Black Friday Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65percent

Welcome To DumpsPedia

ISO-IEC-LI Sample Questions Answers

Questions 4

An employee in the administrative department of Smiths Consultants Inc. finds out that the expiry date of a contract with one of the clients is earlier than the start date. What type of measure could prevent this error?

Options:

A.

Availability measure

B.

Integrity measure

C.

Organizational measure

D.

Technical measure

Buy Now
Questions 5

You are the owner of a growing company, SpeeDelivery, which provides courier services. You decide that it is time to draw up a risk analysis for your information system. This includes an inventory of threats and risks. What is the relation between a threat, risk and risk analysis?

Options:

A.

A risk analysis identifies threats from the known risks.

B.

A risk analysis is used to clarify which threats are relevant and what risks they involve.

C.

A risk analysis is used to remove the risk of a threat.

D.

Risk analyses help to find a balance between threats and risks.

Buy Now
Questions 6

It is allowed that employees and contractors are provided with an anonymous reporting channel to report violations of information security policies or procedures (“whistle blowing”)

Options:

A.

True

B.

False

Buy Now
Questions 7

Which is a legislative or regulatory act related to information security that can be imposed upon all organizations?

Options:

A.

ISO/IEC 27001:2005

B.

Intellectual Property Rights

C.

ISO/IEC 27002:2005

D.

Personal data protection legislation

Buy Now
Questions 8

Who is authorized to change the classification of a document?

Options:

A.

 The author of the document

B.

The administrator of the document

C.

The owner of the document

D.

The manager of the owner of the document

Buy Now
Questions 9

Logging in to a computer system is an access-granting process consisting of three steps: identification, authentication and authorization. What occurs during the first step of this process: identification?

Options:

A.

The first step consists of checking if the user is using the correct certificate.

B.

The first step consists of checking if the user appears on the list of authorized users.

C.

The first step consists of comparing the password with the registered password.

D.

The first step consists of granting access to the information to which the user is authorized.

Buy Now
Questions 10

Which of the following measures is a corrective measure?

Options:

A.

Incorporating an Intrusion Detection System (IDS) in the design of a computer center

B.

Installing a virus scanner in an information system

C.

Making a backup of the data that has been created or altered that day

D.

Restoring a backup of the correct database after a corrupt copy of the database was written over the original

Buy Now
Questions 11

Companies use 27002 for compliance for which of the following reasons:

Options:

A.

A structured program that helps with security and compliance

B.

Explicit requirements for all regulations

C.

Compliance with ISO 27002 is sufficient to comply with all regulations

Buy Now
Questions 12

In the context of contact with special interest groups, any information-sharing agreements should identify requirements for the protection of _________ information.

Options:

A.

Availability

B.

Confidential

C.

Authentic

D.

Authorization

Buy Now
Questions 13

You are a consultant and are regularly hired by the Ministry of Defense to perform analysis. Since the assignments are irregular, you outsource the administration of your business to temporary workers. You don't want the temporary workers to have access to your reports.

Which reliability aspect of the information in your reports must you protect?

Options:

A.

Availability

B.

Integrity

C.

Confidentiality

Buy Now
Questions 14

One of the ways Internet of Things (IoT) devices can communicate with each other (or ‘the outside world’) is using a so-called short-range radio protocol. Which kind of short-range radio protocol makes it possible to use your phone as a credit card?

Options:

A.

Near Field Communication (NFC)

B.

Bluetooth

C.

Radio Frequency Identification (RFID)

D.

The 4G protocol

Buy Now
Questions 15

A non-human threat for computer systems is a flood. In which situation is a flood always a relevant threat?

Options:

A.

If the risk analysis has not been carried out.

B.

When computer systems are kept in a cellar below ground level.

C.

When the computer systems are not insured.

D.

When the organization is located near a river.

Buy Now
Exam Code: ISO-IEC-LI
Exam Name: ISO / IEC 27002 - Lead Implementer
Last Update: Nov 22, 2024
Questions: 50
$57.75  $164.99
$43.75  $124.99
$36.75  $104.99
buy now ISO-IEC-LI