Pass the PECB ISO 27001 ISO-IEC-27001-Lead-Auditor Questions and answers with CertsForce

Viewing page 1 out of 11 pages
Viewing questions 1-10 out of questions
Questions # 1:

Which one of the following statements best describes the purpose of conducting a document review?

Options:

A.

To reveal whether the documented management system is nonconforming with audit criteria and to gather evidence to support the audit report


B.

To decide about the conformity of the documented management system with audit standards and to gather findings to support the audit process


C.

To determine the conformity of the management system, as far as documented, with audit criteria and to gather information to support the on-site audit activities


D.

To detect any nonconformity of the management system, if documented, with audit criteria and to identify information to support the audit plan


Expert Solution
Questions # 2:

An audit finding is the result of the evaluation of the collected audit evidence against audit criteria. Evaluate the following potential formats of audit evidence and select the two that are acceptable.

Options:

A.

Unsigned hand written changes to test results


B.

Statement of facts by the IT manager


C.

Documented information on results of IT audits


D.

Statements by a system engineer that cannot be verified


E.

Observation of a previously recorded video demonstrating the performance of a hazardous activity


F.

An audio recording of a dialog between the IT manager and a system engineer


Expert Solution
Questions # 3:

Which two of the following standards are used as ISMS third-party certification audit criteria?

Options:

A.

ISO/IEC 27002


B.

ISO/IEC 20000-1


C.

ISO 19011


D.

ISO/IEC 27001


E.

Relavent legal, statutory, and regulatory requirements


F.

ISO/IEC 17021-1


Expert Solution
Questions # 4:

The following are the guidelines to protect your password, except: 

Options:

A.

Don't use the same password for various company system security access


B.

Do not share passwords with anyone


C.

For easy recall, use the same password for company and personal accounts


D.

Change a temporary password on first log-on


Expert Solution
Questions # 5:

Select the words that best complete the sentence:

Question # 5


Expert Solution
Questions # 6:

Scenario 9: UpNet, a networking company, has been certified against ISO/IEC 27001. It provides network security, virtualization, cloud computing, network hardware, network management software, and networking technologies.

The company's recognition has increased drastically since gaining ISO/IEC 27001 certification. The certification confirmed the maturity of UpNefs operations and its compliance with a widely recognized and accepted standard.

But not everything ended after the certification. UpNet continually reviewed and enhanced its security controls and the overall effectiveness and efficiency of the ISMS by conducting internal audits. The top management was not willing to employ a full-time team of internal auditors, so they decided to outsource the internal audit function. This form of internal audits ensured independence, objectivity, and that they had an advisory role about the continual improvement of the ISMS.

Not long after the initial certification audit, the company created a new department specialized in data and storage products. They offered routers and switches optimized for data centers and software-based networking devices, such as network virtualization and network security appliances. This caused changes to the operations of the other departments already covered in the ISMS certification scope.

Therefore. UpNet initiated a risk assessment process and an internal audit. Following the internal audit result, the company confirmed the effectiveness and efficiency of the existing and new processes and controls.

The top management decided to include the new department in the certification scope since it complies with ISO/IEC 27001 requirements. UpNet announced that it is ISO/IEC 27001 certified and the certification scope encompasses the whole company.

One year after the initial certification audit, the certification body conducted another audit of UpNefs ISMS. This audit aimed to determine the UpNefs ISMS fulfillment of specified ISO/IEC 27001 requirements and ensure that the ISMS is being continually improved. The audit team confirmed that the certified ISMS continues to fulfill

the requirements of the standard. Nonetheless, the new department caused a significant impact on governing the management system. Moreover, the certification body was not informed about any changes. Thus, the UpNefs certification was suspended.

Based on the scenario above, answer the following question:

What type of audit is illustrated in the last paragraph of scenario 9?

Options:

A.

Surveillance audit


B.

Internal audit


C.

Recertification audit


Expert Solution
Questions # 7:

Scenario 3: NightCore is a multinational technology company based in the United States that focuses on e-commerce, cloud computing, digital streaming, and artificial intelligence. After having an information security management system (ISMS) implemented for over 8 months, they contracted a certification body to conduct a third party audit in order to get certified against ISO/IEC 27001.

The certification body set up a team of seven auditors. Jack, the most experienced auditor, was assigned as the audit team leader. Over the years, he received many well known certifications, such as the ISO/IEC 27001 Lead Auditor, CISA, CISSP, and CISM.

Jack conducted thorough analyses on each phase of the ISMS audit, by studying and evaluating every information security requirement and control that was implemented by NightCore. During stage 2 audit. Jack detected several nonconformities. After comparing the number of purchased invoices for software licenses with the software inventory, Jack found out that the company has been using the illegal versions of a software for many computers. He decided to ask for an explanation from the top management about this nonconformity and see whether they were aware about this. His next step was to audit NightCore's IT Department. The top management assigned Tom, NightCore's system administrator, to act as a guide and accompany Jack and the audit team toward the inner workings of their system and their digital assets infrastructure.

While interviewing a member of the Department of Finance, the auditors discovered that the company had recently made some unusual large transactions to one of their consultants. After gathering all the necessary details regarding the transactions. Jack decided to directly interview the top management.

When discussing about the first nonconformity, the top management told Jack that they willingly decided to use a copied software over the original one since it was cheaper. Jack explained to the top management of NightCore that using illegal versions of software is against the requirements of ISO/IEC 27001 and the national laws and regulations. However, they seemed to be fine with it.

Several months after the audit, Jack sold some of NightCore's information that he collected during the audit for a huge amount of money to competitors of NightCore.

Based on this scenario, answer the following question:

Based on scenario 3. which ISO/IEC 27001 control has NightCore ignored when they used an illegal version of software?

Options:

A.

Annex A 5.1 Policies for information security


B.

Annex A 5.10 Acceptable use of information and other associated assets


C.

Annex A 5.32 Intellectual property rights


Expert Solution
Questions # 8:

Question:

A cybersecurity company implemented an access control software that allows only authorized personnel to access sensitive files. Which type of control has the company implemented in this case?

Options:

A.

Preventive control


B.

Detective control


C.

Corrective control


Expert Solution
Questions # 9:

You are carrying out your first third-party ISMS surveillance audit as an Audit Team Leader. You are presently in the auditee's data centre with another member of your audit team.

You are currently in a large room that is subdivided into several smaller rooms, each of which has a numeric combination lock and swipe card reader on the door. You notice two external contractors using a swipe card and combination number provided by the centre's reception desk to gain access to a client's suite to carry out authorised electrical repairs.

You go to reception and ask to see the door access record for the client's suite. This indicates only one card was swiped. You ask the receptionist and they reply, "yes it's a common problem. We ask everyone to swipe their cards but with contractors especially, one tends to swipe and the rest simply 'tailgate' their way in" but we know who they are from the reception sign-in.

Based on the scenario above which one of the following actions would you now take?

Options:

A.

Take no action. Irrespective of any recommendations, contractors will always act in this way


B.

Raise a nonconformity against control A.5.20 'addressing information security in supplier relationships' as information security requirements have not been agreed upon with the supplier


C.

Raise a nonconformity against control A.7.6 'working in secure areas' as security measures for working in secure areas have not been defined


D.

Determine whether any additional effective arrangements are in place to verify individual access to secure areas e.g. CCTV


E.

Raise an opportunity for improvement that contractors must be accompanied at all times when accessing secure facilities


F.

Raise an opportunity for improvement to have a large sign in reception reminding everyone requiring access must use their swipe card at all times


G.

Raise a nonconformity against control A.7.2 'physical entry' as a secure area is not adequately protected


Expert Solution
Questions # 10:

What is meant by the term 'Corrective Action'? Select one

Options:

A.

Action is taken to prevent a nonconformity or an incident from occurring


B.

Action is taken to eliminate the cause(s) of a nonconformity or an incident


C.

Action is taken by management to respond to a nonconformity


D.

Action is taken to fix a nonconformity or an incident


Expert Solution
Viewing page 1 out of 11 pages
Viewing questions 1-10 out of questions