Labour Day Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: get65

Page: 1 / 5

ISO 27001 PECB Certified ISO/IEC 27001 Lead Implementer exam

PECB Certified ISO/IEC 27001 Lead Implementer exam

Last Update Apr 27, 2024
Total Questions : 80

To help you prepare for the ISO-IEC-27001-Lead-Implementer PECB exam, we are offering free ISO-IEC-27001-Lead-Implementer PECB exam questions. All you need to do is sign up, provide your details, and prepare with the free ISO-IEC-27001-Lead-Implementer practice questions. Once you have done that, you will have access to the entire pool of PECB Certified ISO/IEC 27001 Lead Implementer exam ISO-IEC-27001-Lead-Implementer test questions which will help you better prepare for the exam. Additionally, you can also find a range of PECB Certified ISO/IEC 27001 Lead Implementer exam resources online to help you better understand the topics covered on the exam, such as PECB Certified ISO/IEC 27001 Lead Implementer exam ISO-IEC-27001-Lead-Implementer video tutorials, blogs, study guides, and more. Additionally, you can also practice with realistic PECB ISO-IEC-27001-Lead-Implementer exam simulations and get feedback on your progress. Finally, you can also share your progress with friends and family and get encouragement and support from them.

Questions 4

Which tool is used to identify, analyze, and manage interested parties?

Options:

A.  

The probability/impact matrix

B.  

The power/interest matrix

C.  

The likelihood/severity matrix

Discussion 0
Vienna
I highly recommend them. They are offering exact questions that we need to prepare our exam.
Jensen (not set)
That's great. I think I'll give Cramkey a try next time I take a certification exam. Thanks for the recommendation!
Faye
Yayyyy. I passed my exam. I think all students give these dumps a try.
Emmeline (not set)
Definitely! I have no doubt new students will find them to be just as helpful as I did.
Alaya
Best Dumps among other dumps providers. I like it so much because of their authenticity.
Kaiden (not set)
That's great. I've used other dump providers in the past and they were often outdated or had incorrect information. This time I will try it.
Esmae
I highly recommend Cramkey Dumps to anyone preparing for the certification exam.
Mollie (not set)
Absolutely. They really make it easier to study and retain all the important information. I'm so glad I found Cramkey Dumps.
Aryan
Absolutely rocked! They are an excellent investment for anyone who wants to pass the exam on the first try. They save you time and effort by providing a comprehensive overview of the exam content, and they give you a competitive edge by giving you access to the latest information. So, I definitely recommend them to new students.
Jessie (not set)
did you use PDF or Engine? Which one is most useful?
Questions 5

Scenario 3: Socket Inc is a telecommunications company offering mainly wireless products and services. It uses MongoDB. a document model database that offers high availability, scalability, and flexibility.

Last month, Socket Inc. reported an information security incident. A group of hackers compromised its MongoDB database, because the database administrators did not change its default settings, leaving it without a password and publicly accessible.

Fortunately. Socket Inc. performed regular information backups in their MongoDB database, so no information was lost during the incident. In addition, a syslog server allowed Socket Inc. to centralize all logs in one server. The company found out that no persistent backdoor was placed and that the attack was not initiated from an employee inside the company by reviewing the event logs that record user faults and exceptions.

To prevent similar incidents in the future, Socket Inc. decided to use an access control system that grants access to authorized personnel only. The company also implemented a control in order to define and implement rules for the effective use of cryptography, including cryptographic key management, to protect the database from unauthorized access The implementation was based on all relevant agreements, legislation, and regulations, and the information classification scheme. To improve security and reduce the administrative efforts, network segregation using VPNs was proposed.

Lastly, Socket Inc. implemented a new system to maintain, collect, and analyze information related to information security threats, and integrate information security into project management.

Can Socket Inc. find out that no persistent backdoor was placed and that the attack was initiated from an employee inside the company by reviewing event logs that record user faults and exceptions? Refer to scenario 3.

Options:

A.  

Yes. Socket Inc. can find out that no persistent backdoor was placed by only reviewing user faults and exceptions logs

B.  

No, Socket Inc should also have reviewed event logs that record user activities

C.  

No, Socket Inc. should have reviewed all the logs on the syslog server

Discussion 0
Questions 6

Scenario 4: TradeB. a commercial bank that has just entered the market, accepts deposits from its clients and offers basic financial services and loans for investments. TradeB has decided to implement an information security management system (ISMS) based on ISO/IEC 27001 Having no experience of a management [^system implementation, TradeB's top management contracted two experts to direct and manage the ISMS implementation project.

First, the project team analyzed the 93 controls of ISO/IEC 27001 Annex A and listed only the security controls deemed applicable to the company and their objectives Based on this analysis, they drafted the Statement of Applicability. Afterward, they conducted a risk assessment, during which they identified assets, such as hardware, software, and networks, as well as threats and vulnerabilities, assessed potential consequences and likelihood, and determined the level of risks based on three nonnumerical categories (low, medium, and high). They evaluated the risks based on the risk evaluation criteria and decided to treat only the high risk category They also decided to focus primarily on the unauthorized use of administrator rights and system interruptions due to several hardware failures by establishing a new version of the access control policy, implementing controls to manage and control user access, and implementing a control for ICT readiness for business continuity

Lastly, they drafted a risk assessment report, in which they wrote that if after the implementation of these security controls the level of risk is below the acceptable level, the risks will be accepted

Based on scenario 4, what type of assets were identified during risk assessment?

Options:

A.  

Supporting assets

B.  

Primary assets

C.  

Business assets

Discussion 0
Questions 7

Scenario 3: Socket Inc is a telecommunications company offering mainly wireless products and services. It uses MongoDB. a document model database that offers high availability, scalability, and flexibility.

Last month, Socket Inc. reported an information security incident. A group of hackers compromised its MongoDB database, because the database administrators did not change its default settings, leaving it without a password and publicly accessible.

Fortunately. Socket Inc. performed regular information backups in their MongoDB database, so no information was lost during the incident. In addition, a syslog server allowed Socket Inc. to centralize alllogs in one server. The company found out that no persistent backdoor was placed and that the attack was not initiated from an employee inside the company by reviewing the event logs that record user faults and exceptions.

To prevent similar incidents in the future, Socket Inc. decided to use an access control system that grants access to authorized personnel only. The company also implemented a control in order to define and implement rules for the effective use of cryptography, including cryptographic key management, to protect the database from unauthorized access The implementation was based on all relevant agreements, legislation, and regulations, and the information classification scheme. To improve security and reduce the administrative efforts, network segregation using VPNs was proposed.

Lastly, Socket Inc. implemented a new system to maintain, collect, and analyze information related to information security threats, and integrate information security into project management.

Based on scenario 3. which information security control of Annex A of ISO/IEC 27001 did Socket Inc. implement by establishing a new system to maintain, collect, and analyze information related to information security threats?

Options:

A.  

Annex A 5.5 Contact with authorities

B.  

Annex A 5 7 Threat Intelligence

C.  

Annex A 5.13 Labeling of information

Discussion 0

ISO-IEC-27001-Lead-Implementer
PDF

$35  $99.99

ISO-IEC-27001-Lead-Implementer Testing Engine

$42  $119.99

ISO-IEC-27001-Lead-Implementer PDF + Testing Engine

$56  $159.99