Weekend Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple70

Pass the GAQM: ISO ISO-ISMS-LA Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam ISO-ISMS-LA Premium Access

View all detail and faqs for the ISO-ISMS-LA exam


343 Students Passed

92% Average Score

98% Same Questions
Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
Questions # 1:

The following are the guidelines to protect your password, except: 

Options:

A.

Don't use the same password for various company system security access

B.

Do not share passwords with anyone

C.

For easy recall, use the same password for company and personal accounts

D.

Change a temporary password on first log-on

Questions # 2:

__________ is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.

Options:

A.

Trojan

B.

Operating System

C.

Virus

D.

Malware

Questions # 3:

Phishing is what type of Information Security Incident?

Options:

A.

Private Incidents

B.

Cracker/Hacker Attacks

C.

Technical Vulnerabilities

D.

Legal Incidents

Questions # 4:

What is the name of the system that guarantees the coherence of information security in the organization? 

Options:

A.

 Information Security Management System (ISMS)

B.

Rootkit

C.

Security regulations for special information for the government 

D.

Information Technology Service Management (ITSM)

Questions # 5:

Which measure is a preventive measure? 

Options:

A.

Installing a logging system that enables changes in a system to be recognized 

B.

Shutting down all internet traffic after a hacker has gained access to the company systems

C.

Putting sensitive information in a safe

Questions # 6:

Which department maintain's contacts with law enforcement authorities, regulatory

bodies, information service providers and telecommunications service providers depending on the service required.

Options:

A.

COO

B.

CISO

C.

CSM

D.

MRO

Questions # 7:

Information Security is a matter of building and maintaining ________ .

Options:

A.

Confidentiality

B.

Trust

C.

Protection

D.

Firewalls

Questions # 8:

The following are purposes of Information Security, except:

Options:

A.

Ensure Business Continuity

B.

Minimize Business Risk

C.

Increase Business Assets

D.

Maximize Return on Investment

Questions # 9:

What type of legislation requires a proper controlled purchase process?

Options:

A.

Personal data protection act 

B.

Computer criminality act 

C.

Government information act 

D.

Intellectual property rights act

Questions # 10:

How is the purpose of information security policy best described?

Options:

A.

An information security policy documents the analysis of risks and the search for countermeasures.

B.

An information security policy provides direction and support to the management regarding information security. 

C.

An information security policy makes the security plan concrete by providing it with the necessary details.

D.

An information security policy provides insight into threats and the possible consequences. 

Viewing page 1 out of 3 pages
Viewing questions 1-10 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.