Spring Sale Limited Time 75% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code = simple75

Pass the PECB ISO 27001 ISO-IEC-27001-Lead-Auditor Questions and answers with Dumpstech

Exam ISO-IEC-27001-Lead-Auditor Premium Access

View all detail and faqs for the ISO-IEC-27001-Lead-Auditor exam

Practice at least 50% of the questions to maximize your chances of passing.
Viewing page 2 out of 13 pages
Viewing questions 11-20 out of questions
Questions # 11:

Which is not a requirement of HR prior to hiring?

Options:

A.

Undergo background verification

B.

Applicant must complete pre-employment documentation requirements

C.

Must undergo Awareness training on information security.

D.

Must successfully pass Background Investigation

Questions # 12:

Which two options are benefits of third-party accredited certification of information security management systems to ISO/IEC 27001:2022 for organisations and interested parties?

Options:

A.

Third-party accredited certification demonstrates that the organisation complies with the legal and legislation requirements expected by interested parties

B.

Third-party accredited certification demonstrates that the organisation's ICT products are secured and certified

C.

Third-party accredited certification demonstrates that the organisation's management system is maintained and effective

D.

Third-party accredited certification demonstrates the organisation's management system adopted a systematic approach to information security

E.

Third-party accredited certification makes sure the organisation will obtain more customers

F.

Third-party accredited certification makes sure the organisation's IT system will be protected from external interference

Questions # 13:

You are an experienced ISMS auditor conducting a third-party surveillance audit at an organisation which offers ICT reclamation services. ICT equipment which companies no longer require is processed by the organisation. It Is either recommissioned and reused or is securely destroyed.

You notice two servers on a bench in the corner of the room. Both have stickers on item with the server's name, IP address and admin password. You ask the ICT Manager about them, and he tells you they were part of a shipment received yesterday from a regular customer.

Which one action should you take?

Options:

A.

Ask the ICT Manager to record an information security incident and initiate the information security incident management process

B.

Note the audit finding and check the process for dealing with incoming shipments relating to customer IT security

C.

Record what you have seen in your audit findings, but take no further action

D.

Raise a nonconformity against control 5.31 Legal, staturary, regulatory and contractual requirements'

E.

Raise a nonconformity against control 8.20 'network security’ (networks and network devices shall be secured, managed and controlled to protect information in systems and applications)

F.

Ask the auditee to remove the labels, then carry on with the audit

Questions # 14:

An auditor of organisation A performs an audit of supplier B. Which two of the following actions is likely to represent a breach of confidentiality by the auditor after having identified findings in B's information security management system?

Options:

A.

Shares the findings with other relevant managers in A

B.

Shares the findings with B's Information Security Manager

C.

Shares the findings with A's supplier evaluation team

D.

Shares the findings with B's other customers

E.

Shares the findings with B's certification body

F.

Shares the findings with other relevant managers in B

Questions # 15:

You are performing an ISMS audit at a residential nursing home called ABC that provides healthcare services.

The next step in your audit plan is to verify the information security of ABC's healthcare mobile app development, support, and lifecycle process. During the audit, you learned the organisation outsourced the mobile app development to a professional software development organisation with CMMI Level 5, ITSM

(ISO/IEC 20000-1), BCMS (ISO 22301) and ISMS (ISO/IEC 27001) certified.

The IT Manager presents the software security management procedure and summarises the process as follows:

The mobile app development shall adopt "security-by-design" and "security-by-default" principles, as a minimum. The following security functions for personal data protection shall be available:

Access control.

Personal data encryption, i.e., Advanced Encryption Standard (AES) algorithm, key lengths: 256 bits; and

Personal data pseudonymization.

Vulnerability checked and no security backdoor

You sample the latest Mobile App Test report - Reference ID: 0098, details as follows:

Question # 15

Question # 15

You would like to investigate other areas further to collect more audit evidence. Select three options that will not be in your audit trail.

Options:

A.

Collect more evidence on how much residents' family members pay to install ABC's healthcare mobile app. (Relevant to clause 4.2)

B.

Collect more evidence by downloading and testing the mobile app on your phone. (Relevant to control A.8.1)

C.

Collect more evidence to determine the number of users of ABC's healthcare mobile app. (relevant to clause 4.2)

D.

Collect more evidence on how the organisation performs testing of personal data handling. (Relevant to control A.5.34)

E.

Collect more evidence on the organisation's business continuity policy. (Relevant to control A.5.30)

F.

Collect more evidence on how the organisation manages information security in the selection of an external service provider. (Relevant to control A.5.19)

G.

Collect more evidence on how the developer trains its product support personnel. (Relevant to clause 7.2)

Questions # 16:

Question:

What is the purpose of using a combination of audit test plans?

Options:

A.

To verify compliance with standards and criteria through multiple methods

B.

To ensure that all areas of the organization are audited equally

C.

To reduce the need for frequent audits

Questions # 17:

Scenario 8

Trustingo has been providing banking and financial services in Estonia since 2010. The company has a network of 30 branches with over 100 ATMs nationwide. To meet strict data security and privacy regulations, Trustingo implemented an information security management system (ISMS) based on ISO/IEC 27001, ensuring better security, improved risk management, and compliance with legal requirements.

Nine months after the successful implementation of the ISMS, Trustingo decided to pursue certification for their ISMS based on ISO/IEC 27001 by an independent certification body. The certification audit included Trustingo's systems, processes, and technologies.

The audit team conducted the Stage 1 and Stage 2 audits jointly, and several nonconformities were detected. The first nonconformity was related to Trustingo's labeling of information. The company had an information classification scheme but no information labeling procedure. As a result, documents requiring the same level of protection would be labeled differently.

The nonconformity also impacted media handling. The audit team used sampling and concluded that 50 of 200 removable media stored sensitive information mistakenly classified as confidential. According to the information classification scheme, confidential information can be stored in removable media, whereas storing sensitive information is strictly prohibited.

The audit team drafted the nonconformity report and discussed the audit conclusions with Trustingo's representatives, who agreed to submit an action plan for the detected nonconformities within two months. Since the certification recommendation is conditional upon filing corrective actions, Trustingo must submit corrective action plans to show how they will address and resolve these nonconformities. Trustingo accepted the audit team leader's proposed solution and addressed the nonconformities by drafting an information labeling procedure and updating the removable media procedure.

Two weeks after the audit completion, Trustingo submitted a general action plan. Although the plan addressed the detected nonconformities and corrective actions taken, it lacked detailed action steps for each nonconformity and did not include specific details on the impacted systems, controls, or operations. The audit team evaluated the action plan. Nevertheless, Trustingo received an unfavorable recommendation for certification.

Question

Which option justifies the unfavorable recommendation for certification? Refer to Scenario 8.

Options:

A.

The major nonconformity related to storing sensitive information in removable media

B.

The minor nonconformity related to the lack of information labeling procedure

C.

The company's decision to submit the action plan in two weeks despite having a different timeline available

Questions # 18:

According to ISO/IEC 27001, an Information Security Management System seeks to protect which two of the following?

Options:

A.

The accessibility of information

B.

The authenticity of information

C.

The confidentiality of information

D.

The consistency of information

E.

The integration of information

F.

The integrity of information

Questions # 19:

Phishing is what type of Information Security Incident?

Options:

A.

Private Incidents

B.

Cracker/Hacker Attacks

C.

Technical Vulnerabilities

D.

Legal Incidents

Questions # 20:

During a follow-up audit, you notice that a nonconformity identified for completion before the follow-up audit is still outstanding.

Which four of the following actions should you take?

Options:

A.

Report the failure to address the corrective action for the outstanding nonconformity to the organisation's top management

B.

Immediately raise an nonconformity as the date for completion has been exceeded

C.

If the delay is justified agree on a revised date for clearing the nonconformity with the auditee/audit client

D.

Contact the individuals) managing the audit programme to seek their advice as to how to proceed

E.

Decide whether the delay in addressing the nonconformity is justified

F.

Cancel the follow-up audit and return when an assurance has been received that the nonconformity has been cleared

G.

Note the nonconformity is still outstanding and follow audit trails to determine why

Viewing page 2 out of 13 pages
Viewing questions 11-20 out of questions