New Year Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

ISO27-13-001 Questions and Answers

Question # 6

Which of the following is a preventive security measure?

A.

Installing logging and monitoring software

B.

Shutting down the Internet connection after an attack

C.

Storing sensitive information in a data save

Full Access
Question # 7

Who is responsible for Initial asset allocation to the user/custodian of the assets?

A.

Asset Manager

B.

Asset Owner

C.

Asset Practitioner

D.

Asset Stakeholder

Full Access
Question # 8

Often, people do not pick up their prints from a shared printer. How can this affect the confidentiality of information?

A.

Confidentiality cannot be guaranteed

B.

Integrity cannot be guaranteed

C.

Authenticity cannot be guaranteed

D.

Availability cannot be guaranteed

Full Access
Question # 9

CEO sends a mail giving his views on the status of the company and the company’s future strategy and the CEO's vision and the employee's part in it. The mail should be classified as

A.

Internal Mail

B.

Public Mail

C.

Confidential Mail

D.

Restricted Mail

Full Access
Question # 10

Implement plan on a test basis - this comes under which section of PDCA

A.

Plan

B.

Do

C.

Act

D.

Check

Full Access
Question # 11

All are prohibited in acceptable use of information assets, except:

A.

Electronic chain letters

B.

E-mail copies to non-essential readers

C.

Company-wide e-mails with supervisor/TL permission.

D.

Messages with very large attachments or to a large number ofrecipients.

Full Access
Question # 12

What type of measure involves the stopping of possible consequences of security incidents?

A.

Corrective

B.

Detective

C.

Repressive

D.

Preventive

Full Access
Question # 13

What is the relationship between data and information?

A.

Data is structured information.

B.

Information is the meaning and value assigned to a collection of data.

Full Access
Question # 14

What is the security management term for establishing whether someone's identity is correct?

A.

Identification

B.

Authentication

C.

Authorisation

D.

Verification

Full Access
Question # 15

An employee caught with offense of abusing the internet, such as P2P file sharing or video/audio streaming, will not receive a warning for committing such act but will directly receive an IR.

A.

True

B.

False

Full Access