[UPDATED 2024] Read ISO-IEC-27001-Lead-Auditor Study Guide Cover to Cover as Literally [Q68-Q82]

[UPDATED 2024] Read ISO-IEC-27001-Lead-Auditor Study Guide Cover to Cover as Literally [Q68-Q82]

4/5 - (2 votes)

[UPDATED 2024] Read ISO-IEC-27001-Lead-Auditor Study Guide Cover to Cover as Literally

100% Real & Accurate ISO-IEC-27001-Lead-Auditor Questions and Answers with Free and Fast Updates

QUESTION 68
You are conducting an ISMS audit in the despatch department of an international logistics organisation that provides shipping services to large organisations including local hospitals and government offices. Parcels typically contain pharmaceutical products, biological samples, and documents such as passports and driving licences. You note that the company records show a very large number of returned items with causes including misaddressed labels and, in 15% of cases, two or more labels for different addresses for the one package. You are interviewing the Shipping Manager (SM).
You: Are items checked before being dispatched?
SM: Any obviously damaged items are removed by the duty staff before being dispatched, but the small profit margin makes it uneconomic to implement a formal checking process.
You: What action is taken when items are returned?
SM: Most of these contracts are relatively low value, therefore it has been decided that it is easier and more convenient to simply reprint the label and re-send individual parcels than it is to implement an investigation.
You raise a nonconformity. Referencing the scenario, which three of the following Annex A controls would you expect the auditee to have implemented when you conduct the follow-up audit?

 
 
 
 
 
 
 
 

QUESTION 69
In which order is an Information Security Management System set up?

 
 
 
 

QUESTION 70
You have just completed a scheduled information security audit of your organisation when the IT Manager approaches you and asks for your assistance in the revision of the company’s risk management process.
He is attempting to update the current documentation to make it easier for other managers to understand, however, it is clear from your discussion he is confusing several key terms.
You ask him to match each of the descriptions with the appropriate risk term. What should the correct answers be?

QUESTION 71
Which reliability aspect of information is compromised when a staff member denies having sent a message?

 
 
 
 

QUESTION 72
In acceptable use of Information Assets, which is the best practice?

 
 
 
 

QUESTION 73
We can leave laptops during weekdays or weekends in locked bins.

 
 

QUESTION 74
You are the audit team leader conducting a third-party audit of an online insurance company. During Stage 1, you found that the organization took a very cautious risk approach and included all the information security controls in ISO/IEC 27001:2022 Appendix A in their Statement of Applicability.
During the Stage 2 audit, your audit team found that there was no evidence of a risk treatment plan for the implementation of the three controls (5.3 Segregation of duties, 6.1 Screening, 7.12 Cabling security). You raise a nonconformity against clause 6.1.3.e of ISO 27001:2022.
At the closing meeting, the Technical Director issues an extract from an amended Statement of Applicability (as shown) and asks for the nonconformity to be withdrawn.

Select three options of the correct responses of an audit team leader to the request of the Technical Director.

 
 
 
 
 
 
 
 

QUESTION 75
You have a hard copy of a customer design document that you want to dispose off. What would you do

 
 
 
 

QUESTION 76
You are an ISMS audit team leader assigned by your certification body to carry out a follow-up audit of a Data Centre client.
According to ISO 19011:2018, the purpose of a follow-up audit is to verify which one of the following?

 
 
 
 

QUESTION 77
Which one of the following options best describes the main purpose of a Stage 1 third-party audit?

 
 
 
 
 
 

QUESTION 78
You are an experienced ISMS audit team leader providing instruction to an auditor in training. They are unclear in their understanding of risk processes and ask you to provide them with an example of each of the processes detailed below.
Match each of the descriptions provided to one of the following risk management processes.
To complete the table click on the blank section you want to complete so that it is highlighted in red, and then click on the applicable text from the options below. Alternatively, you may drag and drop each option to the appropriate blank section.

QUESTION 79
An employee caught temporarily storing an MP3 file in his workstation will not receive an IR.

 
 

QUESTION 80
Match the correct responsibility with each participant of a second-party audit:

QUESTION 81
You are performing an ISMS audit at a residential nursing home (ABC) that provides healthcare services. The next step in your audit plan is to verify the information security of ABC’s healthcare mobile app development, support, and lifecycle process. During the audit, you learned the organization outsourced the mobile app development to a professional software development company with CMMI Level 5, ITSM (ISO/IEC
20000-1), BCMS (ISO 22301) and ISMS (ISO/IEC 27001) certified.
The IT Manager presented the software security management procedure and summarised the process as following:
The mobile app development shall adopt “security-by-design” and “security-by-default” principles, as a minimum. The following security functions for personal data protection shall be available:
Access control.
Personal data encryption, i.e., Advanced Encryption Standard (AES) algorithm, key lengths: 256 bits; and Personal data pseudonymization.
Vulnerability checked and no security backdoor
You sample the latest Mobile App Test report, details as follows:

You ask the IT Manager why the organisation still uses the mobile app while personal data encryption and pseudonymization tests failed. Also, whether the Service Manager is authorised to approve the test.
The IT Manager explains the test results should be approved by him according to the software security management procedure.
The reason why the encryption and pseudonymisation functions failed is that these functions heavily slowed down the system and service performance. An extra 150% of resources are needed to cover this. The Service Manager agreed that access control is good enough and acceptable. That’s why the Service Manager signed the approval.
You are preparing the audit findings. Select the correct option.

 
 
 
 

QUESTION 82
You are an ISMS audit team leader preparing to chair a closing meeting following a third-party surveillance audit. You are drafting a closing meeting agenda setting out the topics you wish to discuss with your auditee.
Which one of the following would be appropriate for inclusion?

 
 
 
 

Reliable Study Materials for ISO-IEC-27001-Lead-Auditor Exam Success For Sure: https://www.trainingdump.com/PECB/ISO-IEC-27001-Lead-Auditor-practice-exam-dumps.html

Leave a Reply

Your email address will not be published. Required fields are marked *

Enter the text from the image below