Pass the ISO ISO/IEC 20000 Lead Implementer ISOIEC20000LI Questions and answers with CertsForce

Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions
Questions # 31:

Scenario 6: Skyver offers worldwide shipping of electronic products, including gaming consoles, flat-screen TVs. computers, and printers. In order to ensure information security, the company has decided to implement an information security management system (ISMS) based on the requirements of ISO/IEC 27001.

Colin, the company's best information security expert, decided to hold a training and awareness session for the personnel of the company regarding the information security challenges and other information security-related controls. The session included topics such as Skyver's information security approaches and techniques for mitigating phishing and malware.

One of the participants in the session is Lisa, who works in the HR Department. Although Colin explains the existing Skyver's information security policies and procedures in an honest and fair manner, she finds some of the issues being discussed too technical and does not fully understand the session. Therefore, in a lot of cases, she requests additional help from the trainer and her colleagues

Based on the scenario above, answer the following question:

How should Colin have handled the situation with Lisa?

Options:

A.

Extend the duration of the training and awareness session in order to be able to achieve better results


B.

Promise Lisa that future training and awareness sessions will be easily understandable


C.

Deliver training and awareness sessions for employees with the same level of competence needs based on the activities they perform within the company


Expert Solution
Questions # 32:

Kyte. a company that has an online shopping website, has added a Q&A section to its website; however, its Customer Service Department almost never provides answers to users' questions. Which principle of an effective communication strategy has Kyte not followed?

Options:

A.

Clarity


B.

Appropriateness


C.

Responsiveness


Expert Solution
Questions # 33:

Based on scenario 2. which principle of information security was NOT compromised by the attack?

Options:

A.

Confidentiality


B.

integrity


C.

Availability


Expert Solution
Questions # 34:

Scenario 7: InfoSec is a multinational corporation headquartered in Boston, MA, which provides professional electronics, gaming, and entertainment services. After facing numerous information security incidents, InfoSec has decided to establish teams and implement measures to prevent potential incidents in the future

Emma, Bob. and Anna were hired as the new members of InfoSec's information security team, which consists of a security architecture team, an incident response team (IRT) and a forensics team Emma's job is to create information security plans, policies, protocols, and training to prepare InfoSec to respond to incidents effectively Emma and Bob would be full-time employees of InfoSec, whereas Anna was contracted as an external consultant.

Bob, a network expert, will deploy a screened subnet network architecture This architecture will isolate the demilitarized zone (OMZ) to which hosted public services are attached and InfoSec's publicly accessible resources from their private network Thus, InfoSec will be able to block potential attackers from causing unwanted events inside the company's network. Bob is also responsible for ensuring that a thorough evaluation of the nature of an unexpected event is conducted, including the details on how the event happened and what or whom it might affect.

Anna will create records of the data, reviews, analysis, and reports in order to keep evidence for the purpose of disciplinary and legal action, and use them to prevent future incidents. To do the work accordingly, she should be aware of the company's information security incident management policy beforehand

Among others, this policy specifies the type of records to be created, the place where they should be kept, and the format and content that specific record types should have.

Based on this scenario, answer the following question:

Based on his tasks, which team is Bob part of?

Options:

A.

Security architecture team


B.

Forensics team


C.

Incident response team


Expert Solution
Questions # 35:

An organization that has an ISMS in place conducts management reviews at planned intervals, but does not retain documented information on the results. Is this in accordance with the requirements of ISO/IEC 27001?

Options:

A.

Yes. ISO/IEC 27001 does not require organizations to document the results of management reviews


B.

No, ISO/IEC 27001 requires organizations to document the results of management reviews


C.

Yes. ISO/IEC 27001 requires organizations to document the results of management reviews only if they are conducted ad hoc


Expert Solution
Questions # 36:

Which of the situations below can negatively affect the internal audit process?

Options:

A.

Restricting the internal auditor's access to offices and documentation


B.

Conducting internal audit interviews with all employees of the organization


C.

Reporting the internal audit results to the top management


Expert Solution
Viewing page 4 out of 4 pages
Viewing questions 31-40 out of questions