Exam Details

  • Exam Code
    :ISO-IEC-LI
  • Exam Name
    :ISO / IEC 27002 - Lead Implementer
  • Certification
    :ISO Certifications
  • Vendor
    :GAQM
  • Total Questions
    :50 Q&As
  • Last Updated
    :May 16, 2024

GAQM ISO Certifications ISO-IEC-LI Questions & Answers

  • Question 11:

    You have just started working at a large organization. You have been asked to sign a code of conduct as well as a contract. What does the organization wish to achieve with this?

    A. A code of conduct helps to prevent the misuse of IT facilities.

    B. A code of conduct is a legal obligation that organizations have to meet.

    C. A code of conduct prevents a virus outbreak.

    D. A code of conduct gives staff guidance on how to report suspected misuses of IT facilities.

  • Question 12:

    Which of the following measures is a corrective measure?

    A. Incorporating an Intrusion Detection System (IDS) in the design of a computer center

    B. Installing a virus scanner in an information system

    C. Making a backup of the data that has been created or altered that day

    D. Restoring a backup of the correct database after a corrupt copy of the database was written over the original

  • Question 13:

    What do employees need to know to report a security incident?

    A. How to report an incident and to whom.

    B. Whether the incident has occurred before and what was the resulting damage.

    C. The measures that should have been taken to prevent the incident in the first place.

    D. Who is responsible for the incident and whether it was intentional.

  • Question 14:

    What is an example of a non-human threat to the physical environment?

    A. Fraudulent transaction

    B. Corrupted file

    C. Storm

    D. Virus

  • Question 15:

    What is the best description of a risk analysis?

    A. A risk analysis is a method of mapping risks without looking at company processes.

    B. A risk analysis helps to estimate the risks and develop the appropriate security measures.

    C. A risk analysis calculates the exact financial consequences of damages.

  • Question 16:

    What is an example of a good physical security measure?

    A. All employees and visitors carry an access pass.

    B. Printers that are defective or have been replaced are immediately removed and given away as garbage for recycling.

    C. Maintenance staff can be given quick and unimpeded access to the server area in the event of disaster.

  • Question 17:

    You apply for a position in another company and get the job. Along with your contract, you are asked to sign a code of conduct. What is a code of conduct?

    A. A code of conduct specifies how employees are expected to conduct themselves and is the same for all companies.

    B. A code of conduct is a standard part of a labor contract.

    C. A code of conduct differs from company to company and specifies, among other things, the rules of behavior with regard to the usage of information systems.

  • Question 18:

    Susan sends an email to Paul. Who determines the meaning and the value of information in this email?

    A. Paul, the recipient of the information.

    B. Paul and Susan, the sender and the recipient of the information.

    C. Susan, the sender of the information.

  • Question 19:

    A company moves into a new building. A few weeks after the move, a visitor appears unannounced in the

    office of the director. An investigation shows that visitors passes grant the same access as the passes of

    the company's staff.

    Which kind of security measure could have prevented this?

    A. physical security measure

    B. An organizational security measure

    C. A technical security measure

  • Question 20:

    Logging in to a computer system is an access-granting process consisting of three steps: identification, authentication and authorization.

    What occurs during the first step of this process: identification?

    A. The first step consists of checking if the user is using the correct certificate.

    B. The first step consists of checking if the user appears on the list of authorized users.

    C. The first step consists of comparing the password with the registered password.

    D. The first step consists of granting access to the information to which the user is authorized.

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GAQM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ISO-IEC-LI exam preparations and GAQM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.