New Year Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: get65

PECB Updated ISO-IEC-27001-Lead-Implementer Exam Questions and Answers by hari

Page: 7 / 13

PECB ISO-IEC-27001-Lead-Implementer Exam Overview :

Exam Name: PECB Certified ISO/IEC 27001 : 2022 Lead Implementer exam
Exam Code: ISO-IEC-27001-Lead-Implementer Dumps
Vendor: PECB Certification: ISO 27001
Questions: 179 Q&A's Shared By: hari
Question 28

Scenario 7: InfoSec is a multinational corporation headquartered in Boston, MA, which provides professional electronics, gaming, and entertainment services. After facing numerous information security incidents, InfoSec has decided to establish teams and implement measures to prevent potential incidents in the future

Emma, Bob. and Anna were hired as the new members of InfoSec's information security team, which consists of a security architecture team, an incident response team (IRT) and a forensics team Emma's job is to create information security plans, policies, protocols, and training to prepare InfoSec to respond to incidents effectively Emma and Bob would be full-time employees of InfoSec, whereas Anna was contracted as an external consultant.

Bob, a network expert, will deploy a screened subnet network architecture This architecture will isolate the demilitarized zone (OMZ) to which hosted public services are attached and InfoSec's publicly accessible resources from their private network Thus, InfoSec will be able to block potential attackers from causing unwanted events inside the company's network. Bob is also responsible for ensuring that a thorough evaluation of the nature of an unexpected event is conducted, including the details on how the event happened and what or whom it might affect.

Anna will create records of the data, reviews, analysis, and reports in order to keep evidence for the purpose of disciplinary and legal action, and use them to prevent future incidents. To do the work accordingly, she should be aware of the company's information security incident management policy beforehand

Among others, this policy specifies the type of records to be created, the place where they should be kept, and the format and content that specific record types should have.

Why did InfoSec establish an IRT? Refer to scenario 7.

Options:

A.

To comply with the ISO/IEC 27001 requirements related to incident management

B.

To collect, preserve, and analyze the information security incidents

C.

To assess, respond to, and learn from information security incidents

Discussion
Mariam
Do anyone think Cramkey questions can help improve exam scores?
Katie Nov 2, 2024
Absolutely! Many people have reported improved scores after using Cramkey Dumps, and there are also success stories of people passing exams on the first try. I already passed this exam. I confirmed above questions were in exam.
Vienna
I highly recommend them. They are offering exact questions that we need to prepare our exam.
Jensen Oct 9, 2024
That's great. I think I'll give Cramkey a try next time I take a certification exam. Thanks for the recommendation!
Marley
Hey, I heard the good news. I passed the certification exam!
Jaxson Oct 5, 2024
Yes, I passed too! And I have to say, I couldn't have done it without Cramkey Dumps.
Erik
Hey, I have passed my exam using Cramkey Dumps?
Freyja Oct 17, 2024
Really, what are they? All come in your pool? Please give me more details, I am going to have access their subscription. Please brother, give me more details.
Nadia
Why these dumps are important? Can I pass my exam without these dumps?
Julian Oct 22, 2024
The questions in the Cramkey dumps are explained in detail and there are also study notes and reference materials provided. This made it easier for me to understand the concepts and retain the information better.
Question 29

Upon the risk assessment outcomes. Socket Inc. decided to:

• Require the use of passwords with at least 12 characters containing uppercase and lowercase letters, symbols, and numbers

• Require the change of passwords at least once every 60 days

• Keep backup copies of files on IT-provided network drives

• Assign users to a separate network when they have access to cloud storage files storing customers' personal data.

Based on the scenario above, answer the following question:

Which of the following options indicate that Socket Inc. used risk modification to treat risks?

Options:

A.

Conducting a risk assessment before deciding to use third-party services

B.

Requiring the change of passwords at least once every 60 days

C.

Storing customers' personal data in a cloud-based storage

Discussion
Question 30

Which tool is used to identify, analyze, and manage interested parties?

Options:

A.

The probability/impact matrix

B.

The power/interest matrix

C.

The likelihood/severity matrix

Discussion
Question 31

Scenario 3: Socket Inc is a telecommunications company offering mainly wireless products and services. It uses MongoDB. a document model database that offers high availability, scalability, and flexibility.

Last month, Socket Inc. reported an information security incident. A group of hackers compromised its MongoDB database, because the database administrators did not change its default settings, leaving it without a password and publicly accessible.

Fortunately. Socket Inc. performed regular information backups in their MongoDB database, so no information was lost during the incident. In addition, a syslog server allowed Socket Inc. to centralize all logs in one server. The company found out that no persistent backdoor was placed and that the attack was not initiated from an employee inside the company by reviewing the event logs that record user faults and exceptions.

To prevent similar incidents in the future, Socket Inc. decided to use an access control system that grants access to authorized personnel only. The company also implemented a control in order to define and implement rules for the effective use of cryptography, including cryptographic key management, to protect the database from unauthorized access The implementation was based on all relevant agreements, legislation, and regulations, and the information classification scheme. To improve security and reduce the administrative efforts, network segregation using VPNs was proposed.

Lastly, Socket Inc. implemented a new system to maintain, collect, and analyze information related to information security threats, and integrate information security into project management.

Based on scenario 3, what would help Socket Inc. address similar information security incidents in the future?

Options:

A.

Using the MongoDB database with the default settings

B.

Using cryptographic keys to protect the database from unauthorized access

C.

Using the access control system to ensure that only authorized personnel is granted access

Discussion
Page: 7 / 13

ISO-IEC-27001-Lead-Implementer
PDF

$36.75  $104.99

ISO-IEC-27001-Lead-Implementer Testing Engine

$43.75  $124.99

ISO-IEC-27001-Lead-Implementer PDF + Testing Engine

$57.75  $164.99