Pass the PECB ISO 27001 ISO-IEC-27001-Lead-Auditor Questions and answers with CertsForce

Viewing page 8 out of 11 pages
Viewing questions 71-80 out of questions
Questions # 71:

You are an ISMS audit team leader preparing to chair a closing meeting following a third-party surveillance audit. You are drafting a closing meeting agenda setting out the topics you wish to discuss with your auditee.

Which one of the following would be appropriate for inclusion?

Options:

A.

A detailed explanation of the certification body's complaints process


B.

An explanation of the audit plan and its purpose


C.

A disclaimer that the result of the audit is based on the sampling of evidence


D.

Names of auditees associated with nonconformities


Expert Solution
Questions # 72:

Objectives, criteria, and scope are critical features of a third-party ISMS audit. Which two issues are audit objectives?

Options:

A.

Evaluate customer processes and functions


B.

Assess conformity with ISO/IEC 27001 requirements


C.

Fulfil the audit plan


D.

Confirm sites operating the ISMS


E.

Determine the scope of the ISMS


F.

Review organisation efficiency


Expert Solution
Questions # 73:

Scenario 3: Rebuildy is a construction company located in Bangkok.. Thailand, that specializes in designing, building, and maintaining residential buildings. To ensure the security of sensitive project data and client information, Rebuildy decided to implement an ISMS based on ISO/IEC 27001. This included a comprehensive understanding of information security risks, a defined continual improvement approach, and robust business solutions.

The ISMS implementation outcomes are presented below

Information security is achieved by applying a set of security controls and establishing policies, processes, and procedures.

Security controls are implemented based on risk assessment and aim to eliminate or reduce risks to an acceptable level.

All processes ensure the continual improvement of the ISMS based on the plan-do-check-act (PDCA) model.

The information security policy is part of a security manual drafted based on best security practices Therefore, it is not a stand-alone document.

Information security roles and responsibilities have been clearly stated in every employees job description

Management reviews of the ISMS are conducted at planned intervals.

Rebuildy applied for certification after two midterm management reviews and one annual internal audit Before the certification audit one of Rebuildy’s former employees approached one of the audit team members to tell them that Rebuildy has several security problems that the company is trying to conceal. The former employee presented the documented evidence to the audit team member Electra, a key client of Rebuildy, also submitted evidence on the same issues, and the auditor determined to retain this evidence instead of the former employee's. The audit team member remained in contact with Electra until the audit was completed, discussing the nonconformities found during the audit. Electra provided additional evidence to support these findings.

At the beginning of the audit, the audit team interviewed the company’s top management They discussed, among other things, the top management's commitment to the ISMS implementation. The evidence obtained from these discussions was documented in written confirmation, which was used to determine Rebuildy’s conformity to several clauses of ISO/IEC 27001

The documented evidence obtained from Electra was attached to the audit report, along with the nonconformities report. Among others, the following nonconformities were detected:

An instance of improper user access control settings was detected within the company's financial reporting system.

A stand-alone information security policy has not been established. Instead, the company uses a security manual drafted based on best security practices.

After receiving these documents from the audit team, the team leader met Rebuildy’s top management to present the audit findings. The audit team reported the findings related to the financial reporting system and the lack of a stand-alone information security policy. The top management expressed dissatisfaction with the findings and suggested that the audit team leader's conduct was unprofessional, implying they might request a replacement. Under pressure, the audit team leader decided to cooperate with top management to downplay the significance of the detected nonconformities. Consequently, the audit team leader adjusted the report to present a more favorable view, thus misrepresenting the true extent of Rebuildy's compliance issues.

Based on the scenario above, answer the following question:

Question:

Which action described in Scenario 3 indicates that the audit team leader violated the independence principle?

Options:

A.

The audit team leader sent a favorable report after discussing the audit conclusions with the top management


B.

The audit team included the former employee’s evidence in the audit report without revealing the source


C.

The audit team leader revealed confidential information about Rebuildy to the former employee


Expert Solution
Questions # 74:

Scenario 3: Rebuildy is a construction company located in Bangkok.. Thailand, that specializes in designing, building, and maintaining residential buildings. To ensure the security of sensitive project data and client information, Rebuildy decided to implement an ISMS based on ISO/IEC 27001. This included a comprehensive understanding of information security risks, a defined continual improvement approach, and robust business solutions.

The ISMS implementation outcomes are presented below

Information security is achieved by applying a set of security controls and establishing policies, processes, and procedures.

Security controls are implemented based on risk assessment and aim to eliminate or reduce risks to an acceptable level.

All processes ensure the continual improvement of the ISMS based on the plan-do-check-act (PDCA) model.

The information security policy is part of a security manual drafted based on best security practices Therefore, it is not a stand-alone document.

Information security roles and responsibilities have been clearly stated in every employees job description

Management reviews of the ISMS are conducted at planned intervals.

Rebuildy applied for certification after two midterm management reviews and one annual internal audit Before the certification audit one of Rebuildy’s former employees approached one of the audit team members to tell them that Rebuildy has several security problems that the company is trying to conceal. The former employee presented the documented evidence to the audit team member Electra, a key client of Rebuildy, also submitted evidence on the same issues, and the auditor determined to retain this evidence instead of the former employee's. The audit team member remained in contact with Electra until the audit was completed, discussing the nonconformities found during the audit. Electra provided additional evidence to support these findings.

At the beginning of the audit, the audit team interviewed the company’s top management They discussed, among other things, the top management's commitment to the ISMS implementation. The evidence obtained from these discussions was documented in written confirmation, which was used to determine Rebuildy’s conformity to several clauses of ISO/IEC 27001

The documented evidence obtained from Electra was attached to the audit report, along with the nonconformities report. Among others, the following nonconformities were detected:

An instance of improper user access control settings was detected within the company's financial reporting system.

A stand-alone information security policy has not been established. Instead, the company uses a security manual drafted based on best security practices.

After receiving these documents from the audit team, the team leader met Rebuildy’s top management to present the audit findings. The audit team reported the findings related to the financial reporting system and the lack of a stand-alone information security policy. The top management expressed dissatisfaction with the findings and suggested that the audit team leader's conduct was unprofessional, implying they might request a replacement. Under pressure, the audit team leader decided to cooperate with top management to downplay the significance of the detected nonconformities. Consequently, the audit team leader adjusted the report to present a more favorable view, thus misrepresenting the true extent of Rebuildy's compliance issues.

Based on the scenario above, answer the following question:

Question:

Based on Scenario 3, the audit team used information obtained from interviews with top management to determine Rebuildy’s conformity to several ISO/IEC 27001 clauses. Is this acceptable?

Options:

A.

No, the audit team should have used only documentary evidence, such as policies and procedures, to determine conformity


B.

Yes, the audit team obtained verbal evidence by written confirmations from the top management, which can be used to determine conformity to the standard


C.

Yes, interviews with top management are the most reliable form of audit evidence and can be used to determine conformity to the standard without further verification


Expert Solution
Questions # 75:

Phishing is what type of Information Security Incident?

Options:

A.

Private Incidents


B.

Cracker/Hacker Attacks


C.

Technical Vulnerabilities


D.

Legal Incidents


Expert Solution
Questions # 76:

As the Information Security Management System audit team leader, you are conducting a second-party audit of an international logistics company on behalf of an online retailer. During the audit, one of your team members reports a nonconformity relating to control 5.18 (Access rights) of Appendix A of ISO/IEC 27001:2022. She found evidence that removing the server access protocols of 20 people who left in the last 3 months took up to 1 week whereas the policy required removing access within 24 hours of their departure.

When the auditee was asked why there was a delay in removing access they replied, 'no one was available in the IT department during that period as a result of COVID-19. As soon as an IT officer became available the rights were removed.

You note that she intends to raise a minor non-conformity against Access rights control (5.18). How should you respond to this?

Options:

A.

Agree with the raising of a minor non-conformity but against control 5.15, not 5.18.


B.

Agree with the raising of the minor non-conformity against 5.18.


C.

Disagree with the raising of a minor conformity as appropriate action was taken at the earliest opportunity Take no further action.


D.

Disagree with the raising of the minor nonconformity as appropriate action was taken at the earliest opportunity. Instead raise an opportunity for improvement.


E.

Disagree with the raising of the minor nonconformity, there is sufficient evidence to justify an escalation to a major non-conformity.


F.

Require additional audit evidence to be obtained before determining whether a non-conformity is appropriate.


Expert Solution
Questions # 77:

During an opening meeting of a Stage 2 audit, the Managing Director of the client organisation invites the audit team to view a new company video lasting 45 minutes. Which two of the following responses should the audit team leader make?

Options:

A.

Advise the Managing Director that the audit team has to keep to the planned schedule


B.

State that the audit team leader will stay behind after the opening meeting to view the video on behalf of the team


C.

Invite the Managing Director to the auditors' hotel for a viewing that evening.


D.

Suggest that the video could be viewed during a refreshment break


E.

State that the audit team will make a decision on the viewing at a later time


F.

Advise the Managing Director that the audit team agrees to his request


Expert Solution
Questions # 78:

You are an ISMS audit team leader assigned by your certification body to carry out a follow-up audit of a Data Centre client.

According to ISO 19011:2018, the purpose of a follow-up audit is to verify which one of the following?

Options:

A.

The effectiveness of the management system


B.

Implementation of ISMS objectives


C.

Implementation of risk treatment plans


D.

Completion and effectiveness of corrective actions


Expert Solution
Questions # 79:

Question:

How does predictive analytics help auditors in identifying potential risks?

Options:

A.

By providing real-time analysis of financial data


B.

By predicting future outcomes based on trends


C.

By organizing data from various sources


Expert Solution
Questions # 80:

Based on the identified nonconformities. Company A established action plans that included the detected nonconformities, the root causes, and a general statement regarding each action that would be taken. Is this acceptable?

Options:

A.

No, the action plans should include information on the systems that will be installed and how these systems will eliminate the root causes


B.

No, the auditee is required to submit action plans that include detailed information on how every corrective action will be implemented


C.

Yes, the auditee is required to submit action plans that include a general statement regarding the actions that will be taken


Expert Solution
Viewing page 8 out of 11 pages
Viewing questions 71-80 out of questions