Spring Sale 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: save70

Pearson ISO-IEC-27001-Lead-Auditor New Attempt

PECB Certified ISO/IEC 27001 2022 Lead Auditor exam Questions and Answers

Question 69

Based on the identified nonconformities. Company A established action plans that included the detected nonconformities, the root causes, and a general statement regarding each action that would be taken. Is this acceptable?

Options:

A.

No, the action plans should include information on the systems that will be installed and how these systems will eliminate the root causes

B.

No, the auditee is required to submit action plans that include detailed information on how every corrective action will be implemented

C.

Yes, the auditee is required to submit action plans that include a general statement regarding the actions that will be taken

Question 70

During a third-party certification audit, you are presented with a list of issues by an auditee. Which four of the following constitute 'internal' issues in the context of a management system to ISO 27001:2022?

    Higher labour costs as a result of an aging population

Options:

A.

A rise in interest rates in response to high inflation

B.

Poor levels of staff competence as a result of cuts in training expenditure

C.

Poor morale as a result of staff holidays being reduced

D.

Increased absenteeism as a result of poor management

E.

A reduction in grants as a result of a change in government policy

F.

A fall in productivity linked to outdated production equipment

G.

Inability to source raw materials due to government sanctions

Question 71

Scenario 5

CyberShielding Systems Inc. provides security services spanning the entire information technology infrastructure. It provides cybersecurity software, including endpoint security, firewalls, and antivirus software. CyberShielding Systems Inc. has helped various companies secure their networks for two decades through advanced products and services. Having achieved a reputation in the information and network security sector, CyberShielding Systems Inc. decided to implement a security information management system (ISMS) based on ISO/IEC 27001 and obtain a certification to better secure its internal and customer assets and gain a competitive advantage.

The certification body initiated the process by selecting the audit team for CyberShielding Systems Inc.'s ISO/IEC 27001 certification. They provided the company with the name and background information of each audit member. However, upon review, CyberShielding Systems Inc. discovered that one of the auditors did not hold the security clearance required by them. Consequently, the company objected to the appointment of this auditor. Upon review, the certification body replaced the auditor in response to CyberShielding Systems Inc.'s objection.

As part of the audit process, CyberShielding Systems Inc.'s approach to risk and opportunity determination was assessed as a standalone activity. This involved examining the organization’s methods for identifying and managing risks and opportunities. The audit team’s core objectives encompassed providing assurance on the effectiveness of CyberShielding Systems Inc.'s risk and opportunity identification mechanisms and reviewing the organization's strategies for addressing these determined risks and opportunities. During this, the audit team also identified a risk due to a lack of oversight in the firewall configuration review process, where changes were implemented without proper approval, potentially exposing the company to vulnerabilities. This finding highlighted the need for stronger internal controls to prevent such issues.

The audit team accessed process descriptions and organizational charts to understand the main business processes and controls. They performed a limited analysis of the IT risks and controls because their access to the IT infrastructure and applications was limited by third-party service provider restrictions. However, the audit team stated that the risk of a significant defect occurring in CyberShielding’s ISMS was low since most of the company's processes were automated. They therefore evaluated that the ISMS, as a whole, conforms to the standard requirements by questioning CyberShielding representatives on IT responsibilities, control effectiveness, and anti-malware measures. CyberShielding’s representatives provided sufficient and appropriate evidence to address all these questions.

Despite the agreement signed before the audit, which outlined the audit scope, criteria, and objectives, the audit was primarily focused on assessing conformity with established criteria and ensuring compliance with statutory and regulatory requirements.

Question

What kind of audit risk did the audit team identify? Refer to Scenario 5.

Options:

A.

Inherent risk

B.

Control risk

C.

Detection risk

Question 72

You are an experienced audit team leader guiding an auditor in training,

Your team is currently conducting a third-party surveillance audit of an organisation that stores data on behalf of external clients. The auditor in training has been tasked with reviewing the TECHNOLOGICAL controls listed in the Statement of Applicability (SoA) and implemented at the site.

Select four controls from the following that would you expect the auditor in training to review.

Options:

A.

The development and maintenance of an information asset inventory

B.

Rules for transferring information within the organisation and to other organisations

C.

Confidentiality and nondisclosure agreements

D.

How protection against malware is implemented

E.

Access to and from the loading bay

F.

The conducting of verification checks on personnel

G.

Remote working arrangements