Pass the PECB ISO 27001 ISO-IEC-27001-Lead-Auditor Questions and answers with CertsForce

Viewing page 5 out of 11 pages
Viewing questions 41-50 out of questions
Questions # 41:

According to ISO/IEC 27001, an Information Security Management System seeks to protect which two of the following?

Options:

A.

The accessibility of information


B.

The authenticity of information


C.

The confidentiality of information


D.

The consistency of information


E.

The integration of information


F.

The integrity of information


Expert Solution
Questions # 42:

Costs related to nonconformities and failures to comply with legal and contractual requirements are assessed when defining:

Options:

A.

Materiality


B.

Audit risks


C.

Reasonable assurance


Expert Solution
Questions # 43:

Which of the following is not a type of Information Security attack?

Options:

A.

Legal Incidents


B.

Vehicular Incidents


C.

Technical Vulnerabilities


D.

Privacy Incidents


Expert Solution
Questions # 44:

Scenario 2: Knight is an electronics company from Northern California, US that develops video game consoles. Knight has more than 300 employees worldwide. On the

fifth anniversary of their establishment, they have decided to deliver the G-Console, a new generation video game console aimed for worldwide markets. G-Console is

considered to be the ultimate media machine of 2021 which will give the best gaming experience to players. The console pack will include a pair of VR headset, two

games, and other gifts.

Over the years, the company has developed a good reputation by showing integrity, honesty, and respect toward their customers. This good reputation is one of the

reasons why most passionate gamers aim to have Knight's G-console as soon as it is released in the market. Besides being a very customer-oriented company, Knight

also gained wide recognition within the gaming industry because of the developing quality. Their prices are a bit higher than the reasonable standards allow.

Nonetheless, that is not considered an issue for most loyal customers of Knight, as their quality is top-notch.

Being one of the top video game console developers in the world, Knight is also often the center of attention for malicious activities. The company has had an

operational ISMS for over a year. The ISMS scope includes all departments of Knight, except Finance and HR departments.

Recently, a number of Knight's files containing proprietary information were leaked by hackers. Knight's incident response team (IRT) immediately started to analyze

every part of the system and the details of the incident.

The IRT's first suspicion was that Knight's employees used weak passwords and consequently were easily cracked by hackers who gained unauthorized access to their

accounts. However, after carefully investigating the incident, the IRT determined that hackers accessed accounts by capturing the file transfer protocol (FTP) traffic.

FTP is a network protocol for transferring files between accounts. It uses clear text passwords for authentication.

Following the impact of this information security incident and with IRT's suggestion, Knight decided to replace the FTP with Secure Shell (SSH) protocol, so anyone

capturing the traffic can only see encrypted data.

Following these changes, Knight conducted a risk assessment to verify that the implementation of controls had minimized the risk of similar incidents. The results of

the process were approved by the ISMS project manager who claimed that the level of risk after the implementation of new controls was in accordance with the

company's risk acceptance levels.

Based on this scenario, answer the following question:

According to scenario 2, the ISMS scope was not applied to the Finance and HR Department of Knight. Is this acceptable?

Options:

A.

Yes, the ISMS must be applied only to processes and assets that may directly impact information security


B.

Yes, the ISMS scope can include the whole organization or only particular departments within the organization


C.

No, the ISMS scope must include all organizational units and processes


Expert Solution
Questions # 45:

You are an experienced ISMS audit team leader conducting a third-party surveillance visit.

You notice that although the auditee is claiming conformity with ISO/IEC 27001:2022 they are still referring to Improvement as clause 10.2 (as it was in the 2013 edition) when this is now clause 10.1 in

the 2022 edition. You have confirmed they are meeting all of the 2022 requirements set out in the standard.

Select one option of the action you should take.

Options:

A.

Note the issue in the audit report


B.

Raise a nonconformity against clause 7.5.3 - Control of documented information


C.

Raise it as an opportunity for improvement


D.

Bring the matter up at the closing meeting


Expert Solution
Questions # 46:

The data center at which you work is currently seeking ISO/IEC27001:2022 certification. In preparation for your initial certification visit a number of internal audits have been carried out by a colleague working at another data centre within your Group. They secured their ISO/IEC 27001:2022 certificate earlier in the year.

You have just qualified as an Internal ISMS auditor and your manager has asked you to review the audit process and audit findings as a final check before the external Certrfication Body arrives.

Which six of the following would cause you concern in respect of conformity to ISO/IEC 27001:2022 requirements?

Options:

A.

The audit programme shows management reviews taking place at irregular intervals during the year


B.

Audit reports are not held in hardcopy (i.e. on paper). They are only stored as ".POF documents on the organisation's intranet


C.

The audit programme does not take into account the relative importance of information security processes


D.

The audit programme mandates auditors must be independent of the areas they audit in order to satisfy the requirements of ISO/IEC 27001:2022


E.

Although the scope for each internal audit has been defined, there are no audit criteria defined for the audits carried out to date


F.

Audit reports to date have used key performance indicator information to focus solely on the efficiency of ISMS processes


G.

The audit programme does not reference audit methods or audit responsibilities


Expert Solution
Questions # 47:

Which two of the following statements are true?

Options:

A.

The benefit of certifying an ISMS is to show the accreditation certificate on the website.


B.

The purpose of an ISMS is to demonstrate awareness of information security issues by management.


C.

The benefit of certifying an ISMS is to increase the number of customers.


D.

The benefits of implementing an ISMS primarily result from a reduction in information security risks.


E.

The purpose of an ISMS is to apply a risk management process for preserving information security.


F.

The purpose of an ISMS is to demonstrate compliance with regulatory requirements.


Expert Solution
Questions # 48:

Scenario 7: Lawsy is a leading law firm with offices in New Jersey and New York City. It has over 50 attorneys offering sophisticated legal services to clients in business and commercial law, intellectual property, banking, and financial services. They believe they have a comfortable position in the market thanks to their commitment to implement information security best practices and remain up to date with technological developments.

Lawsy has implemented, evaluated, and conducted internal audits for an ISMS rigorously for two years now. Now, they have applied for ISO/IEC 27001 certification to ISMA, a well-known and trusted certification body.

During stage 1 audit, the audit team reviewed all the ISMS documents created during the implementation. They also reviewed and evaluated the records from management reviews and internal audits.

Lawsy submitted records of evidence that corrective actions on nonconformities were performed when necessary, so the audit team interviewed the internal auditor. The interview validated the adequacy and frequency of the internal audits by providing detailed insight into the internal audit plan and procedures.

The audit team continued with the verification of strategic documents, including the information security policy and risk evaluation criteria. During the information security policy review, the team noticed inconsistencies between the documented information describing governance framework (i.e., the information security policy) and the procedures.

Although the employees were allowed to take the laptops outside the workplace, Lawsy did not have procedures in place regarding the use of laptops in such cases. The policy only provided general information about the use of laptops. The company relied on employees' common knowledge to protect the confidentiality and integrity of information stored in the laptops. This issue was documented in the stage 1 audit report.

Upon completing stage 1 audit, the audit team leader prepared the audit plan, which addressed the audit objectives, scope, criteria, and procedures.

During stage 2 audit, the audit team interviewed the information security manager, who drafted the information security policy. He justified the Issue identified in stage 1 by stating that Lawsy conducts mandatory information security training and awareness sessions every three months.

Following the interview, the audit team examined 15 employee training records (out of 50) and concluded that Lawsy meets requirements of ISO/IEC 27001 related to training and awareness. To support this conclusion, they photocopied the examined employee training records.

Based on the scenario above, answer the following question:

Should the auditor archive the copies of employee training records after the completion of the audit? Refer to scenario 7.

Options:

A.

No, copies of files are not generally kept as audit records


B.

Yes, copies of files are in the auditor's possession, as mentioned in the audit agreement


C.

Yes, all the documented information generated during the audit should be kept as audit record


Expert Solution
Questions # 49:

Which two activities align with the “Check’’ stage of the Plan-Do-Check-Act cycle when applied to the process of managing an internal audit program as described in ISO 19011?

Options:

A.

Retains records of internal audits


B.

Define audit criteria and scope for each internal audit


C.

Update the internal audit programme


D.

Establish a risk-based internal audit programme


E.

Conduct internal audits


F.

Verify effectiveness of the internal audit programme


G.

Review trends in internal audit result


Expert Solution
Questions # 50:

Auditor competence is a combination of knowledge and skills. Which two of the following activities are predominately related to "knowledge"?

Options:

A.

Understanding how to identify findings


B.

Designing a checklist


C.

Follow an audit trail deviating from the prepared checklist


D.

Communicate with the auditee


E.

Determining how to seek evidence from the auditee


F.

Determining what evidence to gather


Expert Solution
Viewing page 5 out of 11 pages
Viewing questions 41-50 out of questions