Printable PDF
Want to pass your PECB Certified ISO/IEC 27001 Lead Implementer LEAD-IMPLEMENTER exam in the very first attempt? Try Pass2lead! It is equally effective for both starters and IT professionals.
VCE
An organization that has an ISMS in place conducts management reviews at planned intervals, but does not retain documented information on the results. Is this in accordance with the requirements of ISO/IEC 27001?
A. Yes. ISO/IEC 27001 does not require organizations to document the results of management reviews
B. No, ISO/IEC 27001 requires organizations to document the results of management reviews C. Yes. ISO/IEC 27001 requires organizations to document the results of management reviews only if they are conducted ad hoc
A small organization that is implementing an ISMS based on ISO/lEC 27001 has decided to outsource the internal audit function to a third party. Is this acceptable?
A. Yes, outsourcing the internal audit function to a third party is often a better option for small organizations to demonstrate independence and impartiality
B. No, the organizations cannot outsource the internal audit function to a third party because during internal audit, the organization audits its own system
C. No, the outsourcing of the internal audit function may compromise the independence and impartiality of the internal audit team
Scenario 1: HealthGenic is a pediatric clinic that monitors the health and growth of individuals from infancy to early adulthood using a web-based medical software. The software is also used to schedule appointments, create customized medical reports, store patients' data and medical history, and communicate with all the [^involved parties, including parents, other physicians, and the medical laboratory staff.
Last month, HealthGenic experienced a number of service interruptions due to the increased number of users accessing the software Another issue the company faced while using the software was the complicated user interface, which the untrained personnel found challenging to use.
The top management of HealthGenic immediately informed the company that had developed the software about the issue. The software company fixed the issue; however, in the process of doing so, it modified some files that comprised sensitive information related to HealthGenic's patients. The modifications that were made resulted in incomplete and incorrect medical reports and, more importantly, invaded the patients' privacy.
Intrinsic vulnerabilities, such as the______________ are related to the characteristics of the asset. Refer to scenario 1.
A. Software malfunction
B. Service interruptions
C. Complicated user interface