Pre-Winter Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: pass65

Pass the PECB ISO 27001 ISO-IEC-27001-Lead-Auditor Questions and answers with CertsForce

Viewing page 8 out of 13 pages
Viewing questions 71-80 out of questions
Questions # 71:

Select the correct sequence for the information security risk assessment process in an ISMS.

To complete the sequence click on the blank section you want to complete so that it is highlighted in red, and then click on the applicable text from the options below. Alternatively, you may drag and drop the options to the appropriate blank

Question # 71


Expert Solution
Questions # 72:

The auditor was unable to identify that Company A hid their insecure network architecture. What type of audit risk is this?

Options:

A.

Inherent


B.

Control


C.

Detection


Expert Solution
Questions # 73:

You are the audit team leader conducting a third-party audit of an online insurance organisation. During Stage 1, you found that the organisation took a very cautious risk approach and included all the information security controls in ISO/IEC 27001:2022 Appendix A in their Statement of Applicability.

During the Stage 2 audit, your audit team found that there was no evidence of the implementation of the three controls (5.3 Segregation of duties, 6.1 Screening, 7.12 Cabling security) shown in the extract from the Statement of Applicability. No risk treatment plan was found.

Question # 73

Select three options for the actions you would expect the auditee to take in response to a

nonconformity against clause 6.1.3.e of ISO/IEC 27001:2022.

Options:

A.

Allocate responsibility for producing evidence to prove to auditors that the controls are implemented.


B.

Compile plans for the periodic assessment of the risks associated with the controls.


C.

Implement the appropriate risk treatment for each of the applicable controls.


D.

Incorporate written procedures for the controls into the organisation's Security Manual.


E.

Remove the three controls from the Statement of Applicability.


F.

Revise the relevant content in the Statement of Applicability to justify their exclusion.


G.

Revisit the risk assessment process relating to the three controls.


Expert Solution
Questions # 74:

Scenario 2:

Clinic, founded in the 1990s, is a medical device company that specializes in treatments for heart-related conditions and complex surgical interventions. Based in Europe, it serves both patients and healthcare professionals. Clinic collects patient data to tailor treatments, monitor outcomes, and improve device functionality. To enhance data security and build trust, Clinic is implementing an information security management system (ISMS) based on ISO/IEC 27001. This initiative demonstrates Clinic's commitment to securely managing sensitive patient information and proprietary technologies.

Clinic established the scope of its ISMS by solely considering internal issues, interfaces, dependencies between internal and outsourced activities, and the expectations of interested parties. This scope was carefully documented and made accessible. In defining its ISMS, Clinic chose to focus specifically on key processes within critical departments such as Research and Development, Patient Data Management, and Customer Support.

Despite initial challenges, Clinic remained committed to its ISMS implementation, tailoring security controls to its unique needs. The project team excluded certain Annex A controls from ISO/IEC 27001 while incorporating additional sector-specific controls to enhance security. The team evaluated the applicability of these controls against internal and external factors, culminating in the development of a comprehensive Statement of Applicability (SoA) detailing the rationale behind control selection and implementation.

As preparations for certification progressed, Brian, appointed as the team leader, adopted a self-directed risk assessment methodology to identify and evaluate the company’s strategic issues and security practices. This proactive approach ensured that Clinic’s risk assessment aligned with its objectives and mission.

Question:

Does the Clinic's SoA document meet the ISO/IEC 27001 requirements for the SoA?

Options:

A.

Yes, because it comprises an exhaustive list of controls considered applicable from Annex A of ISO/IEC 27001 and the other sources


B.

No, because security controls selected from sources other than Annex A of ISO/IEC 27001 are included


C.

No, because it does not contain the justification for the exclusion of controls from Annex A of ISO/IEC 27001


Expert Solution
Questions # 75:

You are an experienced ISMS audit team leader providing guidance to an auditor in training.

The auditor in training appears to be confused about the interpretation of competence in ISO 27001:2022 and is seeking clarification from you that his understanding is correct. He sets out a series of mini scenarios and asks you which of these you would attribute to a lack of competence. Select four correct options.

Options:

A.

An employee recently transferred from the IT networks team to Software development was unaware of the need to complete product release forms prior to shipping


B.

A senior programmer did not check their coding for errors as they were running late for a doctor's appointment


C.

A new starter was unable to switch on CCTV monitoring because they had not been shown how to do this


D.

An IT technician failed to configure a new model of server correctly as a result of not reading the supplied instructions


E.

An experienced receptionist allowed a contractor she recognised to enter the data centre without his access card


F.

A system administrator deleted two live accounts as well as five redundant accounts as a result of receiving an incorrect instruction


G.

A data centre operator inadvertently placed a backup tape into an incorrect drive because they were in a hurry to move on to another task


Expert Solution
Questions # 76:

What is we do in ACT - From PDCA cycle

Options:

A.

Take actions to continually monitor process performance


B.

Take actions to continually improve process performance


C.

Take actions to continually monitor process performance


D.

Take actions to continually improve people performance


Expert Solution
Questions # 77:

Question

Which statement below best describes the relationship between information security elements?

Options:

A.

Threats exploit vulnerabilities to damage or destroy assets


B.

Controls protect assets by reducing threats


C.

Risk is a function of vulnerabilities that harm assets


Expert Solution
Questions # 78:

Question

An organization requires all employees to undergo security awareness training every six months. The training covers topics such as recognizing phishing attacks, handling sensitive data, and reporting security incidents. After completing the training, employees must pass a short quiz to demonstrate their understanding.

What type of control does this activity represent?

Options:

A.

Legal


B.

Managerial


C.

Administrative


Expert Solution
Questions # 79:

Question

The auditor discovered that two out of 15 employees of the IT Department did not receive adequate information security training. What does this represent?

Options:

A.

Audit finding


B.

Audit evidence


C.

Information source


Expert Solution
Questions # 80:

Scenario 1: Fintive is a distinguished security provider for online payments and protection solutions. Founded in 1999 by Thomas Fin in San Jose, California, Fintive

offers services to companies that operate online and want to improve their information security, prevent fraud, and protect user information such as PII. Fintive centers

its decision-making and operating process based on previous cases. They gather customer data, classify them depending on the case, and analyze them. The company

needed a large number of employees to be able to conduct such complex analyses. After some years, however, the technology that assists in conducting such analyses

advanced as well. Now, Fintive is planning on using a modern tool, a chatbot, to achieve pattern analyses toward preventing fraud in real-time. This tool would also be

used to assist in improving customer service.

This initial idea was communicated to the software development team, who supported it and were assigned to work on this project. They began integrating the chatbot

on their existing system. In addition, the team set an objective regarding the chatbot which was to answer 85% of all chat queries.

After the successful integration of the chatbot, the company immediately released it to their customers for use. The chatbot, however, appeared to have some issues.

Due to insufficient testing and lack of samples provided to the chatbot during the training phase, in which it was supposed "to learn" the queries pattern, the chatbot

failed to address user queries and provide the right answers. Furthermore, the chatbot sent random files to users when it received invalid inputs such as odd patterns

of dots and special characters. Therefore, the chatbot was unable to properly answer customer queries and the traditional customer support was overwhelmed with

chat queries and thus was unable to help customers with their requests.

Consequently, Fintive established a software development policy. This policy specified that whether the software is developed in-house or outsourced, it will undergo a

black box testing prior to its implementation on operational systems.

Based on this scenario, answer the following question:

The chatbot was supposed "to learn" the queries pattern to address user queries and provide the right answers. What type of technology enables

this?

Options:

A.

Artificial intelligence


B.

Cloud computing


C.

Machine learning


Expert Solution
Viewing page 8 out of 13 pages
Viewing questions 71-80 out of questions