Black Friday Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

ISO-ISMS-LA Questions and Answers

Question # 6

Someone from a large tech company calls you on behalf of your company to check the health of your PC, and therefore needs your user-id and password. What type of threat is this? 

A.

Social engineering threat 

B.

Organisational threat

C.

Technical threat 

D.

Malware threat 

Full Access
Question # 7

An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.

A.

True

B.

False

Full Access
Question # 8

What is an example of a human threat?

A.

a lightning strike

B.

fire

C.

phishing

D.

thunderstrom

Full Access
Question # 9

Which of the following is a preventive security measure? 

A.

Installing logging and monitoring software

B.

Shutting down the Internet connection after an attack

C.

Storing sensitive information in a data save

Full Access
Question # 10

You receive the following mail from the IT support team: Dear User,Starting next week, we will be deleting all inactive email accounts in order to create spaceshare the below details in order to continue using your account. In case of no response, 

Name:

Email ID:

Password:

DOB:

Kindly contact the webmail team for any further support. Thanks for your attention.

Which of the following is the best response?

A.

Ignore the email

B.

Respond it by saying that one should not share the password with anyone

C.

One should not respond to these mails and report such email to your supervisor 

Full Access
Question # 11

In what part of the process to grant access to a system does the user present a token?

A.

Authorisation

B.

Verification

C.

Authentication 

D.

Identification 

Full Access
Question # 12

Information or data that are classified as ______ do not require labeling.

A.

Public

B.

Internal

C.

Confidential

D.

Highly Confidential

Full Access
Question # 13

What is the relationship between data and information?

A.

Data is structured information.

B.

Information is the meaning and value assigned to a collection of data.

Full Access
Question # 14

The following are purposes of Information Security, except:

A.

Ensure Business Continuity

B.

Minimize Business Risk

C.

Increase Business Assets

D.

Maximize Return on Investment

Full Access
Question # 15

__________ is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.

A.

Trojan

B.

Operating System

C.

Virus

D.

Malware

Full Access