Establishment, implementation, operation, maintenance

D.

Establishment, operation, monitoring, improvement 

Which of the following does an Asset Register contain? (Choose two)

A.

Asset Type

B.

Asset Owner

C.

Asset Modifier

D.

Process ID

Changes to the information processing facilities shall be done in controlled manner.

A.

True

B.

False

A property of Information that has the ability to prove occurrence of a claimed event.

A.

Electronic chain letters 

B.

Integrity

C.

Availability

D.

Accessibility

In acceptable use of Information Assets, which is the best practice?

A.

Access to information and communication systems are provided for business purpose only

B.

Interfering with or denying service to any user other than the employee's host

C.

Playing any computer games during office hours

D.

Accessing phone or network transmissions, including wireless or wifi transmissions

Implement plan on a test basis - this comes under which section of PDCA

A.

Plan

B.

Do

C.

Act

D.

Check

Which of the following is a preventive security measure? 

A.

Installing logging and monitoring software

B.

Shutting down the Internet connection after an attack

C.

Storing sensitive information in a data save

Which department maintain's contacts with law enforcement authorities, regulatory

bodies, information service providers and telecommunications service providers depending on the service required.

A.

COO

B.

CISO

C.

CSM

D.

MRO

In what part of the process to grant access to a system does the user present a token?

A.

Authorisation

B.

Verification

C.

Authentication 

D.

Identification 

You work in the office of a large company. You receive a call from a person claiming to be from the Helpdesk. He asks you for your password. 

What kind of threat is this?

A.

Natural threat

B.

Organizational threat

C.

Social Engineering

D.

Arason

Below is Purpose of "Integrity", which is one of the Basic Components of Information Security

A.

the property that information is not made available or disclosed to unauthorized individuals

B.

the property of safeguarding the accuracy and completeness of assets.

C.

the property that information is not made available or disclosed to unauthorized individuals

D.

the property of being accessible and usable upon demand by an authorized entity.

Which of the following is a possible event that can have a disruptive effect on the reliability of information? 

A.

Threat

B.

Risk

C.

Vulnerability

D.

Dependency

What is the purpose of an Information Security policy?

A.

An information security policy makes the security plan concrete by providing the necessary details

B.

An information security policy provides insight into threats and the possible consequences

C.

An information security policy provides direction and support to the management regarding information security

D.

An information security policy documents the analysis of risks and the search for countermeasures 

A planning process that introduced the concept of planning as a cycle that forms the basis for continuous improvement is called:

A.

 time based planning.

B.

plan, do, check, act.

C.

planning for continuous improvement.

D.

RACI Matrix

Who is responsible for Initial asset allocation to the user/custodian of the assets?

A.

Asset Manager

B.

Asset Owner

C.

Asset Practitioner

D.

Asset Stakeholder

Which of the following is an information security management system standard published by the International Organization for Standardization?

A.

ISO9008

B.

ISO27001

C.

ISO5501

D.

ISO22301

Page: 1 / 2
Total 100 questions
Copyright © 2014-2025 Solution2Pass. All Rights Reserved