Question # 1 After conducting an external audit, the auditor decided that the internal auditor would follow-up on the implementation of corrective actions until the next surveillance audit. Is this acceptable? A. No, only the external auditor should follow up on the implementation of corrective actions after the completion of the auditB. Yes, the internal auditor may verify the implementation of corrective actions if it cannot be done by the external auditorC. Yes, the internal auditor may follow-up on the implementation of corrective actions until a verification from the external auditor during the surveillance audit
Click for Answer
C. Yes, the internal auditor may follow-up on the implementation of corrective actions until a verification from the external auditor during the surveillance audit
Answer Description Explanation:
Yes, it is acceptable for the internal auditor to follow-up on the implementation of corrective actions until verified by the external auditor during the next surveillance audit. This practice supports continuous improvement and ensures that corrective actions are effectively implemented and maintained over time.
References: PECB ISO/IEC 27001 Lead Auditor Course Material; ISO/IEC 27001:2013, Clause 9.2 (Internal audit)
Question # 2 The auditor used sampling to ensure that event logs recording information security events are maintained and regularly reviewed. Sampling was based on the audit objectives, whereas the sample selection process was based on the probability theory. What type of sampling was used? A. Statistical samplingB. Judgment-based samplingC. Systematic sampling
Click for Answer
A. Statistical sampling
Answer Description Explanation:
The use of probability theory in the sample selection process indicates that "statistical sampling" was used. Statistical sampling allows auditors to make inferences about the population based on the properties of the sample, relying on the principles of probability to select representative elements.
References: ISO 19011:2018, Guidelines for auditing management systems
Question # 3 During discussions with the individual(s) managing the audit programme of a certification body, the Management System Representative of the client organisation asks for a specific auditor for the certification audit. Select two of the following options for how the individual(s) managing the audit programme should respond. A. Advise the Management System Representative that his request can be acceptedB. Suggest that the Management System Representative chooses another certification bodyC. State that his request will be considered but may not be taken upD. Suggest asking the certification body management to permit the requestE. Advise the Management System Representative that the audit team selection is a decision that the audit programme manager needs to make based on the resources available
Click for Answer
C. State that his request will be considered but may not be taken upE. Advise the Management System Representative that the audit team selection is a decision that the audit programme manager needs to make based on the resources available
Answer Description Explanation:
According to ISO/IEC 17021-1, which specifies the requirements for bodies providing audit and certification of management systems, a certification body should ensure that its auditors are competent, impartial, and independent from the auditee organization2. Therefore, if a Management System Representative of a client organization asks for a specific auditor for the certification audit, the individual(s) managing the audit programme should respond in a way that does not compromise these principles or create any conflict of interest or undue influence2. Two possible ways to respond are to state that his request will be considered but may not be taken up, as there may be other factors that affect the auditor selection process; or to advise him that the audit team selection is a decision that the audit programme manager needs to make based on the resources available, such as auditor availability, competence, location, etc2. The other options are not suitable ways to respond in this situation. For example, advising him that his request can be accepted may raise doubts about the objectivity and credibility of the auditor and the certification body; suggesting that he chooses another certification body may imply that his request is unreasonable or unethical; and suggesting asking the certification body management to permit his request may suggest that there is room for negotiation or manipulation in auditor selection2. References: ISO/IEC 17021-1:2015 - Conformity assessment – Requirements for bodies providing audit and certification of management systems – Part 1: Requirements
Question # 4 You are conducting a third-party surveillance audit when another member of the audit team approaches you seeking clarification. They have been asked to assess the organisation's application of control 5.7 - Threat Intelligence. They are aware that this is one of the new controls introduced in the 2022 edition of ISO/IEC 27001, and they want to make sure they audit the control correctly.
They have prepared a checklist to assist them with their audit and want you to confirm that their planned activities are aligned with the control's requirements.
Which three of the following options represent valid audit trails? A. I will determine whether internal and external sources of information are used in the production of threat intelligenceB. I will ensure that the task of producing threat intelligence is assigned to the organisation's internal audit teamC. I will ensure that the organisation's risk assessment process begins with effective threat intelligenceD. I will check that the organisation has a fully documented threat intelligence processE. I will check that threat intelligence is actively used to protect the confidentiality, integrity and availability of the organisation's information assets
Click for Answer
A. I will determine whether internal and external sources of information are used in the production of threat intelligenceD. I will check that the organisation has a fully documented threat intelligence processE. I will check that threat intelligence is actively used to protect the confidentiality, integrity and availability of the organisation's information assets
Answer Description Explanation:
The options that represent valid audit trails for assessing the organisation's application of control 5.7 - Threat Intelligence, according to ISO/IEC 27001:2022, are:
Option A: I will determine whether internal and external sources of information are used in the production of threat intelligence. This is relevant because effective threat intelligence typically requires gathering information from multiple sources to be comprehensive.
Option D: I will check that the organisation has a fully documented threat intelligence process. Proper documentation is a core requirement in ISO standards to ensure processes are defined, implemented, and maintained consistently.
Option E: I will check that threat intelligence is actively used to protect the confidentiality, integrity, and availability of the organisation's information assets. This verifies that the output of threat intelligence is being used effectively within the organisation's information security practices.
Question # 5 Scenario 2: Knight is an electronics company from Northern California, US that develops video game consoles. Knight has more than 300 employees worldwide. On the
fifth anniversary of their establishment, they have decided to deliver the G-Console, a new generation video game console aimed for worldwide markets. G-Console is
considered to be the ultimate media machine of 2021 which will give the best gaming experience to players. The console pack will include a pair of VR headset, two
games, and other gifts.
Over the years, the company has developed a good reputation by showing integrity, honesty, and respect toward their customers. This good reputation is one of the
reasons why most passionate gamers aim to have Knight's G-console as soon as it is released in the market. Besides being a very customer-oriented company, Knight
also gained wide recognition within the gaming industry because of the developing quality. Their prices are a bit higher than the reasonable standards allow.
Nonetheless, that is not considered an issue for most loyal customers of Knight, as their quality is top-notch.
Being one of the top video game console developers in the world, Knight is also often the center of attention for malicious activities. The company has had an
operational ISMS for over a year. The ISMS scope includes all departments of Knight, except Finance and HR departments.
Recently, a number of Knight's files containing proprietary information were leaked by hackers. Knight's incident response team (IRT) immediately started to analyze
every part of the system and the details of the incident.
The IRT's first suspicion was that Knight's employees used weak passwords and consequently were easily cracked by hackers who gained unauthorized access to their
accounts. However, after carefully investigating the incident, the IRT determined that hackers accessed accounts by capturing the file transfer protocol (FTP) traffic.
FTP is a network protocol for transferring files between accounts. It uses clear text passwords for authentication.
Following the impact of this information security incident and with IRT's suggestion, Knight decided to replace the FTP with Secure Shell (SSH) protocol, so anyone
capturing the traffic can only see encrypted data.
Following these changes, Knight conducted a risk assessment to verify that the implementation of controls had minimized the risk of similar incidents. The results of
the process were approved by the ISMS project manager who claimed that the level of risk after the implementation of new controls was in accordance with the
company's risk acceptance levels.
Based on this scenario, answer the following question:
FTP uses clear text passwords for authentication. This is an FTP: A. VulnerabilityB. RiskC. Threat
Click for Answer
A. Vulnerability
Answer Description Explanation:
The use of clear text passwords for authentication in FTP is a vulnerability because it is a weakness that can be exploited by threat actors. Clear text passwords can be intercepted easily by network sniffers or through man-in-the-middle attacks, making them a significant security risk1. References: = This explanation is consistent with the understanding of vulnerabilities within the field of information security, particularly as it relates to network protocols like FTP and their associated risks
Question # 6 Which one of the following conclusions in the audit report is not required by the certification body when deciding to grant certification? A. The corrections taken by the organisation related to major nonconformities have been accepted.B. The organisation fully complies with all legal and other requirements applicable to the Information Security Management System.C. The plans to address corrective actions related to minor nonconformities have been acceptedD. The scope of certification has been fulfilled
Answer Description Explanation:
The conclusion in the audit report that is not required by the certification body when deciding to grant certification is that the organisation fully complies with all legal and other requirements applicable to the ISMS. This is because the certification body does not have the authority or the responsibility to verify the legal compliance of the organisation, as this is outside the scope of ISO/IEC 27001:2022. The certification body only evaluates the conformity of the organisation’s ISMS with the requirements of the standard, which include the establishment of a process to identify and evaluate the legal and other requirements that are relevant to the ISMS. The organisation is responsible for ensuring its own legal compliance and for providing evidence of such compliance to the certification body if requested. References: = ISO/IEC 27001:2022, clause 6.1.3; ISO/IEC 27006:2022, clause 9.2.2.4; PECB Candidate Handbook ISO 27001 Lead Auditor, page 29.
Question # 7 Scenario 8: EsBank provides banking and financial solutions to the Estonian banking sector since September 2010. The company has a network of 30 branches with over 100 ATMs across the country.
Operating in a highly regulated industry, EsBank must comply with many laws and regulations regarding the security and privacy of data. They need to manage information security across their operations by implementing technical and nontechnical controls. EsBank decided to implement an ISMS based on ISO/IEC 27001 because it provided better security, more risk control, and compliance with key requirements of laws and regulations.
Nine months after the successful implementation of the ISMS, EsBank decided to pursue certification of their ISMS by an independent certification body against ISO/IEC 27001 .The certification audit included all of EsBank’s systems, processes, and technologies.
The stage 1 and stage 2 audits were conducted jointly and several nonconformities were detected. The first nonconformity was related to EsBank’s labeling of information. The company had an information classification scheme but there was no information labeling procedure. As a result, documents requiring the same level of protection would be labeled differently (sometimes as confidential, other times sensitive).
Considering that all the documents were also stored electronically, the nonconformity also impacted media handling. The audit team used sampling and concluded that 50 of 200 removable media stored sensitive information mistakenly classified as confidential. According to the information classification scheme, confidential information is allowed to be stored in removable media, whereas storing sensitive information is strictly prohibited. This marked the other nonconformity.
They drafted the nonconformity report and discussed the audit conclusions with EsBank’s representatives, who agreed to submit an action plan for the detected nonconformities within two months.
EsBank accepted the audit team leader's proposed solution. They resolved the nonconformities by drafting a procedure for information labeling based on the classification scheme for both physical and electronic formats. The removable media procedure was also updated based on this procedure.
Two weeks after the audit completion, EsBank submitted a general action plan. There, they addressed the detected nonconformities and the corrective actions taken, but did not include any details on systems, controls, or operations impacted. The audit team evaluated the action plan and concluded that it would resolve the nonconformities. Yet, EsBank received an unfavorable recommendation for certification.
Based on the scenario above, answer the following question:
According to scenario 8, the audit team evaluated the action plan and concluded that it would resolve the detected nonconformities. Is this acceptable? A. Yes. the audit team must evaluate the action plan and verify if it is appropriate for correcting the detected nonconformitiesB. Yes, only if EsBank has previously verified the effectiveness of the action plan and informed the audit team that the action plan allows the correction of nonconformitiesC. No, the auditee should verify if the action plan allows the correction of nonconformities and elimination of the root causes
Click for Answer
A. Yes. the audit team must evaluate the action plan and verify if it is appropriate for correcting the detected nonconformities
Answer Description Explanation:
Yes, the audit team must evaluate the action plan and verify if it is appropriate for correcting the detected nonconformities. This is part of the auditor's responsibilities to ensure that the proposed actions adequately address the issues identified during the audit.
Question # 8 You are carrying out a third-party surveillance audit of a client's ISMS. You are currently in the secure storage area of the data centre where the organisation's customers are able to temporarily locate equipment coming into or going out of the site. The equipment is contained within locked cabinets and each cabinet is allocated to a single, specific client.
Out of the corner of your eye you spot movement near the external door of the storage area. This is followed by a loud noise. You ask the guide what is going on. They tell you that recent high rainfall has raised local river levels and caused an infestation of rats. The noise was a specialist pest control stunning device being triggered. You check the device in the corner and find there is a large immobile rat contained within it.
What three actions would be appropriate to take next? A. Take no further action. This is an ISMS audit, not an environmental management system auditB. Investigate whether pest infestation is an identified risk and if so, what risk treatment is to be appliedC. Determine whether the high levels of rainfall have had other impacts on data centre operations e.g. damage to infrastructure, access issues for clients, invocation of business continuity arrangementsD. Raise a nonconformity against control 7.4 Physical Security monitoringE. Raise a nonconformity against control 7.2 Physical Entry
Click for Answer
B. Investigate whether pest infestation is an identified risk and if so, what risk treatment is to be appliedC. Determine whether the high levels of rainfall have had other impacts on data centre operations e.g. damage to infrastructure, access issues for clients, invocation of business continuity arrangements
Answer Description Explanation:
The appropriate actions to take next are to investigate whether pest infestation is an identified risk and if so, what risk treatment is to be applied, to determine whether the high levels of rainfall have had other impacts on data centre operations, and to check with the guide that they intend to initiate the organisation’s information security incident process. These actions are relevant to the ISMS audit objectives and criteria, as they relate to the organisation’s risk assessment and treatment, security performance, and incident management processes. The other actions are either not within the scope of the ISMS audit, not required by the ISO/IEC 27001 standard, or not the responsibility of the auditor. References: PECB Candidate Handbook1, page 21-22; ISO/IEC 27001:2022 (en)2, clauses 6.1, 8.2, 9.1, and 10.2.
Up-to-Date
We always provide up-to-date ISO-IEC-27001-Lead-Auditor exam dumps to our clients. Keep checking website for updates and download.
Excellence
Quality and excellence of our PECB Certified ISO/IEC 27001 2022 Lead Auditor exam practice questions are above customers expectations. Contact live chat to know more.
Success
Your SUCCESS is assured with the ISO-IEC-27001-Lead-Auditor exam questions of passin1day.com. Just Buy, Prepare and PASS!
Quality
All our braindumps are verified with their correct answers. Download ISO 27001 Practice tests in a printable PDF format.
Basic
$80
Any 3 Exams of Your Choice
3 Exams PDF + Online Test Engine
Buy Now
Premium
$100
Any 4 Exams of Your Choice
4 Exams PDF + Online Test Engine
Buy Now
Gold
$125
Any 5 Exams of Your Choice
5 Exams PDF + Online Test Engine
Buy Now
Passin1Day has a big success story in last 12 years with a long list of satisfied customers.
We are UK based company, selling ISO-IEC-27001-Lead-Auditor practice test questions answers. We have a team of 34 people in Research, Writing, QA, Sales, Support and Marketing departments and helping people get success in their life.
We dont have a single unsatisfied PECB customer in this time. Our customers are our asset and precious to us more than their money.
ISO-IEC-27001-Lead-Auditor Dumps
We have recently updated PECB ISO-IEC-27001-Lead-Auditor dumps study guide. You can use our ISO 27001 braindumps and pass your exam in just 24 hours. Our PECB Certified ISO/IEC 27001 2022 Lead Auditor exam real exam contains latest questions. We are providing PECB ISO-IEC-27001-Lead-Auditor dumps with updates for 3 months. You can purchase in advance and start studying. Whenever PECB update PECB Certified ISO/IEC 27001 2022 Lead Auditor exam exam, we also update our file with new questions. Passin1day is here to provide real ISO-IEC-27001-Lead-Auditor exam questions to people who find it difficult to pass exam
ISO 27001 can advance your marketability and prove to be a key to differentiating you from those who have no certification and Passin1day is there to help you pass exam with ISO-IEC-27001-Lead-Auditor dumps. PECB Certifications demonstrate your competence and make your discerning employers recognize that PECB Certified ISO/IEC 27001 2022 Lead Auditor exam certified employees are more valuable to their organizations and customers. We have helped thousands of customers so far in achieving their goals. Our excellent comprehensive PECB exam dumps will enable you to pass your certification ISO 27001 exam in just a single try. Passin1day is offering ISO-IEC-27001-Lead-Auditor braindumps which are accurate and of high-quality verified by the IT professionals. Candidates can instantly download ISO 27001 dumps and access them at any device after purchase. Online PECB Certified ISO/IEC 27001 2022 Lead Auditor exam practice tests are planned and designed to prepare you completely for the real PECB exam condition. Free ISO-IEC-27001-Lead-Auditor dumps demos can be available on customer’s demand to check before placing an order.
What Our Customers Say
Jeff Brown
Thanks you so much passin1day.com team for all the help that you have provided me in my PECB exam. I will use your dumps for next certification as well.
Mareena Frederick
You guys are awesome. Even 1 day is too much. I prepared my exam in just 3 hours with your ISO-IEC-27001-Lead-Auditor exam dumps and passed it in first attempt :)
Ralph Donald
I am the fully satisfied customer of passin1day.com. I have passed my exam using your PECB Certified ISO/IEC 27001 2022 Lead Auditor exam braindumps in first attempt. You guys are the secret behind my success ;)
Lilly Solomon
I was so depressed when I get failed in my Cisco exam but thanks GOD you guys exist and helped me in passing my exams. I am nothing without you.