Pre-Summer Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = getmirror

Pass the GAQM: ISO ISO27-13-001 Questions and answers with ExamsMirror

Practice at least 50% of the questions to maximize your chances of passing.
Exam ISO27-13-001 Premium Access

View all detail and faqs for the ISO27-13-001 exam


710 Students Passed

97% Average Score

93% Same Questions
Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
Questions # 11:

What is the security management term for establishing whether someone's identity is correct?

Options:

A.

Identification

B.

Authentication

C.

Authorisation

D.

Verification

Questions # 12:

Which reliability aspect of information is compromised when a staff member denies having sent a message?

Options:

A.

Confidentiality

B.

Integrity

C.

Availability

D.

Correctness

Questions # 13:

Who are allowed to access highly confidential files?

Options:

A.

Employees with a business need-to-know

B.

Contractors with a business need-to-know

C.

Employees with signed NDA have a business need-to-know

D.

Non-employees designated with approved access and have signed NDA

Questions # 14:

Which of the following is an information security management system standard published by the International Organization for Standardization?

Options:

A.

ISO9008

B.

ISO27001

C.

ISO5501

D.

ISO22301

Questions # 15:

Which is the glue that ties the triad together

Options:

A.

Process

B.

People

C.

Collaboration

D.

Technology

Questions # 16:

Below is Purpose of "Integrity", which is one of the Basic Components of Information Security

Options:

A.

the property that information is not made available or disclosed to unauthorized individuals

B.

the property of safeguarding the accuracy and completeness of assets.

C.

the property that information is not made available or disclosed to unauthorized individuals

D.

the property of being accessible and usable upon demand by an authorized entity.

Questions # 17:

What is we do in ACT - From PDCA cycle

Options:

A.

Take actions to continually monitor process performance

B.

Take actions to continually improve process performance

C.

Take actions to continually monitor process performance

D.

Take actions to continually improve people performance

Questions # 18:

CMM stands for?

Options:

A.

Capability Maturity Matrix

B.

Capacity Maturity Matrix

C.

Capability Maturity Model

D.

Capable Mature Model

Questions # 19:

__________ is a software used or created by hackers to disrupt computer operation, gather sensitive information, or gain access to private computer systems.

Options:

A.

Trojan

B.

Operating System

C.

Virus

D.

Malware

Questions # 20:

What controls can you do to protect sensitive data in your computer when you go out for lunch?

Options:

A.

You activate your favorite screen-saver

B.

You are confident to leave your computer screen as is since a password protected screensaver is installed and it is set to activate after 10 minutes of inactivity

C.

You lock your computer by pressing Windows+L or CTRL-ALT-DELETE and then click "Lock Computer".

D.

You turn off the monitor

Viewing page 2 out of 3 pages
Viewing questions 11-20 out of questions
TOP CODES

TOP CODES

Top selling exam codes in the certification world, popular, in demand and updated to help you pass on the first try.