Pass the PECB ISO 27001 ISO-IEC-27001-Lead-Auditor Questions and answers with CertsForce

Viewing page 6 out of 11 pages
Viewing questions 51-60 out of questions
Questions # 51:

AppFolk, a software development company, is seeking certification against ISO/IEC 27001. In the initial phases of the external audit, the certification body in discussion with the company excluded the marketing division from the audit scope, although they stated in their ISMS scope that the whole company is included. Is this acceptable?

Options:

A.

Yes, audit and ISMS scope do not necessarily need to be the same


B.

No, divisions that are not critical for the industrial sector in which the auditee operates can be excluded from the audit scope


C.

No, audit scope should reflect all of the organization’s divisions covered by the ISMS


Expert Solution
Questions # 52:

PayBell, a finance corporation, is using an accounting software to track financial transactions. The software can be accessed from anywhere with an internet connection. It also enables PayBell's employees to easily collaborate with each other to ensure accurate financial reporting. What type of services is PayBell using?

Options:

A.

Machine learning


B.

Cloud computing


C.

Artificial intelligence


Expert Solution
Questions # 53:

Why should materiality be considered during the initial contact?

Options:

A.

To determine the audit duration


B.

To obtain reasonable assurance that the audit can be successfully completed


C.

To define processes for minimizing detection risks


Expert Solution
Questions # 54:

Which is not a requirement of HR prior to hiring?

Options:

A.

Undergo background verification


B.

Applicant must complete pre-employment documentation requirements


C.

Must undergo Awareness training on information security.


D.

Must successfully pass Background Investigation


Expert Solution
Questions # 55:

Question:

Why should materiality be considered during the initial contact?

Options:

A.

To determine the audit duration


B.

To define the audit team roles


C.

To set the audit objectives


Expert Solution
Questions # 56:

You are carrying out your first third-party ISMS surveillance audit as an audit team leader. You are presently in the auditee's data centre with another member of your audit team and the organisation's guide.

You request access to a locked room protected by a combination lock and iris scanner. In the corner of the room is a collection of hard drives piled on a desk. You ask the guide what the status of

the drives is. He tells you the drives are redundant and awaiting disposal. They should have been picked up last week, but the organisation's external provider of secure destruction services was

unable to source a driver due to staff sickness. He says this has recently become more common though he does not know why. He then presents you with a job ticket that confirms the pickup has

been rescheduled for tomorrow.

Based on the scenario above which three of the following actions would you now take?

Options:

A.

Record a nonconformity against control A.5.13 'labelling of information' as the disk drives' status was unclear


B.

Raise a nonconformity against control A.7.7, 'clear desk and clear screen' because the drives have been left unprotected on the desktop.


C.

Record an opportunity for improvement in respect of the external provider's inventory management arrangements.


D.

Ensure that the organisation's arrangements for the secure disposal and reuse of equipment have been adhered to.


E.

Record the finding but note no further action is required as the pickup has now been rescheduled.


F.

Raise a nonconformity against control A.7.5, 'protecting against physical and environmental threats' because the drives have been left exposed on the desktop.


G.

Ensure that the organisation's arrangements for the life cycle management of storage media have been adhered to.


Expert Solution
Questions # 57:

You are performing an ISMS audit at a residential nursing home railed ABC that provides healthcare services. The next step in your audit plan is to verify the effectiveness of the continual improvement process. During the audit, you learned most of the residents' family members (90%) receive WeCare medical device promotional advertisements through email and SMS once a week via ABC's healthcare mobile app. All of them do not agree on the use of the collected personal data (or marketing or any other purposes than nursing and medical care on the signed service agreement with ABC. They have very strong reason to believe that ABC is leaking residents' and family members' personal information to a non-relevant third party and they have filed complaints.

The Service Manager says that all these complaints have been treated as nonconformities, and the corrective actions have been planned and implemented according to the Nonconformity and Corrective management procedure. The corrective action involved stopping working with WeCare the medical device manufacturer immediately and asking them to delete all personal data received as well as sending an apology email to all residents and their family members.

You are preparing the audit findings. Select one option of the correct finding.

Options:

A.

Nonconformity: ABC does not follow the signed healthcare service agreement with residents' family members


B.

No nonconformity: I would like to collect more evidence on how the organisation defines the management system scope and see if they covered WeCare medical device manufacture


C.

No nonconformity: The Service Manager implemented the corrective actions and the Customer Service Representative evaluates the effectiveness of implemented corrective actions


D.

Nonconformity: The management review does not take the feedback from residents' family members into consideration


Expert Solution
Questions # 58:

Scenario 2: Knight is an electronics company from Northern California, US that develops video game consoles. Knight has more than 300 employees worldwide. On the

fifth anniversary of their establishment, they have decided to deliver the G-Console, a new generation video game console aimed for worldwide markets. G-Console is

considered to be the ultimate media machine of 2021 which will give the best gaming experience to players. The console pack will include a pair of VR headset, two

games, and other gifts.

Over the years, the company has developed a good reputation by showing integrity, honesty, and respect toward their customers. This good reputation is one of the

reasons why most passionate gamers aim to have Knight's G-console as soon as it is released in the market. Besides being a very customer-oriented company, Knight

also gained wide recognition within the gaming industry because of the developing quality. Their prices are a bit higher than the reasonable standards allow.

Nonetheless, that is not considered an issue for most loyal customers of Knight, as their quality is top-notch.

Being one of the top video game console developers in the world, Knight is also often the center of attention for malicious activities. The company has had an

operational ISMS for over a year. The ISMS scope includes all departments of Knight, except Finance and HR departments.

Recently, a number of Knight's files containing proprietary information were leaked by hackers. Knight's incident response team (IRT) immediately started to analyze

every part of the system and the details of the incident.

The IRT's first suspicion was that Knight's employees used weak passwords and consequently were easily cracked by hackers who gained unauthorized access to their

accounts. However, after carefully investigating the incident, the IRT determined that hackers accessed accounts by capturing the file transfer protocol (FTP) traffic.

FTP is a network protocol for transferring files between accounts. It uses clear text passwords for authentication.

Following the impact of this information security incident and with IRT's suggestion, Knight decided to replace the FTP with Secure Shell (SSH) protocol, so anyone

capturing the traffic can only see encrypted data.

Following these changes, Knight conducted a risk assessment to verify that the implementation of controls had minimized the risk of similar incidents. The results of

the process were approved by the ISMS project manager who claimed that the level of risk after the implementation of new controls was in accordance with the

company's risk acceptance levels.

Based on this scenario, answer the following question:

Based on scenario 2, the ISMS project manager approved the results of risk assessment. Is this acceptable?

Options:

A.

No, the risk remaining after the treatment of risk should be approved by the top management at any stage


B.

No, the risk remaining after the implementation of new controls for the ISMS should be approved by the ISMS team


C.

Yes, the risk remaining after the treatment of risk should be approved by the ISMS project manager


Expert Solution
Questions # 59:

You are performing an ISO 27001 ISMS surveillance audit at a residential nursing home, ABC Healthcare Services. ABC uses a healthcare mobile app designed and maintained by a supplier, WeCare, to monitor residents' well-being. During the audit, you learn that 90% erf the residents' family members regularly receive medical device advertisements from WeCare, by email and SMS once a week. The service agreement between ABC and WeCare prohibits the supplier from using residents' personal data. ABC has received many complaints from residents and their family members.

The Service Manager says that the complaints were investigated as an information security incident which found that they were justified. Corrective actions have been planned and implemented according to the nonconformity and corrective action management procedure.

You write a nonconformity "ABC failed to comply with information security control A.5.34 (Privacy and protection of PII) relating to the personal data of residents' and their family members. A supplier, WeCare, used residents' personal information to send advertisements to family members"

Select three options of the corrections and corrective actions listed that you would expect ABC to make in response to the nonconformity

Options:

A.

ABC confirms that information security control A.5.34 is contained in the Statement of Applicability (SoA)


B.

The Service Manager provides evidence of analysis of the cause of nonconformity and how the ABC evaluates the effectiveness of implemented corrective actions


C.

ABC instructs all staff to follow the signed healthcare service agreement with residents' family members


D.

ABC conducts a management review to take the feedback from residents' family members into consideration


E.

ABC needs to collect more evidence on how the organisation defines the management system scope and find out if they covered WeCare the medical device manufacturer


F.

ABC identifies and checks compliance with all applicable legislation and contractual requirements involving third parties


G.

The Service Manager implements the corrective actions and Customer Service Representatives evaluate the effectiveness of implemented corrective actions


Expert Solution
Questions # 60:

You are carrying out your first third-party ISMS surveillance audit as an audit team leader. You are presently in the auditee's data centre with another member of your audit team and the organisation's guide.

You request access to a locked room protected by a combination lock and iris scanner. The room contains several rows of uninterruptable power supplies along with several data cabinets containing client-supplied

equipment, predominantly servers, and switches.

You note that there is a gas-based fire extinguishing system in place. A label indicates that the system requires testing every 6 months however the most recent test recorded on the label was carried out by the

manufacturer 12 months ago.

Based on the scenario above which two of the following actions would you now take?

Options:

A.

Determine if requirements for recording fire extinguisher checks have been revised within the last year. If so, suggest these are referenced on the existing labels as an opportunity for improvement


B.

Make a note to ask the site maintenance manager for evidence that a fire extinguishing system test was carried out 6 months ago


C.

Providing water-based extinguishers are accessible in the room, take no further action as these provide an alternative means to put out a fire


D.

Raise a nonconformity against control A.5.7 'threat intelligence' as the organisation has not identified the need to take action against the threat of fire


E.

Raise a nonconformity against control A.7.11 'supporting utilities' as information processing facilities are not adequately protected against possible disruption


F.

Require the guide to initiate the organisation's information security incident process


Expert Solution
Viewing page 6 out of 11 pages
Viewing questions 51-60 out of questions