Pass the PECB ISO 27001 ISO-IEC-27001-Lead-Implementer Questions and answers with CertsForce

Viewing page 5 out of 9 pages
Viewing questions 41-50 out of questions
Questions # 41:

SkyFleet did not submit action plans within the specified deadline and was not recommended for certification. Is this acceptable?

Options:

A.

No, SkyFleet should receive an extension


B.

No, SkyFleet should be recommended for certification


C.

Yes, SkyFleet should not be recommended for certification


Expert Solution
Questions # 42:

What service did Auto Tsaab implement to manage and protect information effectively?

Options:

A.

Cryptographic services


B.

Access control services


C.

Integrity services


D.

Backup services


Expert Solution
Questions # 43:

Scenario:

A manufacturing company faced a risk of production delays due to potential supply chain disruptions. After assessing the potential impact, the company concluded the disruption was unlikely to significantly affect operations. The company decided to accept the risk.

Question:

Which risk treatment option did the company select in this case?

Options:

A.

Risk avoidance


B.

Risk retention


C.

Risk deflection


Expert Solution
Questions # 44:

Scenario 3: Socket Inc is a telecommunications company offering mainly wireless products and services. It uses MongoDB. a document model database that offers high availability, scalability, and flexibility.

Last month, Socket Inc. reported an information security incident. A group of hackers compromised its MongoDB database, because the database administrators did not change its default settings, leaving it without a password and publicly accessible.

Fortunately. Socket Inc. performed regular information backups in their MongoDB database, so no information was lost during the incident. In addition, a syslog server allowed Socket Inc. to centralize all logs in one server. The company found out that no persistent backdoor was placed and that the attack was not initiated from an employee inside the company by reviewing the event logs that record user faults and exceptions.

To prevent similar incidents in the future, Socket Inc. decided to use an access control system that grants access to authorized personnel only. The company also implemented a control in order to define and implement rules for the effective use of cryptography, including cryptographic key management, to protect the database from unauthorized access The implementation was based on all relevant agreements, legislation, and regulations, and the information classification scheme. To improve security and reduce the administrative efforts, network segregation using VPNs was proposed.

Lastly, Socket Inc. implemented a new system to maintain, collect, and analyze information related to information security threats, and integrate information security into project management.

Based on scenario 3. which information security control of Annex A of ISO/IEC 27001 did Socket Inc. implement by establishing a new system to maintain, collect, and analyze information related to information security threats?

Options:

A.

Annex A 5.5 Contact with authorities


B.

Annex A 5 7 Threat Intelligence


C.

Annex A 5.13 Labeling of information


Expert Solution
Questions # 45:

Scenario 7: InfoSec is a multinational corporation headquartered in Boston, MA, which provides professional electronics, gaming, and entertainment services. After facing numerous information security incidents, InfoSec has decided to establish teams and implement measures to prevent potential incidents in the future

Emma, Bob. and Anna were hired as the new members of InfoSec's information security team, which consists of a security architecture team, an incident response team (IRT) and a forensics team Emma's job is to create information security plans, policies, protocols, and training to prepare InfoSec to respond to incidents effectively Emma and Bob would be full-time employees of InfoSec, whereas Anna was contracted as an external consultant.

Bob, a network expert, will deploy a screened subnet network architecture This architecture will isolate the demilitarized zone (OMZ) to which hosted public services are attached and InfoSec's publicly accessible resources from their private network Thus, InfoSec will be able to block potential attackers from causing unwanted events inside the company's network. Bob is also responsible for ensuring that a thorough evaluation of the nature of an unexpected event is conducted, including the details on how the event happened and what or whom it might affect.

Anna will create records of the data, reviews, analysis, and reports in order to keep evidence for the purpose of disciplinary and legal action, and use them to prevent future incidents. To do the work accordingly, she should be aware of the company's information security incident management policy beforehand

Among others, this policy specifies the type of records to be created, the place where they should be kept, and the format and content that specific record types should have.

According to scenario 7, a demilitarized zone (DMZ) is deployed within InfoSec's network. What type of control has InfoSec implemented in this case?

Options:

A.

Detective


B.

Preventive


C.

Corrective


Expert Solution
Questions # 46:

How does the Statement of Applicability (SoA) contribute to the certification audit process?

Options:

A.

It provides a comprehensive overview of security incidents for external auditors


B.

It provides a reference for external auditors, listing pertinent controls relevant to the ISMS


C.

It provides a checklist for top management to ensure the implementation of relevant controls to the ISMS


Expert Solution
Questions # 47:

Scenario 10: CircuitLinking is a company specializing in water purification solutions, designing and manufacturing efficient filtration and treatment systems for both residential and commercial applications. Over the past two years, the company has actively implemented an integrated management system (IMS) that aligns with both ISO/IEC 27001 for information security and ISO 9001 for quality management. Recently, the company has applied for a combined audit to achieve certification against both ISO/IEC 27001 and ISO 9001.

In preparation, CircuitLinking ensured a clear understanding of ISO/IEC 27001, identified subject-matter experts, allocated resources, and gathered documentation to provide evidence of effective procedures. After passing Stage 1 (focused on verifying the design), Stage 2 was conducted to examine implementation and effectiveness. An auditor with a potential conflict of interest was replaced at the company’s request. The audit process continued, and the company was awarded certification.

During a later recertification audit, significant changes to the management system triggered a Stage 1 assessment to evaluate the impact.

Based on the scenario above, answer the following question:

During the Stage 1 audit, the auditor assessed the design of CircuitLinking's management system. Is this approach recommended?

Options:

A.

Yes, during the Stage 1 audit, the auditor should assess the design of the management system


B.

No, during the Stage 1 audit, the auditor should assess the auditee's physical infrastructure


C.

No, during the Stage 1 audit, the auditor should assess the effectiveness of the management system


Expert Solution
Questions # 48:

An organization wants to enable the correlation and analysis of security-related events and other recorded data and to support investigations into information security incidents. Which control should it implement?

Options:

A.

Use of privileged utility programs


B.

Clock synchronization


C.

Installation of software on operational systems


Expert Solution
Questions # 49:

The incident management process of an organization enables them to prepare for and respond to information security incidents. In addition, the organization has procedures in place for assessing information security events. According to ISO/IEC 27001, what else must an incident management process include?

Options:

A.

Processes for using knowledge gained from information security incidents


B.

Establishment of two information security incident response teams


C.

Processes for handling information security incidents of suppliers as defined in their agreements


Expert Solution
Questions # 50:

A tech company has implemented a security measure to confirm the secure removal or overwriting of sensitive data and licensed software on equipment before disposal or reuse. What type of security control was implemented?

Options:

A.

Physical control


B.

Technological control


C.

Organizational control


Expert Solution
Viewing page 5 out of 9 pages
Viewing questions 41-50 out of questions