Pre-Summer Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: xmas50

PECB ISO-IEC-27001-Lead-Implementer - PECB Certified ISO/IEC 27001 : 2022 Lead Implementer exam

Page: 1 / 11
Total 346 questions

Which statement regarding organizational roles, responsibilities, and authorities is NOT correct?

A.

Top management is responsible for reporting on the performance of the ISMS and cannot assign this responsibility to someone else

B.

A project manager can have information security responsibilities as well

C.

Top management must assign the responsibility for ensuring that the ISMS conforms to ISO/IEC 27001

In addition to leading the new project involving sensitive client data, what is Sarah’s role within the company? Refer to scenario 6.

Scenario 6: CB Consulting iS a reputable firm based in Dublin, Ireland. providing Strategic business Solutions to diverse clients, With a dedicated team Of professionals, CB Consulting prides itself on its

commitment to excellence, integrity, and client satisfaction. CB Consulting started implementing an ISMS aligned with ISOflEC 27001 as part of its ongoing commitment to enhancing its information security

practices. Throughout this process, ensuring effective communication and adherence to establi Shed security protocols is essential.

Sarah, an employee at CB has been appointed as the head Of a new project focused on managing sensitive client data, Additionally, she is responsible for Overseeing activities during the response

phase of incident management, including regular reporting to the incident manager of the incident management team and keeping key stakeholders informed. Meanwhile, CB Consulting has reassigned Tom to

serve as the company ' s legal consultant.

CB Consulting has also reassigned Clare. formerly an IT security analyst, as their information security officer to oversee the implementation Of the ISMS and ensure compliance with ISO/IEC 27001. Clare ' s primary

responsibility iS to conduct regular risk assessments. identlfy potential vulnerabilities, and implement appropriate Security measures to mitigate risks effectively. Clare has established a procedure Stating that

information security risk assessments are conducted only when significant changes occur. playing a crucial role in strengthening the companys security posture and safeguarding against potential threats.

TO ensure it has a Competent workforce to meet information security Objectives, CB Consulting has implemented a process to and verify that all employees, including Sarah, Tom, and Clare, possess the

necessary competence based on their education. training, or experience. Where gaps were identified, the company has taken specific actions such as providing additional training and mentoring. Additionally, CB

Consulting retains documented information as evidence of the competencies requ.red and acquired.

CB Consulting has established a robust communication strategy aligned with industry standards to ensure secure and effective information exchange. It identified the requirements for communication on relevant

issues. First, the company designated specific toles. Such as a public relations officer for external communication and a Security officer for internal matters, to manage sensitive issues like data breaches. Then.

communication triggers, content. and recipients were carefully defined. with messages pre-approved by management where necessary. Lastly, dedicated channels were implemented to ensure the confidentiality

and integrity of transmitted information.

Based on the scenario above, answer the following question.

CB Consulting prioritizes transparent and Substantive communication practices to foster trust, enhance Stakeholder engagement, and reinforce its commitment to information security excellence. Which principle

of effective communication is emphasized by this approach?

Transparency

A.

CSIRT

B.

Incident coordinator

C.

Incident manager

Scenario 2: Beauty is a cosmetics company that has recently switched to an e-commerce model, leaving the traditional retail. The top management has decided to build their own custom platform in-house and outsource the payment process to an external provider operating online payments systems that support online money transfers.

Due to this transformation of the business model, a number of security controls were implemented based on the identified threats and vulnerabilities associated to critical assets. To protect customers ' information. Beauty ' s employees had to sign a confidentiality agreement. In addition, the company reviewed all user access rights so that only authorized personnel can have access to sensitive files and drafted a new segregation of duties chart.

However, the transition was difficult for the IT team, who had to deal with a security incident not long after transitioning to the e commerce model. After investigating the incident, the team concluded that due to the out-of-date anti-malware software, an attacker gamed access to their files and exposed customers ' information, including their names and home addresses.

The IT team decided to stop using the old anti-malware software and install a new one which would automatically remove malicious code in case of similar incidents. The new software was installed in every workstation within the company. After installing the new software, the team updated it with the latest malware definitions and enabled the automatic update feature to keep it up to date at all times. Additionally, they established an authentication process that requires a user identification and password when accessing sensitive information.

In addition, Beauty conducted a number of information security awareness sessions for the IT team and other employees that have access to confidential information in order to raise awareness on the importance of system and network security.

Based on the scenario above, answer the following question:

Based on scenario 2. which principle of information security was NOT compromised by the attack?

A.

Confidentiality

B.

integrity

C.

Availability

What is the first phase in the information security policy development life cycle?

A.

Policy construction

B.

Policy implementation

C.

Risk assessment

D.

Policy planning / Needs assessment

BotanéBloom transitioned to a digital-first business model. Initially, its new online store began processing credit card payments directly. To comply with a relevant security standard, the company reviewed requirements such as encrypting cardholder data, limiting access, and maintaining a secure network.

Based on Scenario 2, which framework did BotanéBloom follow to securely manage credit card payments through its online store?

A.

GDPR

B.

ISO/IEC 27701

C.

PCI DSS

Scenario 6: Skyver offers worldwide shipping of electronic products, including gaming consoles, flat-screen TVs. computers, and printers. In order to ensure information security, the company has decided to implement an information security management system (ISMS) based on the requirements of ISO/IEC 27001.

Colin, the company ' s best information security expert, decided to hold a training and awareness session for the personnel of the company regarding the information security challenges and other information security-related controls. The session included topics such as Skyver ' s information security approaches and techniques for mitigating phishing and malware.

One of the participants in the session is Lisa, who works in the HR Department. Although Colin explains the existing Skyver ' s information security policies and procedures in an honest and fair manner, she finds some of the issues being discussed too technical and does not fully understand the session. Therefore, in a lot of cases, she requests additional help from the trainer and her colleagues

Based on scenario 6. when should Colin deliver the next training and awareness session?

A.

After he ensures that the group of employees targeted have satisfied the organization ' s needs

B.

After he conducts a competence needs analysis and records the competence related issues

C.

After he determines the employees ' availability and motivation

According to ISO/IEC 27001 controls, why should the use of privileged utility programs be restricted and tightly controlled?

A.

To ensure that utility programs are compatible with existing system software

B.

To ensure that the use of utility programs does not harm system and application controls

C.

To enable the correlation and analysis of security-related events through utility programs

Question:

Which statement regarding organizational roles, responsibilities, and authorities is NOT correct?

A.

Top management is responsible for reporting on the performance of the ISMS and cannot assign this responsibility to someone else

B.

A project manager can have information security responsibilities as well

C.

Top management must assign the responsibility for ensuring that the ISMS conforms to ISO/IEC 27001

Which tool is used to identify, analyze, and manage interested parties?

A.

The probability/impact matrix

B.

The power/interest matrix

C.

The likelihood/severity matrix

Scenario 1: HealthGenic is a pediatric clinic that monitors the health and growth of individuals from infancy to early adulthood using a web-based medical software. The software is also used to schedule appointments, create customized medical reports, store patients ' data and medical history, and communicate with all the [^involved parties, including parents, other physicians, and the medical laboratory staff.

Last month, HealthGenic experienced a number of service interruptions due to the increased number of users accessing the software Another issue the company faced while using the software was the complicated user interface, which the untrained personnel found challenging to use.

The top management of HealthGenic immediately informed the company that had developed the software about the issue. The software company fixed the issue; however, in the process of doing so, it modified some files that comprised sensitive information related to HealthGenic ' s patients. The modifications that were made resulted in incomplete and incorrect medical reports and, more importantly, invaded the patients ' privacy.

Based on the scenario above, answer the following question:

According to scenario 1, which of the following controls implemented by Antiques is a detective and administrative control?

A.

Enable the automatic update feature of the new software

B.

Review of all user access rights

C.

Review of the information security policy