Pass the ISO ISO/IEC 20000 Lead Implementer ISOIEC20000LI Questions and answers with CertsForce

Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions
Questions # 1:

An organization has established a policy that provides the personnel with the information required to effectively deploy encryption solutions in order to protect organizational confidential data. What type of policy is this?

Options:

A.

High-level general policy


B.

High-level topic-specific policy


C.

Topic-specific policy


Questions # 2:

Scenario 1: HealthGenic is a pediatric clinic that monitors the health and growth of individuals from infancy to early adulthood using a web-based medical software. The software is also used to schedule appointments, create customized medical reports, store patients' data and medical history, and communicate with all the [^involved parties, including parents, other physicians, and the medical laboratory staff.

Last month, HealthGenic experienced a number of service interruptions due to the increased number of users accessing the software Another issue the company faced while using the software was the complicated user interface, which the untrained personnel found challenging to use.

The top management of HealthGenic immediately informed the company that had developed the software about the issue. The software company fixed the issue; however, in the process of doing so, it modified some files that comprised sensitive information related to HealthGenic's patients. The modifications that were made resulted in incomplete and incorrect medical reports and, more importantly, invaded the patients' privacy.

Intrinsic vulnerabilities, such as the______________ are related to the characteristics of the asset. Refer to scenario 1.

Options:

A.

Software malfunction


B.

Service interruptions


C.

Complicated user interface


Questions # 3:

Which security controls must be implemented to comply with ISO/IEC 27001?

Options:

A.

Those designed by the organization only


B.

Those included in the risk treatment plan


C.

Those listed in Annex A of ISO/IEC 27001, without any exception


Questions # 4:

Which option below should be addressed in an information security policy?

Options:

A.

Actions to be performed after an information security incident


B.

Legal and regulatory obligations imposed upon the organization


C.

The complexity of information security processes and their interactions


Questions # 5:

The incident management process of an organization enables them to prepare for and respond to information security incidents. In addition, the organization has procedures in place for assessing information security events. According to ISO/IEC 27001, what else must an incident management process include?

Options:

A.

Processes for using knowledge gained from information security incidents


B.

Establishment of two information security incident response teams


C.

Processes for handling information security incidents of suppliers as defined in their agreements


Questions # 6:

Scenario 10: NetworkFuse develops, manufactures, and sells network hardware. The company has had an operational information security management system (ISMS) based on ISO/IEC 27001 requirements and a quality management system (QMS) based on ISO 9001 for approximately two years. Recently, it has applied for a j^ombined certification audit in order to obtain certification against ISO/IEC 27001 and ISO 9001.

After selecting the certification body, NetworkFuse prepared the employees for the audit The company decided to not conduct a self-evaluation before the audit since, according to the top management, it was not necessary. In addition, it ensured the availability of documented information, including internal audit reports and management reviews, technologies in place, and the general operations of the ISMS and the QMS. However, the company requested from the certification body that the documentation could not be carried off-site

However, the audit was not performed within the scheduled days because NetworkFuse rejected the audit team leader assigned and requested their replacement The company asserted that the same audit team leader issued a recommendation for certification to its main competitor, which, for the company's top management, was a potential conflict of interest. The request was not accepted by the certification body

According to scenario 10, NetworkFuse requested from the certification body to review all the documentation only on-site. Is this acceptable?

Options:

A.

Yes, the auditee may request that the review of the documentation takes place on-site


B.

Yes, only if a confidentiality agreement is formerly signed by the audit team


C.

No, the certification body decides whether the documentation review takes place on-site or off-site


Questions # 7:

Texas H&H Inc. decided to assign an internal expert for their forensic analysis. Is this acceptable? Refer lo scenario 7.

Options:

A.

Yes. forensic analysis can be done by cither an internal or external expert


B.

Yes. hiring an external expert for forensic analysis Is a requirement of the standard


C.

No. the company's forensic analysis should be based on the conclusion of Its cloud storage provide investigation


Questions # 8:

Which statement is an example of risk retention?

Options:

A.

An organization has decided to release the software even though some minor bugs have not been fixed yet


B.

An organization has implemented a data loss protection software


C.

An organization terminates work in the construction site during a severe storm


Questions # 9:

Scenario 1: HealthGenic is a pediatric clinic that monitors the health and growth of individuals from infancy to early adulthood using a web-based medical software. The software is also used to schedule appointments, create customized medical reports, store patients' data and medical history, and communicate with all the [^involved parties, including parents, other physicians, and the medical laboratory staff.

Last month, HealthGenic experienced a number of service interruptions due to the increased number of users accessing the software Another issue the company faced while using the software was the complicated user interface, which the untrained personnel found challenging to use.

The top management of HealthGenic immediately informed the company that had developed the software about the issue. The software company fixed the issue; however, in the process of doing so, it modified some files that comprised sensitive information related to HealthGenic's patients. The modifications that were made resulted in incomplete and incorrect medical reports and, more importantly, invaded the patients' privacy.

Based on the scenario above, answer the following question:

According to scenario 1. to detect (1)____________________________, Antiques should have implemented (2)

Options:

A.

(1) Patches. (2) an access control software


B.

(1) Intrusions on networks. (?) an intrusion detection system


C.

(1) Technical vulnerabilities. (2) network intrusions


Questions # 10:

Diana works as a customer service representative for a large e-commerce company. One day, she accidently modified the order details of a customer without their permission Due to this error, the customer received an incorrect product. Which information security principle was breached in this case7

Options:

A.

Availability


B.

Confidentiality


C.

Integrity


Viewing page 1 out of 4 pages
Viewing questions 1-10 out of questions