Free PECB ISO-IEC-27001-Lead-Auditor Exam Actual Questions

The questions for ISO-IEC-27001-Lead-Auditor were last updated On May 3, 2024

Question No. 1

Changes on project-managed applications or database should undergo the change control process as documented.

Show Answer Hide Answer
Correct Answer: A

Changes on project-managed applications or database should undergo the change control process as documented, because this is a requirement of ISO/IEC 27001:2022 clause 12.1.2, which states that ''the organization shall define and apply a change management process for changes to systems and applications within the scope of the information security management system''. The change management process should ensure that changes are recorded, assessed, authorized, prioritized, planned, tested, implemented, documented and reviewed in a controlled manner.Reference:[CQI & IRCA Certified ISO/IEC 27001:2022 Lead Auditor Training Course], [ISO/IEC 27001:2022 Information technology --- Security techniques --- Information security management systems --- Requirements]


Question No. 2

A scenario wherein the city or location where the building(s) reside is / are not accessible.

Show Answer Hide Answer
Correct Answer: C

A scenario wherein the city or location where the building(s) reside is / are not accessible is called acitydisaster scenario, according to the CQI & IRCA Certified ISO/IEC 27001:2022 Lead Auditor Training Course. This scenario is one of the four types of disaster scenarios that should be considered in the business continuity planning process, along with component, facility and country scenarios. A city scenario may be caused by events such as natural disasters, civil unrest, terrorist attacks or pandemic outbreaks that affect the entire city or region where the organization operates.Reference:[CQI & IRCA Certified ISO/IEC 27001:2022 Lead Auditor Training Course]


Question No. 3

What would be the reference for you to know who should have access to data/document?

Show Answer Hide Answer
Correct Answer: B

The reference for you to know who should have access to data/document is theAccess Control List (ACL), which is a list of users or groups who are authorized to access a specific data/document and their respective access rights (such as read, write, modify, delete, etc.). The ACL is a tool for implementing the access control policy of the organization, which is defined in accordance with ISO/IEC 27001:2022 clause 9.4.1. The ACL should be maintained and updated regularly to ensure that only authorized users can access the data/document.Reference:[CQI & IRCA Certified ISO/IEC 27001:2022 Lead Auditor Training Course], [ISO/IEC 27001:2022 Information technology --- Security techniques --- Information security management systems --- Requirements]