PECB Certified ISO/IEC 27001 Lead Implementer v1.0

Page:    1 / 9   
Exam contains 135 questions

Which of the actions presented in scenario 4 is NOT compliant with the requirements of ISO/IEC 27001?

  • A. TradeB selected only ISO/IEC 27001 controls deemed applicable to the company
  • B. The Statement of Applicability was drafted before conducting the risk assessment
  • C. The external experts selected security controls and drafted the Statement of Applicability


Answer : B

What should TradeB do in order to deal with residual risks? Refer to scenario 4.

  • A. TradeB should evaluate, calculate, and document the value of risk reduction following risk treatment
  • B. TradeB should immediately implement new controls to treat all residual risks
  • C. TradeB should accept the residual risks only above the acceptance level


Answer : A

Scenario 5: Operaze is a small software development company that develops applications for various companies around the world. Recently, the company conducted a risk assessment to assess the information security risks that could arise from operating in a digital landscape. Using different testing methods, including penetration testing and code review, the company identified some issues in its ICT systems, including improper user permissions, misconfigured security settings, and insecure network configurations. To resolve these issues and enhance information security. Operaze decided to implement an information security management system (ISMS) based on ISO/IEC 27001.
Considering that Operaze is a small company, the entire IT team was involved in the ISMS implementation project. Initially, the company analyzed the business requirements and the internal and external environment, identified its key processes and activities, and identified and analyzed the interested parties. In addition, the top management of Operaze decided to include most of the company’s departments within the ISMS scope. The defined scope included the organizational and physical boundaries. The IT team drafted an information security policy and communicated it to all relevant interested parties. In addition, other specific policies were developed to elaborate on security issues and the roles and responsibilities were assigned to all interested parties.
Following that, the HR manager claimed that the paperwork created by ISMS does not justify its value and the implementation of the ISMS should be canceled. However, the top management determined that this claim was invalid and organized an awareness session to explain the benefits of the ISMS to all interested parties.
Operaze decided to migrate its physical servers to their virtual servers on third-party infrastructure. The new cloud computing solution brought additional changes to the company. Operaze’s top management, on the other hand, aimed to not only implement an effective ISMS but also ensure the smooth running of the ISMS operations. In this situation, Operaze’s top management concluded that the services of external experts were required to implement their information security strategies. The IT team, on the other hand, decided to initiate a change in the ISMS scope and implemented the required modifications to the processes of the company.
Based on the scenario above, answer the following question:
What led Operaze to implement the ISMS?

  • A. Identification of vulnerabilities
  • B. Identification of threats
  • C. Identification of assets


Answer : A

Based on scenario 5, after migrating to cloud, Operaze’s IT team changed the ISMS scope and implemented all the required modifications. Is this acceptable?

  • A. Yes, because the ISMS scope should be changed when there are changes to the external environment
  • B. No, because the company has already defined the ISMS scope
  • C. No, because any change in ISMS scope should be accepted by the management


Answer : A

Based on scenario 5, in which category of the interested parties does the HR manager of Operaze belong?

  • A. Positively influenced interested parties, because the ISMS will increase the effectiveness and efficiency of the HR Department
  • B. Negatively influenced interested parties, because the HR Department will deal with more documentation
  • C. Both A and B


Answer : C

Based on scenario 5, which committee should Operaze create to ensure the smooth running of the ISMS?

  • A. Information security committee
  • B. Management committee
  • C. Operational committee


Answer : A

What is the next step that Operaze’s ISMS implementation team should take after drafting the information security policy? Refer to scenario 5.

  • A. Implement the information security policy
  • B. Obtain top management's approval for the information security policy
  • C. Communicate the information security policy to all employees


Answer : B

An organization has adopted a new authentication method to ensure secure access to sensitive areas and facilities of the company. It requires every employee to use a two-factor authentication (password and QR code). This control has been documented, standardized, and communicated to all employees, however its use has been left to individual initiative, and it is likely that failures can be detected. Which level of maturity does this control refer to?

  • A. Optimized
  • B. Defined
  • C. Quantitatively managed


Answer : B

Which tool is used to identify, analyze, and manage interested parties?

  • A. The probability/impact matrix
  • B. The power/interest matrix
  • C. The likelihood/severity matrix


Answer : B

“The ISMS covers all departments within Company XYZ that have access to customers’ data. The purpose of the ISMS is to ensure the confidentiality, integrity, and availability of customers’ data, and ensure compliance with the applicable regulatory requirements regarding information security.” What does this statement describe?

  • A. The information systems boundary of the ISMS scope
  • B. The organizational boundaries of the ISMS scope
  • C. The physical boundary of the ISMS scope


Answer : B

An organization has justified the exclusion of control 5.18 Access rights of ISO/IEC 27001 in the Statement of Applicability (SoA) as follows: “An access control reader is already installed at the main entrance of the building.” Which statement is correct?

  • A. The justification for the exclusion of a control is not required to be included in the SoA
  • B. The justification is not acceptable, because it does not reflect the purpose of control 5.18
  • C. The justification is not acceptable because it does not indicate that it has been selected based on the risk assessment results


Answer : B

Which statement is an example of risk retention?

  • A. An organization has decided to release the software even though some minor bugs have not been fixed yet
  • B. An organization has implemented a data loss protection software
  • C. An organization terminates work in the construction site during a severe storm


Answer : A

Which option below should be addressed in an information security policy?

  • A. Actions to be performed after an information security incident
  • B. Legal and regulatory obligations imposed upon the organization
  • C. The complexity of information security processes and their interactions


Answer : B

Which approach should organizations use to implement an ISMS based on ISO/IEC 27001?

  • A. An approach that is suitable for organization’s scope
  • B. Any approach that enables the ISMS implementation within the 12 month period
  • C. Only the approach provided by the standard


Answer : A

What risk treatment option has Company A implemented if it has required from its employees the change of email passwords at least once every 60 days?

  • A. Risk modification
  • B. Risk avoidance
  • C. Risk retention


Answer : A

Page:    1 / 9   
Exam contains 135 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy