Pass the PECB ISO 27001 ISO-IEC-27001-Lead-Auditor Questions and answers with CertsForce

Viewing page 3 out of 11 pages
Viewing questions 21-30 out of questions
Questions # 21:

Which two of the following are examples of audit methods that 'do' involve human interaction?

Options:

A.

Performing an independent review of procedures in preparation for an audit


B.

Reviewing the auditee's response to an audit finding


C.

Analysing data by remotely accessing the auditee's server


D.

Observing work performed by remote surveillance


E.

Analysing data by remotely accessing the auditee's server


Expert Solution
Questions # 22:

You are performing an ISMS audit at a residential nursing home called ABC that provides healthcare services.

The next step in your audit plan is to verify the information security on ABC's healthcare mobile app

development, support, and lifecycle process. During the audit, you learned the organization outsourced the

mobile app development to a professional software development company with CMMI Level 5, ITSM (ISO/IEC

20000-1), BCMS (ISO 22301) and ISMS (ISO/IEC 27001) certified. The IT Manager presented the software

security management procedure and summarised the process as follows:

The mobile app development shall adopt "security-by-design" and "security-by-default" principles, as a

minimum. The following security functions for personal data protection shall be available:

Access control.

Personal data encryption, i.e., Advanced Encryption Standard (AES) algorithm, key lengths: 256 bits; and

Personal data pseudonymization.

Vulnerability checked and no security backdoor

You sample the latest Mobile App Test report - details as follows:

Question # 22

You ask the IT Manager why the organisation still uses the mobile app while personal data

encryption and pseudonymization tests failed. Also, whether the Service Manager is authorized to

approve the test.

The IT Manager explains the test results should be approved by him according to the software

security management procedure. The reason why the encryption and pseudonymization functions

failed is that these functions heavily slowed down the system and service performance. An extra

150% of resources are needed to cover this. The Service Manager agreed that access control is

good enough and acceptable. That's why the Service Manager signed the approval.

You sample one of the medical staff's mobile and found that ABC's healthcare mobile app, version

1.01 is installed. You found that version 1.01 has no test record.

The IT Manager explains that because of frequent ransomware attacks, the outsourced mobile app

development company gave a free minor update on the tested software, performed an emergency

release of the updated software, and gave a verbal guarantee that there will be no impact on any

security functions. Based on his 20 years of information security experience, there is no need to re-

test.

You are preparing the audit findings Select two options that are correct.

Options:

A.

There is a nonconformity (NC). The IT. Manager does not comply with the software security management procedure. (Relevant to clause 8.1, control A.8.30)


B.

There is a nonconformity (NC). The organisation does not control planned changes and review the consequences of unintended changes. (Relevant to clause 8.1)


C.

There is an opportunity for improvement (OI). The IT Manager should make the decision to continue the service based on appropriate testing. (Relevant to clause 8.1, control A.8.30)


D.

There is an opportunity for improvement (OI). The organisation selects an external service provider based on the extent of free services it will provide. (Relevant to clause 8.1, control A.5.21)


E.

There is NO nonconformity (NC). The IT Manager demonstrates good leadership. (Relevant to clause 5.1, control 5.4)


F.

There is NO nonconformity (NC). The IT Manager demonstrates he is fully competent. (Relevant to clause 7.2)


Expert Solution
Questions # 23:

You are performing an ISMS initial certification audit at a residential nursing home that provides healthcare services. The next step in your audit plan is to conduct the closing meeting. During the final audit team meeting, as an audit team leader, you agree to report 2 minor nonconformities and 1 opportunity for improvement as below:

Question # 23

Select one option of the recommendation to the audit programme manager you are going to advise to the auditee at the closing meeting.

Options:

A.

Recommend certification immediately


B.

Recommend that a full scope re-audit is required within 6 months


C.

Recommend that an unannounced audit is carried out at a future date


D.

Recommend certification after your approval of the proposed corrective action plan Recommend that the findings can be closed out at a surveillance audit in 1 year


E.

Recommend that a partial audit is required within 3 months


Expert Solution
Questions # 24:

Scenario:

After an information security incident, an organization created a comprehensive backup procedure involving regular, automated backups of all critical data to offsite storage locations. By doing so, which principle of information security is the organization applying in this case?

Options:

A.

Integrity


B.

Confidentiality


C.

Availability


Expert Solution
Questions # 25:

Which four of the following statements about audit reports are true?

Options:

A.

Audit reports should be produced by the audit team leader with input from the audit team


B.

Audit reports should include or refer to the audit plan


C.

Audit reports should be sent to the organisation's top management first because their contents could be embarrassing


D.

Audit reports should be assumed suitable for general circulation unless they are specifically marked confidential


E.

Audit reports should only evidence nonconformity


F.

Audit reports should be produced within an agreed timescale


G.

Audit reports that are no longer required can be destroyed as part of the organisation's general waste


Expert Solution
Questions # 26:

You are an experienced ISMS audit team leader guiding an auditor in training. Your team has just completed a third-party surveillance audit of a mobile telecom provider. The auditor in training asks you how you intend to prepare for the Closing meeting. Which four of the following are appropriate responses?

Options:

A.

I will advise the auditee that the purpose of the closing meeting is for the audit team to communicate our findings. It is not an opportunity for the auditee to challenge the findings


B.

I will instruct my audit team to wait outside the auditee's offices so we can leave as quickly as possible after the closing meeting. This saves our time and the client's time too


C.

It is not necessary to prepare for the closing meeting. Once you have carried out as many audits as I have you already know what needs to be discussed


D.

I will schedule a closing meeting with the auditee's representatives at which the audit conclusions will be presented


E.

I will contact head office to ensure our invoice has been paid, If not, I will cancel the closing meeting and temporarily withhold the audit report


F.

I will discuss any follow-up required with my audit team


G.

I will review and, as appropriate, approve my teams audit conclusions


Expert Solution
Questions # 27:

The following options are key actions involved in a first-party audit. Order the stages to show the sequence in which the actions should take place.

Question # 27


Expert Solution
Questions # 28:

You are an experienced audit team leader guiding an auditor in training,

Your team is currently conducting a third-party surveillance audit of an organisation that stores data on behalf of external clients. The auditor in training has been tasked with reviewing the TECHNOLOGICAL controls listed in the Statement of Applicability (SoA) and implemented at the site.

Select four controls from the following that would you expect the auditor in training to review.

Options:

A.

The development and maintenance of an information asset inventory


B.

Rules for transferring information within the organisation and to other organisations


C.

Confidentiality and nondisclosure agreements


D.

How protection against malware is implemented


E.

Access to and from the loading bay


F.

The conducting of verification checks on personnel


G.

Remote working arrangements


Expert Solution
Questions # 29:

An external auditor received an offer to conduct an ISMS audit at a research development company. Before accepting it, they discussed with the internal auditor of the auditee, who was their friend, about previous audit reports. Is this acceptable?

Options:

A.

No, the external auditor should discuss about the auditee's previous audit reports only with the certification body


B.

Yes, the auditor can review and discuss the previous audit reports before accepting an audit mandate


C.

No, the auditor should uphold objectivity even when deciding whether to accept the audit mandate or not


Expert Solution
Questions # 30:

A key audit process is the way auditors gather information and determine the findings' characteristics. Put the actions listed in the correct order to complete this process. The last one has been done for you.

Question # 30


Expert Solution
Viewing page 3 out of 11 pages
Viewing questions 21-30 out of questions