更新时间: 试题数量: 购买人数: 提供作者:

有效期: 个月

章节介绍: 共有个章节

收藏
搜索
题库预览
2: Beauty is a cosmetics company that has recently switched to an e-commerce model, Leaving the traditional retail. The top management has decided to build their own custom platform In-house and outsource the payment process to an external provider operating online payments Systems that support online money transfers. Due to this transformation of the business model, a number of security controls were implemented Based on the identified threats and vulnerabilities associated to critical assets. To protect Customers' information. Beauty's employees had to sign a confidentiality agreement. In addition, The company reviewed all user access rights so that only authorized personnel can have access to Sensitive files and drafted a new segregation of duties chart. However, the transition was difficult for the IT team, who had to deal with a security incident not Long after transitioning to the e commerce model. After investigating the incident, the team Concluded that due to the out- of-date anti-malware software, an attacker gamed access to their Files and exposed customers' information, including their names and home addresses. The IT team decided to stop using the old anti-malware software and install a new one which would Automatically remove malicious code in case of similar incidents. The new software was installed in Every workstation within the company. After installing the new software, the team updated it with The latest malware definitions and enabled the automatic update feature to keep it up to date at All times. Additionally, they established an authentication process that requires a user Identification and password when accessing sensitive information. In addition, Beauty conducted a number of information security awareness sessions for the IT team And other employees that have access to confidential information in order to raise awareness on the Importance of system and network security. According to2. Beauty has reviewed all user access rights. What type of control is this?
3: Socket Inc is a telecommunications company offering mainly wireless products and Services. It uses MongoDB. a document model database that offers high availability, scalability, And flexibility. Last month, Socket Inc. reported an information security incident. A group of hackers compromised Its MongoDB database, because the database administrators did not change its default settings, Leaving it without a password and publicly accessible. Fortunately. Socket Inc. performed regular information backups in their MongoDB database, so no Information was lost during the incident. In addition, a syslog server allowed Socket Inc. to Centralize all logs In one server. The company found out that no persistent backdoor was placed and that the attack was Not initiated from an employee inside the company by reviewing the event logs that record user Faults and exceptions. To prevent similar incidents in the future, Socket Inc. decided to use an access control system That grants access to authorized personnel only. The company also implemented a control in order to Define and implement rules for the effective use of cryptography, including cryptographic key Management, to protect the database from unauthorized access The implementation was based on all Relevant agreements, legislation, And regulations, and the information classification scheme. To improve security and reduce the Administrative efforts, network segregation using VPNs was proposed. Lastly, Socket Inc. implemented a new system to maintain, collect, and analyze information related To information security threats, and integrate information security into project management. Can Socket Inc. find out that no persistent backdoor was placed and that the attack was initiated From an employee inside the company by reviewing event logs that record user faults and exceptions? Refer to3.
4: CyTekShield CyTekShield based in Dublin. Ireland, is a cybersecurity consulting provider specializing in Digital risk management and enterprise security solutions. After facing multiple security Incidents. CyberTekShield formed expanded its information security team by bringing in Sadie and Niamh as part of the team. This team is structured into three key divisions: incident response, Security architecture and forensics Sadie will separate the demilitarized zone from CyTekShield's private network and publicly Accessible resources, as part of implementing a screened subnet network architecture. In addition, Sadie will carry out comprehensive evaluations of any unexpected incidents, analyzing their causes And assessing their potential impact. She also developed security strategies and policies. Whereas Niamh. a specialized expert in forensic investigations, will be responsible for creating records of Different data for evidence purposes To do this effectively, she first reviewed the company's Information security incident management policy, which outlines the types of records to be created, Their storage location, and the required format and content for specific Record types. To support the process of handling of evidence related to information security events. CyTekShield Has established internal procedures. These procedures ensure that evidence is properly identified, Collected, and preserved within the company CyTekShield's procedures specify how to handle records In various storage mediums, ensuring that all evidence is safeguarded in its original state, Whether the devices are powered on or off. As part of CyTekShield's initiative to strengthen information security measures, Niamh will conduct Information security risk assessments only when significant changes are proposed and will document The results of these risk assessments Upon completion of the risk assessment process, Niamh is Responsible to develop and implement a plan for treating information security risks and document The risk treatment results. Furthermore, while implementing the communication plan for information security, the CyTekShield's Top management was responsible for creating a roadmap for new product development. This approach Helps the Company to align its security measures with the product development efforts, demonstrating a Commitment to integrating security into every aspect of its business operations.CyTekShield uses a Cloud service model that includes cloud-based apps accessed through the web or an application Programming interface (API). All cloud services are provided by the cloud service provider, while Data is managed by CyTekShield This introduces unique security considerations and becomes a primary Focus for the information security team to ensure data and systems are protected in this Environment.CyTekShield uses a cloud service model that includes cloud- based apps accessed through The web or an application programming interface (API). All cloud services are provided by the cloud Service provider, while data is managed by CyTekShield This introduces unique Security considerations and becomes a primary focus for the information security team to ensure Data and systems are protected in this environment. Niamh, the forensics expert, conducted information security risk assessments upon significant Changes and developed a risk treatment plan. The results of both were documented. Question: Does CyTekShield comply with ISO/IEC 27001 requirements regarding the information security risk Treatment plan?
6: InfoSec is a multinational corporation headquartered in Boston, MA, which provides Professional electronics, gaming, and entertainment services. After facing numerous information Security incidents, InfoSec has decided to establish teams and implement measures to prevent Potential incidents in the future Emma, Bob. and Anna were hired as the new members of InfoSec's information security team, which Consists of a security architecture team, an incident response team (IRT) and a forensics team Emma's job is to create information security plans, policies, protocols, and training to prepare InfoSec to respond to incidents effectively Emma and Bob would be full-time employees of InfoSec, Whereas Anna was contracted as an external consultant. Bob, a network expert, will deploy a screened subnet network architecture This architecture will Isolate the demilitarized zone (OMZ) to which hosted public services are attached and InfoSec's Publicly accessible resources from their private network Thus, InfoSec will be able to block Potential attackers from causing unwanted events inside the company's network. Bob is also Responsible for ensuring that a thorough Evaluation of the nature of an unexpected event is conducted, including the details on how the Event happened and what or whom it might affect. Anna will create records of the data, reviews, analysis, and reports in order to keep evidence for The purpose of disciplinary and legal action, and use them to prevent future incidents. To do the Work accordingly, she should be aware of the company's information security incident management Policy beforehand Among others, this policy specifies the type of records to be created, the place where they should Be kept, and the format and content that specific record types should have. According to7, a demilitarized zone (DMZ) is deployed within InfoSec's network. What type Of control has InfoSec implemented in this case?
10:According to ISO/IEC 27001, what shall the organization determine regarding monitoring and Measurement?8: SecureLynx is one Of the largest cybersecurity advisory and consulting Companies that helps Private sector organizations prevent security threats. improve security systems. and achieve Business SecureLynr is committed to complying with national and international standards to enhance the Company'S Resilience and credibility_ SecureLynx has Started implementing an ISMS based on ISO/IEC 27001 As part of its relentless pursuit of security. As part of the internal audit activities. the top management reviewed and approved the audit Objectives to assess the effectiveness of SecureLynx•s ISMS During the audit, the internal auditor Evaluated whether Top management Supports activities associated with the ISMS and if the toles and responsibilities Of relevant parties are Clearly defined. This rigorous examination is a testament to SecureLynx'S Commitment to continuous improvernent and alignment of security measures with organizational goals. SecureLynx employs an innovative dashboard that visually represents implemented processes and Controls to Ensure transparency and accountability within the Organization. This tool Offers stakeholders a Real- Time overview of security measures. empowering them to make informed decisions and swiftly respond To emerging threats. As part of this initiative, Paula was appointed to a new position entrusted With the Responsibility Of collecting, recordlng, and Stoting data to measure the effectiveness Of the ISMS- Furthermore, SecureLynx conducts management reviews every six months to ensure its Systems are Robust And continually improving. These reviews serve as a crucial mechanism for assessing the efficacy Of Security measures and identifying areas for enhancement. SecureLynx's dedication to implementing And maintaining a robust ISMS exemplifies its commitment to innovation and Client satisfaction. Based on theabove, answer the following question.
10: NetworkFuse is a leading company that specializes in the design, production, and distribution of Network hardware products. Over the past two years, NetworkFuse has maintained an operational Information Security Management System (ISMS) based on ISO/IEC 27001 requirements and a Quality Management System (QMS) based on ISO 9001. These systems are designed to ensure the company's Commitment to both information security and the highest quality standards. To further demonstrate its dedication to best practices and industry standards, NetworkFuse Recently scheduled a combined certification audit. This audit seeks to validate NetworkFuse’s Compliance with both ISO/IEC 27001 and ISO 9001, showcasing the company’s strong commitment to Maintaining high standards in information security management and quality management. The process Began with the careful selection of a certification body. NetworkFuse then took steps to prepare its employees for the audit, which was Crucial for ensuring a smooth and successful audit process. Additionally, NetworkFuse appointed Individuals to manage the ISMS and the QMS. NetworkFuse decided not to conduct a self-evaluation before the audit, a step often taken by Organizations to proactively identify potential areas for improvement. The company's top management Believed such an evaluation was unnecessary, confident in their existing systems and practices. This decision reflected their trust in the robustness of their ISMS and QMS. As part of the Preparations, NetworkFuse took careful measures to ensure that all necessary documented Information—including internal audit reports, management reviews, technological infrastructure, and The overall functioning of the ISMS and QMS—was readily available for the audit. This information Would be vital in demonstrating their compliance with the ISO standards. During the audit, NetworkFuse requested that the certification body not carry documentation Off-site. This request stemmed from their commitment to safeguarding sensitive and proprietary Information, reflecting their desire for maximum security and control during the audit process. Despite meticulous preparations, the actual audit did not proceed as scheduled. NetworkFuse raised Concerns about the assigned audit team leader and requested a replacement. The company asserted That the same audit team leader had previously issued a Recommendation for certification to one of NetworkFuse's main competitors. This potential conflict Of interest raised concerns among the company’s top management. However, the certification body Rejected NetworkFuse's request for a replacement, and the audit process was canceled. Which of the following actions is NOT a requirement for NetworkFuse in preparing for the Certification audit?
1: NobleFind is an online retailer specializing in high-end, custom-design furniture. The Company offers a wide range of handcrafted pieces tailored to meet the needs of residential and Commercial clients. NobleFind also provides expert design consultation services. Despite NobleFind's efforts to keep its online shop platform secure, the company faced persistent issues, Including a recent data breach. These ongoing challenges disrupted normal operations and Underscored the need for enhanced security measures. The designated IT team quickly responded to Resolve the problem. To address these issues, NobleFind decided to implement an Information Security Management System (ISMS) based on ISO/IEC 27001 to improve security, protect customer Data, and ensure the stability of its services. In addition to its commitment to information security, NobleFind focuses on maintaining the Accuracy and completeness of its product data. This is ensured by carefully managing version Control, checking information regularly, enforcing strict access policies, and implementing backup Procedures. Moreover, product details And customer designs are accessible only to authorized individuals, with security measures such as Multi- factor authentication and data access policies. NobleFind has implemented an incident investigation process within its ISMS, as part of its Comprehensive approach to information security. Additionally, it has established record retention Policies to ensure that online information about each product and client information remains Readily accessible and usable on Demand for authorized entities. NobleFind established an information security policy offering clear Guidelines For safeguarding historical data. It also insisted that personnel sign confidentiality agreements And were committed to recruiting only qualified individuals. Additionally, NobleFind implemented Measures for monitoring the resources used by its systems, reviewing user access rights, and Conducting a thorough analysis of audit logs to swiftly identify and address any security Anomalies. With its ISMS in place, NobleFind maintains and safeguards documented information, encompassing a Wide range of data, records, and specifications. This documented information is vital to its Operations, ensuring the security and integrity of customer data, historical records, and financial Information. According to1, which detective control did NobleFind implement?
8: SunDee is an American biopharmaceutical company, headquartered in California, the US. It specializes in developing novel human therapeutics, with a focus on cardiovascular diseases, Oncology, bone health, and inflammation. The company has had an information security management System (ISMS) based On SO/IEC 27001 in place for the past two years. However, it has not monitored or measured the Performance and effectiveness of its ISMS and conducted management reviews regularly Just before the recertification audit, the company decided to conduct an internal audit. It also Asked most of their staff to compile the written individual reports of the past two years for their Departments. This left the Production Department with less than the optimum workforce, which Decreased the company's stock. Tessa was SunDee's internal auditor. With multiple reports written by 50 different employees, the Internal audit process took much longer than planned, was very inconsistent, and had no qualitative Measures whatsoever Tessa concluded that SunDee must evaluate the performance of the ISMS Adequately. She defined SunDee's negligence of ISMS performance evaluation as a major Nonconformity, so she wrote a nonconformity report including the description of the nonconformity, The audit findings, and recommendations. Additionally, Tessa created a new plan which would enable SunDee to resolve these issues and presented it to the top management Based on theabove, answer the following question: What caused SunDee's workforce Disruption?
7: Yefund, an insurance Company headquartered in Monaco, is a reliable name in Commerce, Industry, and Corporate services. With a rich history spanning decades, Yefund has consistently Delivered Tailored insurance solutions to businesses of all sizes. safeguarding their assets and mitigating Risks. As a forward-thinking company, Yetund recognizes the importance of information security in Protecting Sensitive data and maintaining the trust Of Its clients. Thus, has embarked on a transformative Journey towards implemenung an ISMS based on ISO/IEC 27001- IS implementing cutting-edge Al technologies within its ISMS to improve the identification and Management Of information assets, Through Al. is automating the identification Of assets. tracking Changes over time. and strategically selecting controls based on asset sensitivity and exposure. This proactive approach ensures that Yefund remains agile and adaptive in safeguarding critical Information assets Against emerging threats. Although Yetund recognized the urgent need to enhance its security Posture, the implementation team took a gradual approach to integrate each ISMS element- Rather Than waiting for An official launch, they carefully tested and validated security controls, gradually putting each Element into operational mode as it was completed and approved. This methodical process ensured That critical Security measures, such as encryption protocols. access controls. and monitoring systems. were Fully operational and effective in safeguarding customer information, including personal. policy, And financial Details. Recently. Kian. a member of Vefund's information security team. identified two security events. Upon evaluation. one reported incident did not meet the criteria to be classified as such- However, The second Incident. involving critical network components experiencing downtime. raised concerns about Potential risks to sensitive data security and was therefore categorized as an incident. The first Event was recorded As a report without further action, whereas the second incident prompted a series Of actions, Including investigation. containment, eradication, recovery. resolution, closure, incident Reporting, and post-incident Activities. Additionally. IRTS were established to address the events according to their Categorization. After the incident. Yetund recognized the development of internal communication protocols as the Single need to improve their ISMS framework It determined the relevance of communication aspects Such as What, when, with whom. and how to Communicate effectively Yefund decided to focus On developing Internal communication protocols, reasoning that internal coordination their most immediate Priority. This Decision was made despite having external stakeholders. such as clients and regulatory bodies. who Also required secure and timely communication. Additionally, Yefund has prioritized the professional development Of its employees through Comprehensive training programs, Yefund assessed the effectiveness and impact Of its training Initiatives through Kirkpatrick's four-level training evaluation model. From measuring trainees' involvement and Impressions of the training (Level 1) to evaluating learning outcomes (Level 2), post-training Behavior (Level 3), and Tangible results (Level 4), Yefund ensures that Its training programs ate holistic. impactful. and Aligned With organizational objectives. Yefund•s journey toward implementing an ISMS reflects a commitment to security, innovation, and Continuous improvement, By leveraging technology, fostering a culture Of proactive vigilance, Enhancing Communication ptotOCOlS, and investing in employee development. Yefund seeks to fortify its Position as a trusted partner in safeguarding the interests Of its Clients and stakeholders. Based on7, is Yefund's integration of ISMS elements acceptable?