I don't see why the org's financials or the MS rep's background would matter for ISO 27001 audit planning. They don't impact scope or required evidence. So, C and E make sense here imo. Disagree?
I don't think it's A. Comparing license invoices with software inventory is pure numbers, so that's C (mathematical evidence). Analytical evidence would be more about interpreting patterns or trends, but Jack's just matching counts here. This kind of question trips people up sometimes!
I don't think it's C. Auditors just review the organization's processes, not the actual compliance status, so A and B fit best. C is a bit of a trap since auditors aren't certifying legal compliance directly, pretty sure about that.
Option B. since phishing is classified as a hacker/cracker attack in most ISO/IEC 27001 frameworks. Had something like this in a mock exam-a lot of questions want the "attack type" rather than legal or vulnerability angle. Pretty sure that's what they're after here. Someone let me know if they see it differently.
Probably B and C. Letting the Service Manager approve test results when it's not in line with the process is a classic nonconformity (B), and skipping proper change control for the emergency app update hits C dead on. I don't think D fits as much here, it's more an improvement point than a real NC. If someone thinks otherwise, chime in.
B stands out here since vehicular incidents relate to accidents or physical events, not intentional info sec attacks. The other options can be linked back to things like unauthorized access or exploiting vulnerabilities, which ISO 27001 recognizes as attack types. Pretty sure that's why B's correct, unless they're using another definition for "attack" in the question. Agree?
B makes the most sense since vehicular incidents aren't really considered info sec attacks, they're more like physical accidents. The others can be linked to security breaches or intentional acts. Pretty sure it's B here but open to other views.
Bit of a nitpick but if we read "human interaction" to include reviewing written responses, then A and B both fit. If they'd asked for verbal interaction only, B might be questionable. Pretty sure it's AB as per most exam practice, unless they're super strict about only live convo.
Actually, I don’t think A is right here. It’s B because "restricted" is for specific named individuals, while "confidential" can go to a whole authorized group. Seen this split in other ISO 27001 practice questions too and C is a bit of a trap since it suggests broader org access than confidential really allows. Let me know if anyone's seen different terminology on their course.