Free ISO-IEC-27001-Lead-Implementer Exam Braindumps (page: 9)

Page 8 of 35
View Related Case Study

Based on scenario 13, Socket Inc. decided to assign users to a separate network when accessing cloud storage files. What does this ensure?

  1. Better security when using cloud storage files
  2. Elimination of risks related to the use of cloud storage services
  3. Creation of backup copies of files

Answer(s): A



View Related Case Study

Based on scenario 13, what can be considered as a residual risk to Socket Inc.?

  1. Files are decrypted once the user is authenticated
  2. Users with access to cloud storage files are segregated on a separate network
  3. The use of passwords with at least 12 characters containing a mixture of uppercase and lowercase letters, symbols, and numbers

Answer(s): A



View Related Case Study

After migrating to cloud, the IT team of a company initiated a change in the ISMS scope and implemented all the required modifications. Is this acceptable?

  1. Yes, because the ISMS scope should be changed when there are changes to the external environment
  2. No, because the company has already defined the ISMS scope
  3. No, because any change in ISMS scope should be accepted by the management

Answer(s): A



View Related Case Study

Why is the power/interest matrix used for?

  1. Define the information security and physical boundaries
  2. Identify business requirements
  3. Determine and manage interested parties

Answer(s): C






Post your Comments and Discuss PECB ISO-IEC-27001-Lead-Implementer exam with other Community members:

ISO-IEC-27001-Lead-Implementer Discussions & Posts