Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

ISO 27001 ISO-IEC-27001-Lead-Auditor Release Date

PECB Certified ISO/IEC 27001 2022 Lead Auditor exam Questions and Answers

Question 89

During an opening meeting of a Stage 2 audit, the Managing Director of the client organisation invites the audit team to view a new organisation video lasting 45 minutes.

Which two of the following responses should the audit team leader make?

Options:

A.

State that the audit team leader will stay behind after the opening meeting to view the video on behalf of the team

B.

Advise the Managing Director that the audit team agrees to his request

C.

Advise the Managing Director that the audit team has to keep to the planned schedule

D.

Invite the Managing Director to the auditors' hotel for a viewing that evening.

E.

Suggest that the last five minutes of the video could be viewed to provide a flavour of its content

F.

Suggest that the video could be viewed during a refreshment break

Question 90

Scenario 5: Data Grid Inc. is a well-known company that delivers security services across the entire information technology infrastructure. It provides cybersecurity software, including endpoint security, firewalls, and antivirus software. For two decades, Data Grid Inc. has helped various companies secure their networks through advanced products and services. Having achieved reputation in the information and network security field, Data Grid Inc. decided to obtain the ISO/IEC 27001 certification to better secure its internal and customer assets and gain competitive advantage.

Data Grid Inc. appointed the audit team, who agreed on the terms of the audit mandate. In addition, Data Grid Inc. defined the audit scope, specified the audit criteria, and proposed to close the audit within five days. The audit team rejected Data Grid Inc.'s proposal to conduct the audit within five days, since the company has a large number of employees and complex processes. Data Grid Inc. insisted that they have planned to complete the audit within five days, so both parties agreed upon conducting the audit within the defined duration. The audit team followed a risk-based auditing approach.

To gain an overview of the main business processes and controls, the audit team accessed process descriptions and organizational charts. They were unable to perform a deeper analysis of the IT risks and controls because their access to the IT infrastructure and applications was restricted. However, the audit team stated that the risk that a significant defect could occur to Data Grid Inc.'s ISMS was low since most of the company's processes were automated. They therefore evaluated that the ISMS, as a whole, conforms to the standard requirements by asking the representatives of Data Grid Inc. the following questions:

•How are responsibilities for IT and IT controls defined and assigned?

•How does Data Grid Inc. assess whether the controls have achieved the desired results?

•What controls does Data Grid Inc. have in place to protect the operating environment and data from malicious software?

•Are firewall-related controls implemented?

Data Grid Inc.'s representatives provided sufficient and appropriate evidence to address all these questions.

The audit team leader drafted the audit conclusions and reported them to Data Grid Inc.'s top management. Though Data Grid Inc. was recommended for certification by the auditors, misunderstandings were raised between Data Grid Inc. and the certification body in regards to audit objectives. Data Grid Inc. stated that even though the audit objectives included the identification of areas for potential improvement, the audit team did not provide such information.

Based on this scenario, answer the following question:

Data Grid Inc. is responsible for all the actions below, EXCEPT:

Options:

A.

Specifying the audit criteria

B.

Appointing the audit team

C.

Defining the audit scope

Question 91

Information Security is a matter of building and maintaining ________ .

Options:

A.

Confidentiality

B.

Trust

C.

Protection

D.

Firewalls

Question 92

All are prohibited in acceptable use of information assets, except:

Options:

A.

Electronic chain letters

B.

E-mail copies to non-essential readers

C.

Company-wide e-mails with supervisor/TL permission.

D.

Messages with very large attachments or to a large number ofrecipients.