Weekend Sale Special Limited Time Flat 70% Discount offer - Ends in 0d 00h 00m 00s - Coupon code: 70spcl

GAQM ISO-IEC-LI ISO / IEC 27002 - Lead Implementer Exam Practice Test

Page: 1 / 5
Total 50 questions

ISO / IEC 27002 - Lead Implementer Questions and Answers

Question 1

One of the ways Internet of Things (IoT) devices can communicate with each other (or ‘the outside world’) is using a so-called short-range radio protocol. Which kind of short-range radio protocol makes it possible to use your phone as a credit card?

Options:

A.

Near Field Communication (NFC)

B.

Bluetooth

C.

Radio Frequency Identification (RFID)

D.

The 4G protocol

Question 2

Responsibilities for information security in projects should be defined and allocated to:

Options:

A.

the project manager

B.

specified roles defined in the used project management method of the organization

C.

the InfoSec officer

D.

the owner of the involved asset

Question 3

Of the following, which is the best organization or set of organizations to contribute to compliance?

Options:

A.

IT only

B.

IT, business management, HR and legal

C.

IT and management

D.

IT and legal

Question 4

Midwest Insurance grades the monthly report of all claimed losses per insured as confidential. What is accomplished if all other reports from this insurance office are also assigned the appropriate grading?

Options:

A.

The costs for automating are easier to charge to the responsible departments.

B.

A determination can be made as to which report should be printed first and which ones can wait a little longer.

C.

Everyone can easily see how sensitive the reports' contents are by consulting the grading label.

D.

Reports can be developed more easily and with fewer errors.

Question 5

Susan sends an email to Paul. Who determines the meaning and the value of information in this email?

Options:

A.

Paul, the recipient of the information.

B.

Paul and Susan, the sender and the recipient of the information.

C.

Susan, the sender of the information.

Question 6

You are the owner of a growing company, SpeeDelivery, which provides courier services. You decide that it is time to draw up a risk analysis for your information system. This includes an inventory of threats and risks. What is the relation between a threat, risk and risk analysis?

Options:

A.

A risk analysis identifies threats from the known risks.

B.

A risk analysis is used to clarify which threats are relevant and what risks they involve.

C.

A risk analysis is used to remove the risk of a threat.

D.

Risk analyses help to find a balance between threats and risks.

Question 7

You are a consultant and are regularly hired by the Ministry of Defense to perform analysis. Since the assignments are irregular, you outsource the administration of your business to temporary workers. You don't want the temporary workers to have access to your reports.

Which reliability aspect of the information in your reports must you protect?

Options:

A.

Availability

B.

Integrity

C.

Confidentiality

Page: 1 / 5
Total 50 questions