05 27001la en QS V12.1 20221111
05 27001la en QS V12.1 20221111
05 27001la en QS V12.1 20221111
SHEET
www.pecb.com
Quiz 1: Standards and regulatory frameworks
2. Organizations can obtain certification against the ISO/IEC 27002 standard if they
implement all of its information security controls.
A. True
B. False
5. Which of the following is one of the objectives of the privacy protection policy?
A. To increase awareness regarding the legal requirements for protecting personal
information
B. To increase awareness regarding cybercrimes that target an organization’s computer
network
C. To increase awareness regarding the validity of digital signatures in electronic
documents
www.pecb.com
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
4. A third party that performs the assessment of conformity of management systems is:
A. An international standard
B. An accreditation body
C. A certification body
5. Your Market is a market research company which helps its customers determine which
products and services are on demand. The company is currently evaluating the
effectiveness of its information security controls through an ISMS audit. What is Your
Market in this case?
A. An accreditation body
B. A certification body
C. An auditee
© 2022 PECB |3
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
4. With which of the following principles does an organization comply if it ensures that
only authorized users have access to their sensitive data?
A. Confidentiality
B. Integrity
C. Availability
© 2022 PECB |4
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
8. An organization has clearly defined the security procedures and uses an access control
software to avoid unauthorized access of the personnel to its confidential data. What is
the function of these security controls?
A. To prevent the occurrence of incidents
B. To correct errors arising from a problem
C. To report the occurrence of a malicious act
© 2022 PECB |5
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
© 2022 PECB |6
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
© 2022 PECB |7
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
Recently, one of their main partners required an update of the software they got from Webos
because their current version was vulnerable to external attacks. Webos provided an updated
version that included migrating to the Windows Azure SQL database to solve the encryption,
authentication, and high availability problems. However, the solution did not work and Webos’s
partner terminated their contract.
The project failed due to problems with the segregation of duties in Webos. Their only software
development team leader, Julia Robinson, was on maternity leave and her duties and
responsibilities were assigned to an inexperienced team member.
To increase the security of their services and regain customer confidence, Webos decided to
initiate major changes, including the implementation of an ISMS. They decided to improve their
existing maintenance and support services and conduct technical investigations for any security
incident reported by their partners. In addition, they decided to segregate the duties of the
software development team in order to avoid similar situations in the future.
2. Webos’s project failed due to the lack of segregation of duties during the maternity
leave of the software development team leader. Which of the following is a threat that
can impact Webos in this situation?
A. Failure to produce management reports
B. Insufficient software testing
C. Unauthorized use of the system
3. Webos conducted technical investigations after its partners reported security incidents.
What is the aim of implementing this security control?
A. To control software operations
B. To report the occurrence of an error or omission
© 2022 PECB |8
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
5. Migration to the Windows Azure SQL database would solve the availability problems
by reducing the _____________.
A. Disruption of operations
B. Invasion of privacy of users
C. Leak of sensitive information
© 2022 PECB |9
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
2. Company X evaluated and improved its risk management and core processes by using
the insights and recommendations provided by the _______________ activities.
A. Internal audit
B. External audit
C. Second party audit
4. The auditor issued an unfavorable report for Company 1 by strictly examining the
audit evidence. He was not intimidated when Company 1, the main client of his audit
firm, threatened to terminate the contract if the audit report does not suit them. Which
principle of auditing has the auditor followed?
A. Independence
B. Confidentiality
C. Fair presentation
5. Which type of audit approach focuses on matters that are significant for the auditee?
A. Risk-based approach
B. Evidence-based approach
C. Sector-specific approach
© 2022 PECB | 10
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
4. Supervised machine learning is used to group data based only on outputs and includes
clustering, representation learning, and density estimation.
A. True
B. False
6. Which services are managed by the cloud provider when using Infrastructure as a
Service (IaaS)?
A. Application and data
B. Network and storage
C. Middleware and data
7. What step should an auditor follow to ensure the competence of staff in outsourced
operations?
A. Review the service provider’s processes and employees’ contracts
B. Ensure that disaster recovery processes are in place
© 2022 PECB | 11
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
C. Review and evaluate the organization’s plan in case of an unexpected termination of the
outsourcing agreement
8. Which services can be managed by the user when using Platform as a Service (PaaS)?
A. Virtualization and servers
B. Runtime and middleware
C. Application and data
© 2022 PECB | 12
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
4. How can an auditor verify conformity to control 5.18 Access rights of ISO/IEC 27001
by using analytical evidence?
A. By analyzing results of the access rights removal procedure on a sample of users upon
the termination of their contracts
B. By analyzing the removal or adjustment of access rights procedure
C. By analyzing the access rights removal simulation test
© 2022 PECB | 13
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
1. Which type of audit risk is known as the risk that occurs in the management system
despite the internal control mechanisms in an organization?
A. Inherent risk
B. Control risk
C. Detection risk
2. Which of the following factors should be considered when determining the materiality
of a system?
A. The organizational changes
B. The conditions of service-level agreements
C. The audit results
3. During an ISO/IEC 27001 audit, auditors must obtain absolute assurance that every
single process is effective and conforms to the standard requirements.
A. True
B. False
4. Materiality is taken into account to determine the duration of the audit based on the
risks inherent to the organization during:
A. Initial contact
B. Stage 1 audit
C. Stage 2 audit
6. What action is taken during stage 1 audit when evaluating materiality during the
audit?
A. Identifying the key processes to be audited
B. Determining the audit duration
C. Adjusting the plan based on the materiality of each process or asset
© 2022 PECB | 14
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
2. How many audit team leaders should be appointed for a joint audit?
A. One audit team leader
B. Two audit team leaders
C. It is up to the certification body
© 2022 PECB | 15
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
2. Stage 1 audit should not be conducted too far from stage 2 audit.
A. True
B. False
4. Which of the following activities of stage 1 audit does NOT take place during the
auditor’s on-site visit?
A. Observing the technology used and the operations of the ISMS in general
B. Reviewing the information security policy and other documented information
C. Validating the compliance of the management system with contractual and regulatory
requirements
5. Why should the auditor interview the person responsible for the ISMS in an
organization?
A. To validate the top management’s commitment in an organization
B. To provide information regarding the organization’s internal audits
C. To understand how the organization operates with the management system in place
6. The scope of the management system and the responsibility of the auditee’s top
management should be validated during:
A. Stage 1 audit
B. Stage 2 audit
C. After the audit
© 2022 PECB | 16
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
8. An auditor must have sufficient knowledge of and practical experience in the use of
electronic media.
A. True
B. False
© 2022 PECB | 17
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
Following best audit practices, AuditOrg initiated the audit by gathering information regarding
the scope of the management system and Finanvo’s understanding of the standard requirements.
As part of their audit activities, the auditors carried out a general review of the organization’s
documented information, including records on training sessions. Some employees’ training
records were missing, so the audit team interviewed them to verify their participation. The
auditors used the collected information from the interviews as a sample to measure the
employees’ understanding of information security. After obtaining the needed information, the
auditors calculated the amount of training hours and analyzed the collected evidence. The
findings helped the auditors support their conclusions and report all audit activities truthfully and
accurately.
The auditors concluded that they did not detect any major nonconformity in Finanvo’s
information security management system.
2. Based on the scenario, can Finanvo request the replacement of the audit team
members?
A. Yes, two of AuditOrg’s auditors have worked for one of Finanvo’s biggest competitors,
which is a valid reason to request the replacement of audit team members
© 2022 PECB | 18
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
B. No, Finanvo does not have a valid reason to request the replacement of audit team
members since the auditors have adequate experience in auditing
C. No, Finanvo cannot request the replacement of the audit team member for any reason
3. AuditOrg’s audit team members have collected all types of evidence below, except
____________.
A. Confirmative evidence
B. Mathematical evidence
C. Analytical evidence
4. Which auditing principle has AuditOrg applied in this case, “The findings helped the
auditors support their conclusions and report all audit activities truthfully and
accurately?”
A. Independence
B. Fair presentation
C. Confidentiality
© 2022 PECB | 19
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
3. How does the audit team select processes and systems to be tested?
A. Based on the technical experts’ advice
B. Based on audit procedures
C. Based on materiality
© 2022 PECB | 20
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
3. The auditor has accessed logs to the server room. What source of information was
collected?
A. Documents
B. Observations
C. Records
5. The quality review of audit evidence will assure that the audit findings are reliable and
valid.
A. True
B. False
© 2022 PECB | 21
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
3. A guide’s responsibilities include maintaining logistics, ensuring that health and safety
policies are observed, and facilitating audit activities.
A. True
B. False
4. Why should an auditor consider cultural aspects at every stage of the audit?
A. To solve conflicts between employees of the auditee
B. To document conflictual situations
C. To avoid possible conflicts or misunderstandings
6. Leaders who are attentive to the needs and emotions of their employees and listen to
their opinions but they themselves take the final decisions are categorized as:
A. Laissez-faire leaders
B. Democratic leaders
C. Autocratic leaders
© 2022 PECB | 22
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
3. Which of the options below is NOT necessary to have in mind when conducting
effective interviews?
A. Ensuring the interviewee does not leave out important information
B. Asking for specifics
C. Using complex and abstract terminology
5. The auditor is an observer during a system backup test. What type of observation is
the auditor conducting?
A. General observation
B. Quantitative observation
C. Detailed observation
6. An auditor takes notes of the serial numbers of the audited equipment and the
locations where certain processes take place. Why would an auditor take such actions?
A. To document their observations
B. To keep notes for similar future cases
C. To keep track in case they forget something
© 2022 PECB | 23
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
C. Analysis
9. Which sampling method is more complex and usually more time consuming to
perform?
A. Interval sampling
B. Systematic sampling
C. Random sampling
© 2022 PECB | 24
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
3. Which document can serve as audit evidence to verify conformity to clause 4.3
Determining the scope of the information security management system of ISO/IEC
27001?
A. Statement of Applicability
B. Information security policy
C. Risk assessment report
5. A combination of audit test plans should be used to verify conformity to the standard
requirements.
A. True
B. False
© 2022 PECB | 25
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
Eva was appointed to be the audit team leader for DeeCorp’s audit. Her job was to evaluate the
current state of DeeCorp’s information security management system and present the audit
findings in a comprehensive report. This would allow her to determine whether she should issue
a recommendation for certification to DeeCorp.
Eva has thorough theoretical and practical knowledge of the audit principles and procedures. She
is also experienced in information security. Her team consisted of two other auditors, Tom and
Ben. Eva has already worked with Tom and Ben previously, so a socializing event (e.g., audit
opening meeting) was deemed unnecessary.
Eva, Tom, and Ben decided to structure an audit test plan before proceeding. Eva’s job was to
verify DeeCorp’s conformity to Annex A 5.1 Policies for information security of ISO/IEC
27001. To do so, she used individual interviews as an evidence collection procedure and audit
sampling as a tool. She chose a statistically reliable and easy-to-use sampling method. Ben and
Tom, on the other hand, were responsible for the sampling procedure. They selected a sample
size of 10 employees based on a fixed interval.
1. According to the general principles for determining the sample size, did Tom and Ben
select a valid sample size of 10 employees based on a fixed interval?
A. No, the determined sample size is significantly low compared to DeeCorp’s population,
as according to the general principles, for a population lower than 366 the minimum
number of the sample size should be 25
B. Yes, the determined sample size is on proportion with DeeCorp’s overall population
C. No, the determined sample size is significantly low compared to DeeCorp’s population,
as according to the general principles, for a population higher than 366, the minimum
number of the sample size should be 25
© 2022 PECB | 26
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
3. The scenario states that there is no need for a socializing event. Is “socializing” the
main purpose of an audit opening meeting?
A. No, the main purpose of an audit opening meeting is to gain a level of understanding of
the team members’ background
B. Yes, the main purpose of an audit opening meeting is to allow the audit members to
socialize
C. No, the main purpose of an audit opening meeting is to introduce and agree on the audit
plan, audit team, and roles and responsibilities of each auditor
4. What important information could Eva gather from the individual interviews that
would be of help for her final audit report?
A. Detailed information that helps her evaluate and determine if a set of policies for
information security is defined, approved, published, and communicated to employees
and external parties
B. Detailed information on when the organization implemented the information security
policies control and the persons responsible for its implementation and maintenance
C. Detailed information on the expertise level of DeeCorp employees and their level of
understanding and attitude to the organization’s policies
© 2022 PECB | 27
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
1. According to ISO 19011, what should be considered when determining audit findings?
A. Description of or reference to audit criteria against which conformity is shown
B. Declaration of conformity
C. Follow-up of previous audit records
2. The auditor found out that the auditee has restricted the access of its employees to the
operating system software using an access control system. This access is being
controlled and monitored but not documented. How is this situation to be evaluated?
A. As a major nonconformity
B. As a minor nonconformity
C. As conformity
6. The auditor has noticed that the auditee does not have a Statement of Applicability.
What audit conclusion should the auditor reach?
A. Major nonconformity
B. Minor nonconformity
C. Conform
© 2022 PECB | 28
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
© 2022 PECB | 29
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
3. Who is responsible for ensuring the protection of the auditee’s confidential information
included in the audit records?
A. Auditee’s employees
B. Audit team members
C. Only the audit team leader
4. Why should the audit team leader review other audit team member’s work
documents?
A. To ensure that the auditors have collected sufficient information to support their
conclusion
B. To ensure that the audit team members make the adequate certification decision based
on the evaluation of the results
C. To ensure that the auditee’s processes and procedures are in compliance with standard
requirements
© 2022 PECB | 30
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
1. When does the audit team formally present the audit conclusions and the certification
recommendation?
A. During the closing meeting
B. During the surveillance audit
C. During the audit follow-up
2. Why should audit findings be discussed with the auditee’s management prior to the
closing meeting?
A. To negotiate the conclusions with competent employees
B. To initiate the implementation of corrective actions
C. To present the audit conclusions
3. After finding out that the auditee does not have a backup policy, the auditor provided
the auditee with a backup policy template to help them treat the detected
nonconformity. Is this acceptable?
A. Yes, because auditors should help the auditee resolve the detected nonconformities
B. Yes, because auditors should provide the necessary resources to the auditee in order to
resolve the nonconformities
C. No, because auditors cannot suggest specific solutions to resolve nonconformities
4. The audit conclusions are a summary of the audit findings based on the audit evidence.
A. True
B. False
5. Which statement with regard to the distribution of the audit report is correct?
A. The audit report should be distributed after appropriate measures that ensure
confidentiality have been considered
B. The audit report should be distributed to the audit team members only
C. The audit report should be distributed to the certification body, which then decides with
whom to share the audit report
6. Which information is NOT included in the certificate issued by the certification body?
A. The management system scope
B. The name of the audit team leader
C. The geographical location of the auditee
© 2022 PECB | 31
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
© 2022 PECB | 32
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
5. What does the following sentence indicate in an action plan: “There is no procedure in
place to ensure the required protection against malware.”?
A. Description of the nonconformity
B. Description of the root cause
C. Description of the proposed corrective action
© 2022 PECB | 33
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
3. The auditor should review the effectiveness of the actions taken by the auditee:
A. After closing the nonconformity
B. Before conducting the closing meeting
C. Before closing the nonconformity
4. An auditee can have its certification ________________ when the certified management
system has constantly failed to comply with certification requirements.
A. Extended
B. Suspended
C. Transferred
6. It is recommended that after the first surveillance audit, the second surveillance audit
should be conducted on a time-frame no longer than:
A. 6 months
B. 12 months
C. 24 months
© 2022 PECB | 34
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
4. Which of the following is a crucial factor in accomplishing the mission of the internal
audit?
A. The auditors’ experience of interference from the audited entities
B. The availability and collaboration of the audited entities
C. The collaboration of non-audited entities
5. Unless otherwise specified, the records related to the internal audit program are the
property of the Internal Audit Department.
A. True
B. False
© 2022 PECB | 35
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
However, the ISMS implementation alone could not help them expand their market. That is why
they decided to apply for an ISO/IEC 27001 certification.
The company contacted a certification body to undergo the process of certification. You, an
auditor that works for the certification body, are selected as the audit team leader. During the
course of audit activities, you draft the audit findings and the nonconformity reports.
Upon considering the validity of the audit evidence, you drafted two nonconformity reports for
the detected nonconformities. The reports followed the same structure: the audit criteria,
description of the observed nonconformity, and the audit finding.
Based on the audit findings and other information collected during the audit, you recommend
Company ABC for certification upon the filing of corrective action plans. The audit conclusion
was discussed with the auditee’s representatives, who ensured you that action plans will be
submitted as soon as possible.
To resolve the first detected nonconformity, Company ABC submitted the following action plan:
“A formal user registration and de-registration process to grant or deny access to systems and
services that process sensitive information will be created.” The action plan addressing the
second nonconformity stated that “A new version of the security policy will be published to
include legal and regulatory requirements.”
Once the submitted action plans and the implemented corrective actions were evaluated, you
decide to close the detected nonconformities.
1. What should have you taken into consideration, in addition to the audit evidence, when
determining the audit findings?
A. Requirements of the audit client
B. Submission of corrective actions
C. Content of action plans
© 2022 PECB | 36
CERTIFIED ISO/IEC 27001 LEAD AUDITOR TRAINING COURSE
2. You have validated the action plans and the implemented corrective actions submitted
by Company ABC. What type of audit have you conducted?
A. Surveillance audit
B. Audit follow-up
C. Internal audit
3. Which of the following statements presents the best description of the observed
nonconformity related to the first action plan submitted by Company ABC?
A. The process used to grant or deny access to systems and services that process sensitive
information is not documented
B. There is no process in place to manage access to systems and services that process
sensitive information
C. In a sample of 30 user accounts belonging to former employees of Company ABC, only
5 of them followed the formal user de-registration process
4. The auditee has submitted the following action plan, “A formal user registration and
de-registration process to grant or deny access to systems and services that process
sensitive information will be created.” Is this action plan acceptable?
A. No, because it does not address the root cause of the detected nonconformity
B. No, because a time frame for completing the action has not been included
C. No, because the required resources for the implementation have not been included
5. What type of audit finding does the second action plan resolve?
A. Anomaly
B. Minor nonconformity
C. Major nonconformity
© 2022 PECB | 37