Pre-Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 65pass65

ISO-IEC-27001-Lead-Auditor PECB Certified ISO/IEC 27001 2022 Lead Auditor exam is now Stable and With Pass Result | Test Your Knowledge for Free

Exams4sure Dumps

ISO-IEC-27001-Lead-Auditor Practice Questions

PECB Certified ISO/IEC 27001 2022 Lead Auditor exam

Last Update 4 days ago
Total Questions : 418

Dive into our fully updated and stable ISO-IEC-27001-Lead-Auditor practice test platform, featuring all the latest ISO 27001 exam questions added this week. Our preparation tool is more than just a PECB study aid; it's a strategic advantage.

Our free ISO 27001 practice questions crafted to reflect the domains and difficulty of the actual exam. The detailed rationales explain the 'why' behind each answer, reinforcing key concepts about ISO-IEC-27001-Lead-Auditor. Use this test to pinpoint which areas you need to focus your study on.

ISO-IEC-27001-Lead-Auditor PDF

ISO-IEC-27001-Lead-Auditor PDF (Printable)
$43.75
$124.99

ISO-IEC-27001-Lead-Auditor Testing Engine

ISO-IEC-27001-Lead-Auditor PDF (Printable)
$50.75
$144.99

ISO-IEC-27001-Lead-Auditor PDF + Testing Engine

ISO-IEC-27001-Lead-Auditor PDF (Printable)
$63.7
$181.99
Question # 31

Question

An organization requires all employees to undergo security awareness training every six months. The training covers topics such as recognizing phishing attacks, handling sensitive data, and reporting security incidents. After completing the training, employees must pass a short quiz to demonstrate their understanding.

What type of control does this activity represent?

Options:

A.  

Legal

B.  

Managerial

C.  

Administrative

Discussion 0
Question # 32

What is meant by the term 'Corrective Action'? Select one

Options:

A.  

Action is taken to prevent a nonconformity or an incident from occurring

B.  

Action is taken to eliminate the cause(s) of a nonconformity or an incident

C.  

Action is taken by management to respond to a nonconformity

D.  

Action is taken to fix a nonconformity or an incident

Discussion 0
Question # 33

You are conducting an ISMS audit in the despatch department of an international logistics organisation that provides shipping services to large organisations including local hospitals and government offices. Parcels typically contain pharmaceutical products, biological samples, and documents such as passports and driving licences. You note that the company records show a very large number of returned items with causes including mis-addressed labels and, in 15% of company cases, two or more labels for different addresses for the one package. You are interviewing the Shipping Manager (SM).

You: Are items checked before being dispatched?

SH: Any obviously damaged items are removed by the duty staff before being dispatched, but the small profit margin makes it uneconomic to implement a formal checking process.

You: What action is taken when items are returned?

SM: Most of these contracts are relatively low value, therefore it has been decided that it is easier and more convenient to simply reprint the label and re-send individual parcels than it is to implement an investigation.

You raise a nonconformity. Referencing the scenario, which six of the following Appendix A controls would you expect the auditee to have implemented when you conduct the follow-up audit?

Options:

A.  

5.11 Return of assets

B.  

8.12 Data leakage protection

C.  

5.3 Segregation of duties

D.  

6.3 Information security awareness, education, and training

E.  

7.10 Storage media

F.  

8.3 Information access restriction

G.  

5.6 Contact with special interest groups

Discussion 0
Question # 34

Scenario 9: Techmanic is a Belgian company founded in 1995 and currently operating in Brussels. It provides IT consultancy, software design, and hardware/software services, including deployment and maintenance. The company serves sectors like public services, finance, telecom, energy, healthcare, and education. As a customer-centered company, it prioritizes strong client relationships and leading security practices.

Techmanic has been ISO/IEC 27001 certified for a year and regards this certification with pride. During the certification audit, the auditor found some inconsistencies in its ISMS implementation. Since the observed situations did not affect the capability of its ISMS to achieve the intended results, Techmanic was certified after auditors followed up on the root cause analysis and corrective actions remotely During that year, the company added hosting to its list of services and requested to expand its certification scope to include that area The auditor in charge approved the request and notified Techmanic that the extension audit would be conducted during the surveillance audit

Techmanic underwent a surveillance audit to verify its iSMS's continued effectiveness and compliance with ISO/IEC 27001. The surveillance audit aimed to ensure that Techmanic’s security practices, including the recent addition of hosting services, aligned seamlessly with the rigorous requirements of the certification

The auditor strategically utilized the findings from previous surveillance audit reports in the recertification activity with the purpose of replacing the need for additional recertification audits, specifically in the IT consultancy sector. Recognizing the value of continual improvement and learning from past assessments. Techmanic implemented a practice of reviewing previous surveillance audit reports. This proactive approach not only facilitated identifying and resolving potential nonconformities but also aimed to streamline the recertification process in the IT consultancy sector.

During the surveillance audit, several nonconformities were found. The ISMS continued to fulfill the ISO/IEC 27001*s requirements, but Techmanic failed to resolve the nonconformities related to the hosting services, as reported by its internal auditor. In addition, the internal audit report had several inconsistencies, which questioned the independence of the internal auditor during the audit of hosting services. Based on this, the extension certification was not granted. As a result. Techmanic requested a transfer to another certification body. In the meantime, the company released a statement to its clients stating that the ISO/IEC 27001 certification covers the IT services, as well as the hosting services.

Based on the scenario above, answer the following question:

Question:

Is the internal auditor responsible for following up on action plans resulting from external audits?

Options:

A.  

No, the internal auditor should follow up on action plans submitted in response to nonconformities resulting only from internal audits

B.  

Yes, only if minor nonconformities have been detected during the external audit

C.  

Yes, the internal auditor should follow up on action plans submitted during internal and external audits

Discussion 0
Question # 35

In the context of a third-party certification audit, confidentiality is an issue in an audit programme. Select two options which correctly state the function of confidentiality in an audit

Options:

A.  

Auditors are forced by regulatory requirements to maintain confidentiality in an audit

B.  

Observers in an audit team cannot access any confidential information

C.  

Confidentiality is one of the principles of audit conduct

D.  

Auditors should obtain the auditee's permission before using a camera or recording equipment

E.  

Audit information can be used for improving personal competence by the auditor

F.  

As an auditor is always accompanied by a guide, there is no risk to the auditee's sensitive information

Discussion 0
Question # 36

Scenario 3: Rebuildy is a construction company located in Bangkok.. Thailand, that specializes in designing, building, and maintaining residential buildings. To ensure the security of sensitive project data and client information, Rebuildy decided to implement an ISMS based on ISO/IEC 27001. This included a comprehensive understanding of information security risks, a defined continual improvement approach, and robust business solutions.

The ISMS implementation outcomes are presented below

•Information security is achieved by applying a set of security controls and establishing policies, processes, and procedures.

•Security controls are implemented based on risk assessment and aim to eliminate or reduce risks to an acceptable level.

•All processes ensure the continual improvement of the ISMS based on the plan-do-check-act (PDCA) model.

•The information security policy is part of a security manual drafted based on best security practices Therefore, it is not a stand-alone document.

•Information security roles and responsibilities have been clearly stated in every employees job description

•Management reviews of the ISMS are conducted at planned intervals.

Rebuildy applied for certification after two midterm management reviews and one annual internal audit Before the certification audit one of Rebuildy’s former employees approached one of the audit team members to tell them that Rebuildy has several security problems that the company is trying to conceal. The former employee presented the documented evidence to the audit team member Electra, a key client of Rebuildy, also submitted evidence on the same issues, and the auditor determined to retain this evidence instead of the former employee's. The audit team member remained in contact with Electra until the audit was completed, discussing the nonconformities found during the audit. Electra provided additional evidence to support these findings.

At the beginning of the audit, the audit team interviewed the company’s top management They discussed, among other things, the top management's commitment to the ISMS implementation. The evidence obtained from these discussions was documented in written confirmation, which was used to determine Rebuildy’s conformity to several clauses of ISO/IEC 27001

The documented evidence obtained from Electra was attached to the audit report, along with the nonconformities report. Among others, the following nonconformities were detected:

•An instance of improper user access control settings was detected within the company's financial reporting system.

•A stand-alone information security policy has not been established. Instead, the company uses a security manual drafted based on best security practices.

After receiving these documents from the audit team, the team leader met Rebuildy’s top management to present the audit findings. The audit team reported the findings related to the financial reporting system and the lack of a stand-alone information security policy. The top management expressed dissatisfaction with the findings and suggested that the audit team leader's conduct was unprofessional, implying they might request a replacement. Under pressure, the audit team leader decided to cooperate with top management to downplay the significance of the detected nonconformities. Consequently, the audit team leader adjusted the report to present a more favorable view, thus misrepresenting the true extent of Rebuildy's compliance issues.

Based on the scenario above, answer the following question:

Question:

Did the audit team adhere to audit best practices regarding the situation with the financial reporting system?

Options:

A.  

Yes, as it is beyond the scope of the audit

B.  

No, the audit team should have contacted the certification body and reported the situation

C.  

No, the audit team should have withdrawn from the audit due to the illegal nature of the act

Discussion 0
Question # 37

During a follow-up audit, you notice that a nonconformity identified for completion before the follow-up audit is still outstanding.

Which four of the following actions should you take?

Options:

A.  

Report the failure to address the corrective action for the outstanding nonconformity to the organisation's top management

B.  

Immediately raise an nonconformity as the date for completion has been exceeded

C.  

If the delay is justified agree on a revised date for clearing the nonconformity with the auditee/audit client

D.  

Contact the individuals) managing the audit programme to seek their advice as to how to proceed

E.  

Decide whether the delay in addressing the nonconformity is justified

F.  

Cancel the follow-up audit and return when an assurance has been received that the nonconformity has been cleared

G.  

Note the nonconformity is still outstanding and follow audit trails to determine why

Discussion 0
Question # 38

Scenario 3: NightCore is a multinational technology company based in the United States that focuses on e-commerce, cloud computing, digital streaming, and artificial intelligence. After having an information security management system (ISMS) implemented for over 8 months, they contracted a certification body to conduct a third party audit in order to get certified against ISO/IEC 27001.

The certification body set up a team of seven auditors. Jack, the most experienced auditor, was assigned as the audit team leader. Over the years, he received many well known certifications, such as the ISO/IEC 27001 Lead Auditor, CISA, CISSP, and CISM.

Jack conducted thorough analyses on each phase of the ISMS audit, by studying and evaluating every information security requirement and control that was implemented by NightCore. During stage 2 audit. Jack detected several nonconformities. After comparing the number of purchased invoices for software licenses with the software inventory, Jack found out that the company has been using the illegal versions of a software for many computers. He decided to ask for an explanation from the top management about this nonconformity and see whether they were aware about this. His next step was to audit NightCore's IT Department. The top management assigned Tom, NightCore's system administrator, to act as a guide and accompany Jack and the audit team toward the inner workings of their system and their digital assets infrastructure.

While interviewing a member of the Department of Finance, the auditors discovered that the company had recently made some unusual large transactions to one of their consultants. After gathering all the necessary details regarding the transactions. Jack decided to directly interview the top management.

When discussing about the first nonconformity, the top management told Jack that they willingly decided to use a copied software over the original one since it was cheaper. Jack explained to the top management of NightCore that using illegal versions of software is against the requirements of ISO/IEC 27001 and the national laws and regulations. However, they seemed to be fine with it.

Several months after the audit, Jack sold some of NightCore's information that he collected during the audit for a huge amount of money to competitors of NightCore.

Based on this scenario, answer the following question:

Does ISO/IEC 27001 require organizations to comply with national laws and regulations?

Options:

A.  

Yes, but relevant legal and contractual requirements do not need to be explicitly identified

B.  

No, there is no clear indication in the standard as to whether the organization should comply with the national laws and regulations

C.  

Yes, complying with the applicable legislation is a requirement of ISO/IEC 27001

Discussion 0
Question # 39

A decent visitor is roaming around without visitor's I

D.  

As an employee you should do the following, except:

Options:

A.  

Say "hi" and offer coffee

B.  

Call the receptionist and inform about the visitor

C.  

Greet and ask him what is his business

D.  

Escort him to his destination

Discussion 0
Question # 40

An audit team leader is planning a follow-up audit after the completion of a third-party surveillance audit earlier in the year. They have decided they will verify the nonconformities that require corrections before they move on to consider corrective actions.

Based on the descriptions below, which four of the following are corrections for nonconformities identified at the surveillance?

Options:

A.  

A signature missing from a client's contract for the supply of data services was added

B.  

A software installation guide which had not been sent to the client along with their new system was posted out

C.  

An incorrectly dated purchase order for a new network switch was rectified

D.  

Data centre staff not carrying out backups in accordance with specified procedures were retrained

E.  

Hard drive HD302 which had been colour-coded green (available for use) instead of red (to be destroyed) was removed from the system

F.  

Scheduled management reviews, having been missed, were prioritised by the General Manager for holding on a specific date twice each following year

G.  

The documented process for product shipment, which did not reflect how this activity was conducted by the despatch team, was re-written and the team trained accordingly

Discussion 0
Get ISO-IEC-27001-Lead-Auditor dumps and pass your exam in 24 hours!

Free Exams Sample Questions