Easter Sale Special 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exams65

PECB Certified ISO/IEC 27001 2022 Lead Auditor exam Question and Answers

PECB Certified ISO/IEC 27001 2022 Lead Auditor exam

Last Update May 18, 2024
Total Questions : 275

We are offering FREE ISO-IEC-27001-Lead-Auditor PECB exam questions. All you do is to just go and sign up. Give your details, prepare ISO-IEC-27001-Lead-Auditor free exam questions and then go for complete pool of PECB Certified ISO/IEC 27001 2022 Lead Auditor exam test questions that will help you more.

ISO-IEC-27001-Lead-Auditor pdf

ISO-IEC-27001-Lead-Auditor PDF

$35  $99.99
ISO-IEC-27001-Lead-Auditor Engine

ISO-IEC-27001-Lead-Auditor Testing Engine

$42  $119.99
ISO-IEC-27001-Lead-Auditor PDF + Engine

ISO-IEC-27001-Lead-Auditor PDF + Testing Engine

$56  $159.99
Questions 1

You are an experienced ISMS audit team leader guiding an auditor in training. She asks you about the grading of nonconformities in audit reports. You decide to test her knowledge by asking her which four of the following statements are true.

Options:

A.  

Major nonconformities may be subject to on-site follow up

B.  

Nonconformities must be graded only using the terms 'major' or 'minor'

C.  

The action taken to address major nonconformities is typically more substantial than the action taken to address minor nonconformities

D.  

Very minor nonconformities should be re-graded as opportunities for improvement

E.  

Several minor nonconformities can be grouped into a major nonconformity

F.  

The grading of nonconformities must be explained to the auditee at the opening meeting

G.  

The auditee is always responsible for determining the criteria for grading nonconformities

Discussion 0
Questions 2

You are an ISMS audit team leader preparing to chair a closing meeting following a third-party surveillance audit. You are drafting a closing meeting agenda setting out the topics you wish to discuss with your auditee.

Which one of the following would be appropriate for inclusion?

Options:

A.  

A detailed explanation of the certification body's complaints process

B.  

An explanation of the audit plan and its purpose

C.  

A disclaimer that the result of the audit is based on the sampling of evidence

D.  

Names of auditees associated with nonconformities

Discussion 0
Questions 3

A decent visitor is roaming around without visitor's ID. As an employee you should do the following, except:

Options:

A.  

Say "hi" and offer coffee

B.  

Call the receptionist and inform about the visitor

C.  

Greet and ask him what is his business

D.  

Escort him to his destination

Discussion 0
Questions 4

What is meant by the term 'Corrective Action'? Select one

Options:

A.  

Action is taken to prevent a nonconformity or an incident from occurring

B.  

Action is taken to eliminate the cause(s) of a nonconformity or an incident

C.  

Action is taken by management to respond to a nonconformity

D.  

Action is taken to fix a nonconformity or an incident

Discussion 0
Questions 5

The audit lifecycle describes the ISO 19011 process for conducting an individual audit. Drag and drop the steps of the audit lifecycle into the correct sequence.

Options:

Discussion 0
Questions 6

Which two of the following statements are true?

Options:

A.  

The benefits of implementing an ISMS primarily result from a reduction in information security risks

B.  

The benefit of certifying an ISMS is to obtain contracts from governmental institutions

C.  

The purpose of an ISMS is to apply a risk management process for preserving information security

D.  

The purpose of an ISMS is to demonstrate compliance with regulatory requirements

Discussion 0
Questions 7

You are carrying out your first third-party ISMS surveillance audit as an audit team leader. You are presently in the auditee's data centre with another member of your audit team and the organisation's guide.

You request access to a locked room protected by a combination lock and iris scanner. In the corner of the room is a collection of hard drives piled on a desk. You ask the guide what the status of

the drives is. He tells you the drives are redundant and awaiting disposal. They should have been picked up last week, but the organisation's external provider of secure destruction services was

unable to source a driver due to staff sickness. He says this has recently become more common though he does not know why. He then presents you with a job ticket that confirms the pickup has

been rescheduled for tomorrow.

Based on the scenario above which three of the following actions would you now take?

Options:

A.  

Record a nonconformity against control

A.  

5.13 'labelling of information' as the disk drives' status was unclear

B.  

Raise a nonconformity against control A.7.7, 'clear desk and clear screen' because the drives have been left unprotected on the desktop.

C.  

Record an opportunity for improvement in respect of the external provider's inventory management arrangements.

D.  

Ensure that the organisation's arrangements for the secure disposal and reuse of equipment have been adhered to.

E.  

Record the finding but note no further action is required as the pickup has now been rescheduled.

F.  

Raise a nonconformity against control A.7.5, 'protecting against physical and environmental threats' because the drives have been left exposed on the desktop.

G.  

Ensure that the organisation's arrangements for the life cycle management of storage media have been adhered to.

Discussion 0
Questions 8

Select the words that best complete the sentence:

"The purpose of maintaining regulatory compliance in a management system is to

To complete the sentence with the best word(s), click on the blank section you want to complete so that it is highlighted in red,

and then click on the applicable text from the options below. Alternatively, you may drag and drop the option to the appropriate blank section.

Options:

Discussion 0
Questions 9

You are performing an ISMS audit at a residential nursing home (ABC) that provides healthcare services. The next

step in your audit plan is to verify the information security of ABC's healthcare mobile app development, support,

and lifecycle process. During the audit, you learned the organization outsourced the mobile app development to a

professional software development company with CMMI Level 5, ITSM (ISO/IEC 20000-1), BCMS (ISO 22301) and

ISMS (ISO/IEC 27001) certified.

The IT Manager presented the software security management procedure and summarised the process as following:

The mobile app development shall adopt "security-by-design" and "security-by-default" principles, as a minimum.

The following security functions for personal data protection shall be available:

Access control.

Personal data encryption, i.e., Advanced Encryption Standard (AES) algorithm, key lengths: 256 bits; and

Personal data pseudonymization.

Vulnerability checked and no security backdoor

You sample the latest Mobile App Test report, details as follows:

The IT Manager explains the test results should be approved by him according to the software security management procedure. The reason why the encryption and pseudonymisation functions failed is that these functions heavily slowed down the system and service performance. An extra 150% of resources are needed to cover this. The Service Manager agreed that access control is good enough and acceptable. That's why the Service Manager signed the approval.

You are preparing the audit findings. Select the correct option.

Options:

A.  

There is a nonconformity (NC). The organisation and developer do not perform acceptance tests. (Relevant to clause 8.1, control

A.  

8.29)

B.  

There is a nonconformity (NC). The organisation and developer perform security tests that fail. (Relevant to clause 8.1, control A.8.29)

C.  

There is a nonconformity (NC). The Service Manager does not comply with the software security management procedure. (Relevant to clause 8.1, control A.8.30)

D.  

There is NO nonconformity (NC). The Service Manager makes a good decision to continue the service. (Relevant to clause 8.1, control A.8.30)

Discussion 0
Questions 10

You are performing an ISMS audit at a residential nursing home that provides healthcare services. The next step in your audit

plan is to verify the information security of the business continuity management process. During the audit, you learned that

the organisation activated one of the business continuity plans (BCPs) to make sure the nursing service continued during the

recent pandemic. You ask the Service Manager to explain how the organization manages information security during the

business continuity management process.

The Service Manager presented the nursing service continuity plan for a pandemic and summarised the process as follows:

Stop the admission of any NEW residents.

70% of administration staff and 30% of medical staff will work from home.

Regular staff self-testing, including submitting a negative test report 1 day BEFORE they come to the office.

Install ABC's healthcare mobile app, tracking their footprint and presenting a GREEN Health Status QR-Code for checking on the spot.

You ask the Service Manager how to prevent non-relevant family members or interested parties from accessing residents' personal data when staff work from home. The Service Manager cannot answer and suggests the IT Security Manager should help with that.

You would like to further investigate other areas to collect more audit evidence. Select three options that will not be in your audit trail.

Options:

A.  

Collect more evidence on how information security protocols are maintained during disruption (relevant to control

A.  

5.29)

B.  

Collect more evidence that staff only use IT equipment protected from malware when working from home (relevant to control A.8.7)

C.  

Collect more evidence by interviewing additional staff to ensure they are aware of the need to sometimes work from home (Relevant to clause 7.3)

D.  

Collect more evidence on how and when the Business Continuity Plan has been tested. (Relevant to control A.5.29)

E.  

Collect more evidence on how the organisation makes sure all staff periodically conduct a positive Covid test (Relevant to control A.7.2)

F.  

Collect more evidence on how the organisation manages information security on mobile devices and during teleworking (Relevant to control A.6.7)

G.  

Collect more evidence on how the organisation performs a business risk assessment to evaluate how fast the existing residents can be discharged from the nursing home. (Relevant to clause 6)

Discussion 0
Questions 11

Options:

Discussion 0
Questions 12

You are an experienced audit team leader conducting a third-party surveillance audit of an organisation that designs websites for its clients. You are currently reviewing the organisation's Statement of Applicability.

Based on the requirements of ISO/IEC 27001, which two of the following observations about the Statement of Applicability are false?

Options:

A.  

A Statement of Applicability must be produced by organisations seeking ISO/IEC 27001 conformity

B.  

Justification is only required for any controls that the organisations choses to exclude

C.  

Justification for both the inclusion and exclusion of Annex A controls in the Statement of Applicability is required

D.  

The Statement of Applicability is owned and amended by the organisation's top management

E.  

Additional controls not included in Appendix A may be added to the Statement of Applicability if the organisation choses to do so

F.  

The Statement of Applicability must include Organisational, Physical, People and Technological controls that are necessary

Discussion 0
Questions 13

You are the audit team leader conducting a third-party audit of an online insurance company. During Stage 1, you found that the organization took a very cautious risk approach and included all the information security controls in ISO/IEC 27001:2022 Appendix A in their Statement of Applicability.

During the Stage 2 audit, your audit team found that there was no evidence of a risk treatment plan for the implementation of the three controls (5.3 Segregation of duties, 6.1 Screening, 7.12 Cabling security). You raise a nonconformity against clause 6.1.3.e of ISO 27001:2022.

At the closing meeting, the Technical Director issues an extract from an amended Statement of Applicability (as shown) and asks for the nonconformity to be withdrawn.

Select three options of the correct responses of an audit team leader to the request of the Technical Director.

Options:

A.  

Advise management that the information provided will be reviewed when the auditors have more time.

B.  

Advise the Technical Director that his request will be included in the audit report.

C.  

Advise the Technical Director that once a nonconformity is raised it cannot be withdrawn.

D.  

Advise the Technical Director that the nonconformity must stand since the evidence obtained for it was clear.

E.  

Ask the auditor who raised the issue for their opinion on how you should respond to the request.

F.  

Inform the Technical Director that the nonconformity will be changed to an Opportunity for Improvement.

G.  

Review the documentation produced and withdraw the nonconformity.

Discussion 0
Questions 14

Select the words that best complete the sentence:

Options:

Discussion 0
Questions 15

In the context of a third-party certification audit, it is very important to have effective communication. Select an option that contains the correct answer about communication in an audit context.

Options:

A.  

During the audit, each auditor should periodically communicate any concerns to the auditee and audit client

B.  

During the audit, the responibility for communication rests with the audit team leader

C.  

The formal communication channels between the audit team and the auditee can be established during the opening meeting

D.  

There is no need to establish a formal communication arrangement because an auditee can communicate with the auditor at any time during the audit

Discussion 0
Questions 16

You are carrying out your first third-party ISMS surveillance audit as an Audit Team Leader. You are presently in

the auditee's data centre with another member of your audit team.

You are currently in a large room that is subdivided into several smaller rooms, each of which has a numeric

combination lock and swipe card reader on the door. You notice two external contractors using a swipe card and

combination number provided by the centre's reception desk to gain access to a client's suite to carry out authorised electrical repairs.

You go to reception and ask to see the door access record for the client's suite. This indicates only one card was

swiped. You ask the receptionist and they reply, "yes it's a common problem. We ask everyone to swipe their

cards but with contractors especially, one tends to swipe and the rest simply 'tailgate' their way in" but we know who they are from the reception sign-in.

Based on the scenario above which one of the following actions would you now take?

Options:

A.  

Raise an opportunity for improvement to have a large sign in reception reminding everyone requiring access must use their swipe card at all times

B.  

Determine whether any additional effective arrangements are in place to verify individual access to secure areas e.g. CCTV

C.  

Raise a nonconformity against control A.7.1 'security perimiters' as a secure area is not adequately protected

D.  

Raise a nonconformity against control A.7.6 'working in secure areas' as security measures for working in secure areas have not been defined

E.  

Raise a nonconformity against control A.5.20 'addressing information security in supplier relationships' as information security requirements have not been agreed upon with the supplier

F.  

Raise an opportunity for improvement that contractors must be accompanied at all times when accessing secure facilities

Discussion 0
Questions 17

You are an experienced ISMS auditor, currently providing support to an ISMS auditor in training who is carrying out her first initial certification audit. She asks you what she should be verifying when auditing an organisation's Information Security objectives. You ask her what she has included in her audit checklist and she provides the following replies.

Which three of these responses would you cause you concern in relation to conformity with ISO/IEC 27001:2022?

Options:

A.  

I am going to check how each Information Security objective has been communicated to those who need to be aware of it in order for the objective to be achieved

B.  

I am going to check that top management have determined the Information Security objectives for the current year. If not, I will check that this task has been programmed to be completed

C.  

I am going to check that the Information Security objectives are written down on paper so that everyone is clear on what needs to be achieved, how it will be achieved, and by when it will be achieved

D.  

I am going to check that there is a process in place to periodically revisit Information Security objectives, with a view to amending or cancelling them if circumstances necessitate this

E.  

I am going to check that a completion date has been set for each objective and that there are no objectives with missing 'achieve by' dates

F.  

I am going to check that the necessary budget, manpower and materials to achieve each objective has been determined

G.  

I am going to check that all the Information Security objectives are measurable. If they are not measurable the organisation will not be able to track progress against them

Discussion 0
Questions 18

Which one of the following options best describes the purpose of a Stage 2 audit?

Options:

A.  

To check for legal compliance by the organisation

B.  

To ensure that the audit plan is carried out

C.  

To evaluate the implementation of the management system

D.  

To get to know the organisation's processes

Discussion 0
Questions 19

After completing Stage 1 and in preparation for a Stage 2 initial certification audit, the auditee informs the audit team leader that they wish to extend the audit scope to include two additional sites that have recently been acquired by the organisation.

Considering this information, what action would you expect the audit team leader to take?

Options:

A.  

Arrange to complete a remote Stage 1 audit of the two sites using a video conferencing platform

B.  

Increase the length of the Stage 2 audit to include the extra sites

C.  

Inform the auditee that the audit team leader accepts the request

D.  

Obtain information about the additional sites to inform the individual(s) managing the audit programme

Discussion 0
Questions 20

Which two of the following standards are used as ISMS third-party certification audit criteria?

Options:

A.  

ISO/IEC 27002

B.  

ISO/IEC 20000-1

C.  

ISO 19011

D.  

ISO/IEC 27001

E.  

Relavent legal, statutory, and regulatory requirements

F.  

ISO/IEC 17021-1

Discussion 0
Questions 21

The audit team leader prepares the audit plan for an initial certification stage 2 audit to ISO/IEC 27001:2022.

Which one of the following statements is true?

Options:

A.  

The audit team leader should make sure the audit has the support of a Technical Expert

B.  

The audit team leader should appoint audit team members with IT experience

C.  

The audit team leader should plan to interview each employee within the scope

D.  

The organisation should review the audit plan for agreement

Discussion 0
Questions 22

Which two of the following phrases would apply to "act" in relation to the Plan-Do-Check-Act cycle for a business process?

Options:

A.  

Auditing processes

B.  

Planning changes

C.  

Measuring objectives

D.  

Resetting objectives

E.  

Achieving improvements

F.  

Verifying training

Discussion 0
Questions 23

A property of Information that has the ability to prove occurrence of a claimed event.

Options:

A.  

Electronic chain letters 

B.  

Integrity

C.  

Availability

D.  

Accessibility

Discussion 0
Questions 24

Select the words that best complete the sentence:

To complete the sentence with the best word(s), click on the blank section you want to complete so that it is highlighted in red, and then click on the applicable text from the options below. Alternatively, you may drag and drop the option to the appropriate blank section.

Options:

Discussion 0
Questions 25

Which two options are benefits of third-party accredited certification of information security management systems to ISO/IEC 27001:2022 for organisations and interested parties?

Options:

A.  

Third-party accredited certification demonstrates that the organisation complies with the legal and legislation requirements expected by interested parties

B.  

Third-party accredited certification demonstrates that the organisation's ICT products are secured and certified

C.  

Third-party accredited certification demonstrates that the organisation's management system is maintained and effective

D.  

Third-party accredited certification demonstrates the organisation's management system adopted a systematic approach to information security

E.  

Third-party accredited certification makes sure the organisation will obtain more customers

F.  

Third-party accredited certification makes sure the organisation's IT system will be protected from external interference

Discussion 0
Questions 26

You are an experienced ISMS audit team leader, talking to an Auditor in training who has been assigned to your audit team. You want to ensure that they understand the importance of the Check stage of the Plan-Do-Check-Act cycle in respect of the operation of the information security management system.

You do this by asking him to select the words that best complete the sentence:

To complete the sentence with the best word(s), click on the blank section you want to complete so that it is highlighted in red, and then click on the applicable text from the options below. Alternatively, you may drag and drop the option to the appropriate blank section.

Options:

Discussion 0
Questions 27

Which two of the following actions are the individual(s) managing the audit programme responsible for?

Options:

A.  

Determining the resources necessary for the audit programme

B.  

Communicating with the auditee during the audit

C.  

Determining the legal requirements applicable to each audit

D.  

Keping informed the accreditation body on the progress of the audit programme

E.  

Defining the objectives, scope and criteria for an individual audit

F.  

Defining the plan of an individual audit

Discussion 0
Questions 28

Which two of the following phrases are 'objectives' in relation to a first-party audit?

Options:

A.  

Apply international standards

B.  

Prepare the audit report for the certification body

C.  

Confirm the scope of the management system is accurate

D.  

Complete the audit on time

E.  

Apply Regulatory requirements

F.  

Update the management policy

Discussion 0
Questions 29

You are carrying out your first third-party ISMS surveillance audit as an Audit Team Leader. You are presently in the auditee's data centre with another member of your audit team.

You are currently in a large room that is subdivided into several smaller rooms, each of which has a numeric combination lock and swipe card reader on the door. You notice two external contractors using a swipe card and combination number provided by the centre's reception desk to gain access to a client's suite to carry out authorised electrical repairs.

You go to reception and ask to see the door access record for the client's suite. This indicates only one card was swiped. You ask the receptionist and they reply, "yes it's a common problem. We ask everyone to swipe their cards but with contractors especially, one tends to swipe and the rest simply 'tailgate' their way in" but we know who they are from the reception sign-in.

Based on the scenario above which one of the following actions would you now take?

Options:

A.  

Take no action. Irrespective of any recommendations, contractors will always act in this way

B.  

Raise a nonconformity against control A.5.20 'addressing information security in supplier relationships' as information security requirements have not been agreed upon with the supplier

C.  

Raise a nonconformity against control A.7.6 'working in secure areas' as security measures for working in secure areas have not been defined

D.  

Determine whether any additional effective arrangements are in place to verify individual access to secure areas e.g. CCTV

E.  

Raise an opportunity for improvement that contractors must be accompanied at all times when accessing secure facilities

F.  

Raise an opportunity for improvement to have a large sign in reception reminding everyone requiring access must use their swipe card at all times

G.  

Raise a nonconformity against control A.7.2 'physical entry' as a secure area is not adequately protected

Discussion 0
Questions 30

You are a certification body auditor, conducting a surveillance audit to ISO/IEC 27001:2022 of a data centre operated by a client who provides hosting services for ICT facilities.

You and your guide are currently in one of the private suites that the client rents out to customers. Access to each suite is controlled using a combination lock. CCTV is also installed in every suite.

Within each suite are three data cabinets in which the client can locate mission-critical servers and other items of networking equipment such as switches and routers.

You notice that whilst two of the cabinets in your suite are locked, the third is unlocked. You ask the guide why. They reply "This is because the client is currently swapping out a hard drive unit. Their technician is currently on a lunch break".

What three actions should you undertake next?

Options:

A.  

Do nothing, the room appears adequately protected so it is unlikely that a security incident has taken place.

B.  

Raise a nonconformity against control 5.16 'identity management' as it may not be possible to identify who left the cabinet unlocked.

C.  

Raise a nonconformity against control 7.2 'physical entry' as the area where the client's equipment is located is not protected.

D.  

Raise a nonconformity against control 7.4 'physical security monitoring' as the private suite is not being continuously monitored for unauthorised physical access.

E.  

Raise an opportunity for improvement suggesting cabinet doors are locked whenever clients leave their suites, even if they intend to return within a short time.

F.  

Review the CCTV records to ensure that only the client has accessed the cabinet since it was last confirmed as locked.

G.  

When the technician returns from lunch, reprimand them for leaving the cabinet open.

Discussion 0
Questions 31

Your organisation is currently seeking ISO/IEC27001:2022 certification. You have just qualified as an Internal ISMS auditor and the ICT Manager wants to use your newly acquired knowledge to assist him with the design of an information security incident management process.

He identifies the following stages in his planned process and asks you to confirm which order they should appear in.

Options:

Discussion 0
Questions 32

Which three of the following phrases are objectives' in relation to an audit?

Options:

A.  

International Standard

B.  

Identify opportunities for improvement

C.  

Confirm the scope of the management system

D.  

Management policy

E.  

Complete audit on time

F.  

Regulatory requirements

Discussion 0
Questions 33

You are an experienced ISMS audit team leader providing guidance to an auditor in training. She asks you why it is important to have specific criteria relating to the grading of nonconformities.

Which one of the following responses is correct?

Options:

A.  

Because grading criteria provide a common basis for the evaluation of nonconformities across the organization

B.  

Because ISO/IEC 27001:2022 requires it

C.  

Because the establishment and implementation of grading criteria demonstrate a high level of commitment to the corrective action process

D.  

Because grading criteria will ensure that all auditors score nonconformities in exactly the same way

Discussion 0
Questions 34

You are an experienced ISMS audit team leader guiding an auditor in training. You decide to test her knowledge of follow-up audits by asking her a series of questions. Here are your questions and her answers.

Which four of your questions has she answered correctly?

Options:

A.  

Q: Should a follow-up audit seek to identify new nonconformities? A:YES

B.  

Q: Should follow-up audits seek to ensure nonconformities have been effectively addressed? A:YES

C.  

Q: Should follow-up audits consider agreed opportunities for improvement as well as corrective action? A:No

D.  

Q: Is the purpose of a follow-up audit to verify the completion of corrections, corrective actions, and opportunities for improvement? A:YES

E.  

Q: Are follow-up audits required for all audits? A:No

F.  

Q: Should the outcome from a follow-up audit be reported to the audit team leader who carried out the audit at which the NCs were originally identified? A:YES

G.  

Q: Should the outcome from a follow-up audit be reported to the audit client? A:No

Discussion 0
Questions 35

-------------------------is an asset like other important business assets has value to an organization and consequently needs to be protected.

Options:

A.  

Infrastructure

B.  

Data

C.  

Information

D.  

Security

Discussion 0
Questions 36

You are an experienced ISMS audit team leader, assisting an auditor in training to write their first audit report.

You want to check the auditor in training's understanding of terminology relating to the contents of an audit report and chose to do this by presenting the following examples.

For each example, you ask the auditor in training what the correct term is that describes the activity

Match the activity to the description.

Options:

Discussion 0
Questions 37

You are an audit team leader who has just completed a third-party audit of a mobile telecommunication provider. You are preparing your audit report and are just about to complete a section headed 'confidentiality'.

An auditor in training on your team asks you if there are any circumstances under which the confidential report can be released to third parties.

Which four of the following responses are false?

Options:

A.  

Although we advise the client the report is confidential we can decide to release it to third parties if we feel this is justified. We would always tell the client afterwards

B.  

The report can be released to third parties but only with the explicit, prior approval of the audit client

C.  

There are no circumstances under which the report can be released to a third party. Confidential means confidential and releasing the document would be a breach of trust

D.  

The starting position is always that third parties have no automatic right to access an audit report

E.  

If the third party has gained a legal notice for us to disclose the report then we must do so. In all such cases we would advise the audit client and, as appropriate, the auditee

F.  

Any auditor employed by the auditing organisation can access the audit report

G.  

Our duty of confidentiality is not something that lasts forever. As a certification body, we can decide how long we wish to keep reports confidential. After this, they can be accessed by third parties making a subject access request

Discussion 0
Questions 38

The data centre at which you work is currently seeking ISO/IEC27001:2022 certification. In preparation for your initial certification visit, several internal audits have been carried out by a colleague working at another data centre within your Group. They secured their own ISO/IEC 27001:2022 certificate earlier in the year.

You have just qualified as an Internal ISMS auditor and your manager has asked you to review the audit process and audit findings as a final check before the external Certification Body arrives.

Which four of the following would cause you concern in respect of conformity to ISO/IEC 27001:2022 requirements?

Options:

A.  

Although the scope for each internal audit has been defined, there are no audit criteria defined for the audits carried out to date.

B.  

Audit reports are not held in hardcopy (i.e. on paper). They are only stored as *. PDF documents on the organisation's intranet.

C.  

The audit process states the results of audits will be made available to 'relevant' managers, not top management.

D.  

The audit programme does not reference audit methods or audit responsibilities.

E.  

The audit programme does not take into account the relative importance of information security processes.

F.  

The audit programme does not take into account the results of previous audits.

G.  

The audit programme has not been signed as 'approved by Top Management.

Discussion 0
Questions 39

You see a blue color sticker on certain physical assets. What does this signify?

Options:

A.  

The asset is very high critical and its failure affects the entire organization

B.  

The asset with blue stickers should be kept air conditioned at all times

C.  

The asset is high critical and its failure will affect a group/s/project's work in the organization

D.  

The asset is critical and the impact is restricted to an employee only

Discussion 0
Questions 40

Select two of the following options that are the responsibility of a legal technical expert on the audit team during a certification audit.

Options:

A.  

Evaluating the auditee's legal knowledge

B.  

Criticising the organisation's legal compliance issues

C.  

Debating complex legal points with the auditee

D.  

Advising on legal checkpoints for the audit team

E.  

Verifying the legal status of the organisation

F.  

Meeting the organisation's legal representative

Discussion 0
Questions 41

You are an experienced ISMS auditor conducting a third-party surveillance audit at an organisation which offers ICT reclamation services. ICT equipment which companies no longer require is processed by the organisation. It Is either recommissioned and reused or is securely destroyed.

You notice two servers on a bench in the corner of the room. Both have stickers on item with the server's name, IP address and admin password. You ask the ICT Manager about them, and he tells you they were part of a shipment received yesterday from a regular customer.

Which one action should you take?

Options:

A.  

Ask the ICT Manager to record an information security incident and initiate the information security incident management process

B.  

Note the audit finding and check the process for dealing with incoming shipments relating to customer IT security

C.  

Record what you have seen in your audit findings, but take no further action

D.  

Raise a nonconformity against control 5.31 Legal, staturary, regulatory and contractual requirements'

E.  

Raise a nonconformity against control 8.20 'network security’ (networks and network devices shall be secured, managed and controlled to protect information in systems and applications)

F.  

Ask the auditee to remove the labels, then carry on with the audit

Discussion 0
Questions 42

You are conducting a third-party surveillance audit when another member of the audit team approaches you seeking clarification. They have been asked to assess the organisation's application of control 5.7 - Threat Intelligence. They are aware that this is one of the new controls introduced in the 2022 edition of ISO/IEC 27001, and they want to make sure they audit the control correctly.

They have prepared a checklist to assist them with their audit and want you to confirm that their planned activities are aligned with the control's requirements.

Which three of the following options represent valid audit trails?

Options:

A.  

I will ensure that the task of producing threat intelligence is assigned to the organisation's internal audit team

B.  

I will ensure that the organisation's risk assessment process begins with effective threat intelligence

C.  

I will speak to top management to make sure all staff are aware of the importance of reporting threats

D.  

I will ensure that appropriate measures have been introduced to inform top management as to the effectiveness of current threat intelligence arrangements

E.  

I will check that the organisation has a fully documented threat intelligence process

F.  

I will check that threat intelligence is actively used to protect the confidentiality, integrity and availability of the organisation's information assets

G.  

I will review how information relating to information security threats is collected and evaluated to produce threat intelligence

Discussion 0
Questions 43

After completing Stage 1 and in preparation for a Stage 2 initial certification audit, the auditee informs the audit team leader that they wish to extend the audit scope to include two additional sites that have recently been acquired by the organisation.

Considering this information, what action would you expect the audit team leader to take?

Options:

A.  

Increase the length of the Stage 2 audit to include the extra sites

B.  

Obtain information about the additional sites to inform the certification body

C.  

Arrange to complete a remote Stage 1 audit of the two sites using a video conferencing platform

D.  

Inform the auditee that the request can be accepted but a full Stage 1 audit must be repeated

Discussion 0
Questions 44

You are performing an ISO 27001 ISMS surveillance audit at a residential nursing home, ABC Healthcare Services. ABC uses a healthcare mobile app designed and maintained by a supplier, WeCare, to monitor residents' well-being. During the audit, you learn that 90% of the residents' family members regularly receive medical device advertisements from WeCare, by email and SMS once a week. The service agreement between ABC and WeCare prohibits the supplier from using residents' personal data. ABC has received many complaints from residents and their family members.

The Service Manager says that the complaints were investigated as an information security incident which found that they were justified.

Corrective actions have been planned and implemented according to the nonconformity and corrective action management procedure.

You write a nonconformity "ABC failed to comply with information security control A.5.34 (Privacy and protection of PII) relating to the personal data of residents' and their family members. A supplier, WeCare, used residents' personal information to send advertisements to family members."

Select three options of the corrections and corrective actions listed that you would expect ABC to make in response to the nonconformity.

Options:

A.  

ABC asks an ISMS consultant to test the ABC Healthcare mobile app for protection against cyber-crime.

B.  

ABC cancels the service agreement with WeCare.

C.  

ABC confirms that information security control A.5.34 is contained in the Statement of Applicability (SoA).

D.  

ABC discontinues the use of the ABC Healthcare mobile app.

E.  

ABC introduces background checks on information security performance for all suppliers.

F.  

ABC periodically monitors compliance with all applicable legislation and contractual requirements involving third parties.

G.  

ABC takes legal action against WeCare for breach of contract.

Discussion 0
Questions 45

Select the words that best complete the sentence below to describe audit resources:

Options:

Discussion 0
Questions 46

You are conducting an ISMS audit in the despatch department of an international logistics organisation that provides shipping services to large organisations including local hospitals and government offices. Parcels typically contain pharmaceutical products, biological samples, and documents such as passports and driving licences. You note that the company records show a very large number of returned items with causes including misaddressed labels and, in 15% of cases, two or more labels for different addresses for the one package. You are interviewing the Shipping Manager (SM).

You: Are items checked before being dispatched?

SM: Any obviously damaged items are removed by the duty staff before being dispatched, but the small profit margin makes it uneconomic to implement a formal checking process.

You: What action is taken when items are returned?

SM: Most of these contracts are relatively low value, therefore it has been decided that it is easier and more convenient to simply reprint the label and re-send individual parcels than it is to implement an investigation.

You raise a nonconformity against ISO 27001:2022 based on the lack of control of the labelling process.

At the closing meeting, the Shipping Manager issues an apology to you that his comments may have been misunderstood. He says that he did not realise that there is a background IT process that automatically checks that the right label goes onto the right parcel otherwise the parcel is ejected at labelling. He asks that you withdraw your nonconformity.

Select three options of the correct responses that you as the audit team leader would make to the request of the Shipping Manager.

Options:

A.  

Advise the Shipping Manager that his request will be included in the audit report

B.  

Advise management that the new information provided will be discussed when the auditors have more time

C.  

Inform the Shipping Manager that the nonconformity is minor and should be quickly corrected

D.  

Ask the audit team members to state what they think should happen

E.  

Inform him of your understanding and withdraw the nonconformity

F.  

Thank the Shipping Manager for his honesty but advise that withdrawing the nonconformity is not the right way to proceed

G.  

Advise the Shipping Manager that the nonconformity must stand since the evidence obtained for it was dear

Discussion 0
Questions 47

Match the correct responsibility with each participant of a second-party audit:

Options:

Discussion 0
Questions 48

An organisation is looking for management system initial certification. Please identify the sequence of the activities to be undertaken by the organisation.

To complete the sequence click on the blank section you want to complete so that it is highlighted in red, and then click on the applicable text from the options below. Alternatively, you may drag and drop the options to the appropriate blank section.

Options:

Discussion 0
Questions 49

You are performing an ISMS audit at a residential nursing home that provides healthcare services. The next step in your audit plan is to verify the information security incident management process. The IT Security Manager presents the information

security incident management procedure (Document reference ID: ISMS_L2_16, version 4) and explains that the process is

based on ISO/IEC 27035-1:2016.

You review the document and notice a statement "any information security weakness, event, and incident should be reported

to the Point of Contact (PoC) within 1 hour after identification". When interviewing staff, you found that there were differences

in the understanding of the meaning of "weakness, event, and incident".

The IT Security Manager explained that an online "information security handling" training seminar was conducted 6 months

ago. All of the interviewed persons participated in and passed the reporting exercise and course assessment.

You are preparing the audit findings. Select two options that are correct.

Options:

A.  

There is a nonconformity (NC). The information security incident training has failed. This is not conforming with clause 7.2 and control

A.  

6.3.

B.  

There is a nonconformity (NC). The terminology of the the incident management reporting process is unclear as evidenced by staff misunderstanding of the meaning of "weakness, event and incident". This is not conforming with clause 9.1 and control A.5.24.

C.  

There is an opportunity for improvement (OFI). The information security incident training effectiveness can be improved. This is relevant to clause 7.2 and control A.6.3.

D.  

There is an opportunity for improvement (OFI). The information security weaknesses, events, and incidents are reported. This is relevant to clause 9.1 and control A.5.24.

E.  

There is no nonconformance. The information security handling training has been effective. This conforms with clause 7.2 and control A.6.3.

F.  

There is no nonconformance. The information security weaknesses, events, and incidents are reported. This conforms with clause 9.1 and control A.5.24.

Discussion 0
Questions 50

Select a word from the following options that best completes the sentence:

To complete the sentence with the word(s) click on the blank section you want to complete so that it is highlighted in red, and then click on the application text from the options below. Alternatively, you may drag and drop the option to the appropriate blank section.

Options:

Discussion 0
Questions 51

Select the words that best complete the sentence:

To complete the sentence with the word(s) click on the blank section you want to complete so that it is highlighted in red, and then click on the application text from the options below. Alternatively, you may drag and drop the option to the appropriate blank section.

Options:

Discussion 0
Questions 52

An organisation has ISO/IEC 27001 Information Security Management System (ISMS) certification from a third-party certification body. Which one of the following represents an advantage of having accredited certification?

Options:

A.  

An increase in the marketing price of the organisation's products

B.  

An increase in the number of clients

C.  

Clarity of the audit report

D.  

Recognition of the credibility of the certification process.

Discussion 0
Questions 53

You are performing an ISMS audit at a residential nursing home that provides healthcare services. The next step in your audit plan is to verify the information security of the business continuity management process. During the audit, you learned that the organisation activated one of the business continuity plans (BCPs) to make sure the nursing service continued during the recent pandemic. You ask Service Manager to explain how the organisation manages information security during the business continuity management process.

The Service Manager presents the nursing service continuity plan for a pandemic and summarises the process as follows:

Stop the admission of any NEW residents.

70% of administration staff and 30% of medical staff will work from home.

Regular staff self-testing including submitting a negative test report 1 day BEFORE they come to the office.

Install ABC's healthcare mobile app, tracking their footprint and presenting a GREEN Health Status QR-Code for checking on the spot.

You ask the Service Manager how to prevent non-relevant family members or interested parties from accessing residents' personal data when staff work from home. The Service Manager cannot answer and suggests the n" Security Manager should help with that.

You would like to further investigate other areas to collect more audit evidence Select three options that will be in your audit trail.

Options:

A.  

Collect more evidence on how the organisation manages information security on mobile devices and during teleworking (Relevant to control

A.  

6.7)

B.  

Collect more evidence by interviewing more staff about their feeling about working from home. (Relevant to clause 4.2)

C.  

Collect more evidence on what resources the organisation provides to support the staff working from home. (Relevant to clause 7.1)

D.  

Collect more evidence on how the organisation performs a business risk assessment to evaluate how fast the existing residents can be discharged from the nursing home. (Relevant to clause 6)

E.  

Collect more evidence on how and when the Business Continuity Wan has been tested. (Relevant to control A.5.29)

F.  

Collect more evidence on how the organisation makes sure only staff with a negative test result can enter the organisation (Relevant to control A.7.2)

Discussion 0
Questions 54

You have a hard copy of a customer design document that you want to dispose off. What would you do

Options:

A.  

Throw it in any dustbin

B.  

Shred it using a shredder

C.  

Give it to the office boy to reuse it for other purposes

D.  

Be environment friendly and reuse it for writing

Discussion 0
Questions 55

Which two of the following statements are true?

Options:

A.  

The benefit of certifying an ISMS is to show the accreditation certificate on the website.

B.  

The purpose of an ISMS is to demonstrate awareness of information security issues by management.

C.  

The benefit of certifying an ISMS is to increase the number of customers.

D.  

The benefits of implementing an ISMS primarily result from a reduction in information security risks.

E.  

The purpose of an ISMS is to apply a risk management process for preserving information security.

F.  

The purpose of an ISMS is to demonstrate compliance with regulatory requirements.

Discussion 0
Questions 56

You are an experienced ISMS audit team leader guiding an auditor in training. Your team has just completed a third-party surveillance audit of a mobile telecom provider. The auditor in training asks you how you intend to prepare for the Closing meeting. Which four of the following are appropriate responses?

Options:

A.  

I will advise the auditee that the purpose of the closing meeting is for the audit team to communicate our findings. It is not an opportunity for the auditee to challenge the findings

B.  

I will instruct my audit team to wait outside the auditee's offices so we can leave as quickly as possible after the closing meeting. This saves our time and the client's time too

C.  

It is not necessary to prepare for the closing meeting. Once you have carried out as many audits as I have you already know what needs to be discussed

D.  

I will schedule a closing meeting with the auditee's representatives at which the audit conclusions will be presented

E.  

I will contact head office to ensure our invoice has been paid, If not, I will cancel the closing meeting and temporarily withhold the audit report

F.  

I will discuss any follow-up required with my audit team

G.  

I will review and, as appropriate, approve my teams audit conclusions

Discussion 0