ISO-IEC-27001 Lead Implementor.pdf
Q: 1
Levo Corporation has implemented a demilitarized zone (DMZ) and virtual private network (VPN) to
secure its network. What controls did Levo Corporation implement in this case?
Options
Q: 2
An organization uses Platform as a Service (PaaS) to host its cloud-based services. As such, the cloud
provider manages the majority of the services provided to the organization. What does the
organization still need to manage when using PaaS?
Options
Q: 3
Scenario 1: NobleFind is an online retailer specializing in high-end, custom-design furniture. The
company offers a wide range of handcrafted pieces tailored to meet the needs of residential and
commercial clients. NobleFind also provides expert design consultation services. Despite NobleFind's
efforts to keep its online shop platform secure, the company faced persistent issues, including a
recent data breach. These ongoing challenges disrupted normal operations and underscored the
need for enhanced security measures. The designated IT team quickly responded to resolve the
problem, demonstrating their agility in handling technical challenges. To address these issues,
NobleFind decided to implement an Information Security Management System (ISMS) based on
ISO/IEC 27001 to improve security, protect customer data, and ensure the stability of its services.
In addition to its commitment to information security, NobleFind focuses on maintaining the
accuracy and completeness of its product dat
a. This is ensured by carefully managing version control, checking information regularly, enforcing
strict access policies, and implementing backup procedures. Product details and customer designs
are accessible only to authorized individuals, with security measures such as multi-factor
authentication and data access policies. NobleFind has implemented an incident investigation
process within its ISMS and established record retention policies. NobleFind maintains and
safeguards documented information, encompassing a wide range of data, records, and
specifications—ensuring the security and integrity of customer data, historical records, and financial
information.
Has NobleFind implemented any preventive controls? Refer to Scenario 1.
Options
Q: 4
Scenario 8: SunDee is a biopharmaceutical firm headquartered in California, US. Renowned for its
pioneering work in the field of human therapeutics, SunDee places a strong emphasis on addressing
critical healthcare concerns, particularly in the domains of cardiovascular diseases, oncology, bone
health, and inflammation. SunDee has demonstrated its commitment to data security and integrity
by maintaining an effective information security management system (ISMS) based on ISO/IEC 27001
for the past two years.
In preparation for the recertification audit, SunDee conducted an internal audit. The company's top
management appointed Alex, who has actively managed the Compliance Department's day-to-day
operations for the last six months, as the internal auditor. With this dual role assignment, Alex is
tasked with conducting an audit that ensures compliance and provides valuable recommendations to
improve operational efficiency.
During the internal audit, a few nonconformities were identified. To address them comprehensively,
the company created action plans for each nonconformity, working closely with the audit team
leader.
SunDee's senior management conducted a comprehensive review of the ISMS to evaluate its
appropriateness, sufficiency, and efficiency. This was integrated into their regular management
meetings. Essential documents, including audit reports, action plans, and review outcomes, were
distributed to all members before the meeting. The agenda covered the status of previous review
actions, changes affecting the ISMS, feedback, stakeholder inputs, and opportunities for
improvement. Decisions and actions targeting ISMS improvements were made, with a significant role
played by the ISMS coordinator and the internal audit team in preparing follow-up action plans,
which were then approved by top management.
In response to the review outcomes, SunDee promptly implemented corrective actions,
strengthening its information security measures. Additionally, dashboard tools were introduced to
provide a high-level overview of key performance indicators essential for monitoring the
organization's information security management. These indicators included metrics on security
incidents, their costs, system vulnerability tests, nonconformity detection, and resolution times,
facilitating effective recording, reporting, and tracking of monitoring activities. Furthermore, SunDee
embarked on a comprehensive measurement process to assess the progress and outcomes of
ongoing projects, implementing extensive measures across all processes. The top management
determined that the individual responsible for the information, aside from owning the data that
contributes to the measures, would also be designated accountable for executing these
measurement activities.
Based on the scenario above, answer the following question:
Did SunDee define the roles for measurement activities correctly?
Options
Q: 5
An organization has compared its actual performance against predetermined performance targets.
What is the primary purpose of this action?
Options
Q: 6
Scenario 10: ProEBank
ProEBank is an Austrian financial institution known for its comprehensive range of banking services.
Headquartered in Vienna, it leaverages the city's advanced technological and financial ecosystem To
enhance its security posture, ProEBank has implementied an information security management
system (ISMS) based on the ISO/IEC 27001. After a year of having the ISMS in place, the company
decided to apply for a certification audit to obtain certification against ISO/IEC 27001.
To prepare for the audit, the company first informed its employees for the audit and organized
training sessions to prepare them. It also prepared documented information in advance, so that the
documents would be ready when external auditors asked to review them Additionally, it determined
which of its employees have the knowledge to help the external auditors understand and evaluate
the processes.
During the planning phase for the audit, ProEBank reviewed the list of assigned auditors provided by
the certification body. Upon reviewing the list, ProEBank identified a potential conflict of interest
with one of the auditors, who had previously worked for ProEBank's mein competitor in the banking
industry To ensure the integrity of the audit process. ProEBank refused to undergo the audit until a
completely new audit team was assigned. In response, the certification body acknowledged the
conflict of interest and made the necessary adjustments to ensure the impartiality of the audit team
After the resolution of this issue, the audit team assessed whether the ISMS met both the standard's
requirements and the company's objectives. During this process, the audit team focused on
reviewing documented information.
Three weeks later, the team conducted an on-site visit to the auditee’s location where they aimed to
evaluate whether the ISMS conformed to the requirements of ISO/IEC 27001. was effectively
implemented, and enabled the auditee to reach its information security objectives. After the on-site
visit the team prepared the audit conclusions and notified the auditee that some minor
nonconformities had been detected The audit team leader then issued a recommendation for
certification.
After receiving the recommendation from the audit team leader, the certification body established a
committee to make the decision for certification. The committee included one member from the
audit team and two other experts working for the certification body.
After the Stage 2 audit, minor nonconformities were found. Despite this, the audit team leader
issued a positive recommendation for certification.
Is this acceptable?
Options
Q: 7
What action should an organization take to ensure the security of information when it is transferred
or treated by an external party?
Options
Q: 8
Scenario 6: Skyver manufactures electronic products, such as gaming consoles, flat-screen TVs,
computers, and printers. In order to ensure information security, the company has decided to
implement an information security management system (ISMS) based on ISO/IEC 27001.
Colin, the company's information security manager, decided to conduct a training and awareness
session for the company's staff about the information security risks and the controls implemented to
mitigate them. The session covered various topics, including Skyver's information security
approaches, techniques for mitigating phishing and malware, and a dedicated segment on securing
cloud infrastructure and services. This particular segment explored the shared responsibility model
and concepts such as identity and access management in the cloud. Colin organized the training and
awareness sessions through engaging presentations, interactive discussions, and practical
demonstrations to ensure that the personnel were well-informed by security principles and
practices.
One of the participants in the session was Lisa, who works in the HR Department. Although Colin
explained Skyver's information security policies and procedures in an honest and fair manner, she
found some of the issues being discussed too technical and did not fully understand the session.
Therefore, in many cases, she would request additional help from the trainer and her colleagues. In a
supportive manner, Colin suggested Lisa consider attending the session again.
Skyver has been exploring the implementation of AI solutions to help understand customer
preferences and provide personalized recommendations for electronic products. The aim was to
utilize AI technologies to enhance problem-solving capabilities and provide suggestions to
customers. This strategic initiative aligned with Skyver’s commitment to improving the customer
experience through data-driven insights.
Additionally, Skyver looked for a flexible cloud infrastructure that allows the company to host certain
services on internal and secure infrastructure and other services on external and scalable platforms
that can be accessed from anywhere. This setup would enable various deployment options and
enhance information security, crucial for Skyver's electronic product development.
According to Skyver, implementing additional controls in the ISMS implementation plan has been
successfully executed, and the company was ready to transition into operational mode. Skyver
assigned Colin the responsibility of determining the materiality of this change within the company.
Based on the scenario above, answer the following question:
As part of its strategic initiative to improve customer experiences, Skyver is exploring the
implementation of advanced AI solutions. Which type of AI is the company likely considering for this
purpose?
Options
Q: 9
Which of the following traits is NOT associated with an external audit?
Options
Q: 10
A tech company rapidly expanded its operations over the past few years. Its information system,
consisting of servers, databases, and communication tools, is a critical part of its daily operations.
However, due to rapid growth and increased data flow, the company is now facing a saturation of its
information system. This saturation has led to slower response times, increased downtime, and
difficulty in managing the overwhelming volume of dat
a. In which category does this threat fall into?
Options
Question 1 of 10