Free ISO-IEC-27001-Lead-Implementer Exam Braindumps (page: 5)

Page 4 of 35
View Related Case Study

Company X restricted the access of the internal auditor to some of its documentation taking into account its confidentiality. Is this acceptable?

  1. Yes, it is up to the company to determine what an internal auditor can access
  2. Yes, confidential information should not be accessed by internal auditors
  3. No, restricting the internal auditor s access to offices and documentation can negatively affect the internal audit process

Answer(s): C



View Related Case Study

Based on the scenario above, answer the following question:
Texas H&H Inc. decided to integrate the incident management policy to the existent information security policy. How do you define this situation?

  1. Acceptable, the incident management policy may be integrated into the overall information security policy of the organization
  2. Acceptable, but only if the incident management policy addresses environmental, or health and safety issues
  3. Unacceptable, the incident management policy should be drafted as a separate document in order to be clear and effective

Answer(s): A



View Related Case Study

Texas H&H Inc. decided to assign an internal expert for their forensic analysis. Is this acceptable? Refer to scenario 15.

  1. Yes, forensic analysis can be done by either an internal or external expert
  2. Yes, hiring an external expert for forensic analysis is a requirement of the standard
  3. No, the company's forensic analysis should be based on the conclusion of its cloud storage provide investigation

Answer(s): A



View Related Case Study

According to scenario 15, the team prevented a potential attack based on knowledge gained from previous incidents. Is this acceptable?

  1. No, before responding to an information security incident, an information security incident management policy must be established
  2. No, every information security incident is different, hence knowledge gained from previous incidents cannot prevent potential attacks
  3. Yes, in the absence of an information security incident management policy, lessons learned can be applied

Answer(s): C






Post your Comments and Discuss PECB ISO-IEC-27001-Lead-Implementer exam with other Community members:

ISO-IEC-27001-Lead-Implementer Discussions & Posts