Exam Details

  • Exam Code
    :ISO-ISMS-LA
  • Exam Name
    :ISO 27001:2013 ISMS - Certified Lead Auditor
  • Certification
    :GAQM Certifications
  • Vendor
    :GAQM
  • Total Questions
    :100 Q&As
  • Last Updated
    :Jun 08, 2025

GAQM GAQM Certifications ISO-ISMS-LA Questions & Answers

  • Question 41:

    Which of the following is not a type of Information Security attack?

    A. Legal Incidents

    B. Vehicular Incidents

    C. Technical Vulnerabilities

    D. Privacy Incidents

  • Question 42:

    In the event of an Information security incident, system users' roles and responsibilities are to be observed, except:

    A. Report suspected or known incidents upon discovery through the Servicedesk

    B. Preserve evidence if necessary

    C. Cooperate with investigative personnel during investigation if needed

    D. Make the information security incident details known to all employees

  • Question 43:

    What is the difference between a restricted and confidential document?

    A. Restricted - to be shared among an authorized group Confidential - to be shared among named individuals

    B. Restricted - to be shared among named individuals Confidential - to be shared among an authorized group

    C. Restricted - to be shared among named individuals Confidential - to be shared across the organization only

    D. Restricted - to be shared among named individuals Confidential - to be shared with friends and family

  • Question 44:

    Who is authorized to change the classification of a document?

    A. The author of the document

    B. The administrator of the document

    C. The owner of the document

    D. The manager of the owner of the document

  • Question 45:

    What is the standard definition of ISMS?

    A. Is an information security systematic approach to achieve business objectives for implementation, establishing, reviewing,operating and maintaining organization's reputation.

    B. A company wide business objectives to achieve information security awareness for establishing, implementing, operating, monitoring, reviewing, maintaining and improving

    C. A project-based approach to achieve business objectives for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an organization's information security

    D. A systematic approach for establishing, implementing, operating,monitoring, reviewing, maintaining and improving an organization's information security to achieve business objectives.

  • Question 46:

    As a new member of the IT department you have noticed that confidential information has been leaked several times. This may damage the reputation of the company. You have been asked to propose an organisational measure to protect laptop computers. What is the first step in a structured approach to come up with this measure?

    A. Appoint security staff

    B. Encrypt all sensitive information

    C. Formulate a policy

    D. Set up an access control procedure

  • Question 47:

    Which is not a requirement of HR prior to hiring?

    A. Undergo background verification

    B. Applicant must complete pre-employment documentation requirements

    C. Must undergo Awareness training on information security.

    D. Must successfully pass Background Investigation

  • Question 48:

    The following are the guidelines to protect your password, except:

    A. Don't use the same password for various company system security access

    B. Do not share passwords with anyone

    C. For easy recall, use the same password for company and personal accounts

    D. Change a temporary password on first log-on

  • Question 49:

    What type of system ensures a coherent Information Security organisation?

    A. Federal Information Security Management Act (FISMA)

    B. Information Technology Service Management System (ITSM)

    C. Information Security Management System (ISMS)

    D. Information Exchange Data System (IEDS)

  • Question 50:

    The computer room is protected by a pass reader. Only the System Management department has a pass. What type of security measure is this?

    A. a corrective security measure

    B. a physical security measure

    C. a logical security measure

    D. a repressive security measure

Tips on How to Prepare for the Exams

Nowadays, the certification exams become more and more important and required by more and more enterprises when applying for a job. But how to prepare for the exam effectively? How to prepare for the exam in a short time with less efforts? How to get a ideal result and how to find the most reliable resources? Here on Vcedump.com, you will find all the answers. Vcedump.com provide not only GAQM exam questions, answers and explanations but also complete assistance on your exam preparation and certification application. If you are confused on your ISO-ISMS-LA exam preparations and GAQM certification application, do not hesitate to visit our Vcedump.com to find your solutions here.