Pass the ISO ISO/IEC 20000 Lead Implementer ISOIEC20000LI Questions and answers with CertsForce

Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which of the following is the information security committee responsible for?

Options:

A.

Ensure smooth running of the ISMS


B.

Set annual objectives and the ISMS strategy


C.

Treat the nonconformities


Expert Solution
Questions # 12:

Based on scenario 7. what else should Texas H&H Inc. do when responding to the incident?

Options:

A.

Decide to stop using cloud services in order to eliminate the risk of similar incidents happening in the future


B.

Record and document the incident which serves as input for future corrective actions


C.

Communicate the updated Information security policy only to the top management of the company


Expert Solution
Questions # 13:

Scenario 4: TradeB. a commercial bank that has just entered the market, accepts deposits from its clients and offers basic financial services and loans for investments. TradeB has decided to implement an information security management system (ISMS) based on ISO/IEC 27001 Having no experience of a management [^system implementation, TradeB's top management contracted two experts to direct and manage the ISMS implementation project.

First, the project team analyzed the 93 controls of ISO/IEC 27001 Annex A and listed only the security controls deemed applicable to the company and their objectives Based on this analysis, they drafted the Statement of Applicability. Afterward, they conducted a risk assessment, during which they identified assets, such as hardware, software, and networks, as well as threats and vulnerabilities, assessed potential consequences and likelihood, and determined the level of risks based on three nonnumerical categories (low, medium, and high). They evaluated the risks based on the risk evaluation criteria and decided to treat only the high risk category They also decided to focus primarily on the unauthorized use of administrator rights and system interruptions due to several hardware failures by establishing a new version of the access control policy, implementing controls to manage and control user access, and implementing a control for ICT readiness for business continuity

Lastly, they drafted a risk assessment report, in which they wrote that if after the implementation of these security controls the level of risk is below the acceptable level, the risks will be accepted

What should TradeB do in order to deal with residual risks? Refer to scenario 4.

Options:

A.

TradeB should evaluate, calculate, and document the value of risk reduction following risk treatment


B.

TradeB should immediately implement new controls to treat all residual risks


C.

TradeB should accept the residual risks only above the acceptance level


Expert Solution
Questions # 14:

Org Y. a well-known bank, uses an online banking platform that enables clients to easily and securely access their bank accounts. To log in. clients are required to enter the one-time authorization code sent to their smartphone. What can be concluded from this scenario?

Options:

A.

Org Y has implemented an integrity control that avoids the involuntary corruption of data


B.

Org Y has incorrectly implemented a security control that could become a vulnerability


C.

Org Y has implemented a security control that ensures the confidentiality of information


Expert Solution
Questions # 15:

Which of the following statements regarding information security risk is NOT correct?

Options:

A.

Information security risk is associated with the potential that the vulnerabilities of an information asset may be exploited by threats


B.

Information security risk cannot be accepted without being treated or during the process of risk treatment


C.

Information security risk can be expressed as the effect of uncertainty on information security objectives


Expert Solution
Questions # 16:

Which tool is used to identify, analyze, and manage interested parties?

Options:

A.

The probability/impact matrix


B.

The power/interest matrix


C.

The likelihood/severity matrix


Expert Solution
Questions # 17:

Scenario 8: SunDee is an American biopharmaceutical company, headquartered in California, the US. It specializes in developing novel human therapeutics, with a focus on cardiovascular diseases, oncology, bone health, and inflammation. The company has had an information security management system (ISMS) based on SO/IEC 27001 in place for the past two years. However, it has not monitored or measured the performance and effectiveness of its ISMS and conducted management reviews regularly

Just before the recertification audit, the company decided to conduct an internal audit. It also asked most of their staff to compile the written individual reports of the past two years for their departments. This left the Production Department with less than the optimum workforce, which decreased the company's stock.

Tessa was SunDee's internal auditor. With multiple reports written by 50 different employees, the internal audit process took much longer than planned, was very inconsistent, and had no qualitative measures whatsoever Tessa concluded that SunDee must evaluate the performance of the ISMS adequately. She defined SunDee's negligence of ISMS performance evaluation as a major nonconformity, so she wrote a nonconformity report including the description of the nonconformity, the audit findings, and recommendations. Additionally, Tessa created a new plan which would enable SunDee to resolve these issues and presented it to the top management

Based on the scenario above, answer the following question:

What caused SunDee's workforce disruption?

Options:

A.

The negligence of performance evaluation and monitoring and measurement procedures


B.

The inconsistency of reports written by different employees


C.

The voluminous written reports


Expert Solution
Questions # 18:

What risk treatment option has Company A implemented if it has required from its employees the change of email passwords at least once every 60 days?

Options:

A.

Risk modification


B.

Risk avoidance


C.

Risk retention


Expert Solution
Questions # 19:

Which situation described in scenario 7 Indicates that Texas H&H Inc. implemented a detective control?

Options:

A.

Texas H&H Inc. integrated the incident management policy in Its information security policy


B.

Texas H&H Inc. tested its system for malicious activity and checked cloud based email settings


C.

Texas H&H Inc. hired an expert to conduct a forensic analysis


Expert Solution
Questions # 20:

What is the main purpose of Annex A 7.1 Physical security perimeters of ISO/IEC 27001?

Options:

A.

To prevent unauthorized physical access, damage, and interference to the organization's information and other associated assets


B.

To maintain the confidentiality of information that is accessible by personnel or external parties


C.

To ensure access to information and other associated assets is defined and authorized


Expert Solution
Viewing page 2 out of 4 pages
Viewing questions 11-20 out of questions