Spring Sale Special Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Beingcert ISO/IEC 20000 Lead Implementer Exam

Last Update 16 hours ago Total Questions : 123

The Beingcert ISO/IEC 20000 Lead Implementer Exam content is now fully updated, with all current exam questions added 16 hours ago. Deciding to include ISOIEC20000LI practice exam questions in your study plan goes far beyond basic test preparation.

You'll find that our ISOIEC20000LI exam questions frequently feature detailed scenarios and practical problem-solving exercises that directly mirror industry challenges. Engaging with these ISOIEC20000LI sample sets allows you to effectively manage your time and pace yourself, giving you the ability to finish any Beingcert ISO/IEC 20000 Lead Implementer Exam practice test comfortably within the allotted time.

Question # 4

Scenario 9: OpenTech provides IT and communications services. It helps data communication enterprises and network operators become multi-service providers During an internal audit, its internal auditor, Tim, has identified nonconformities related to the monitoring procedures He identified and evaluated several system Invulnerabilities.

Tim found out that user IDs for systems and services that process sensitive information have been reused and the access control policy has not been followed After analyzing the root causes of this nonconformity, the ISMS project manager developed a list of possible actions to resolve the nonconformity. Then, the ISMS project manager analyzed the list and selected the activities that would allow the elimination of the root cause and the prevention of a similar situation in the future. These activities were included in an action plan The action plan, approved by the top management, was written as follows:

A new version of the access control policy will be established and new restrictions will be created to ensure that network access is effectively managed and monitored by the Information and Communication Technology (ICT) Department

The approved action plan was implemented and all actions described in the plan were documented.

Based on scenario 9. did the ISMS project manager complete the corrective action process appropriately?

A.

Yes, the corrective action process should include the identification of the nonconformity, situation analysis, and implementation of corrective actions

B.

No, the corrective action did not address the root cause of the nonconformity

C.

No, the corrective action process should also include the review of the implementation of the selected actions

Question # 5

Scenario 4: TradeB. a commercial bank that has just entered the market, accepts deposits from its clients and offers basic financial services and loans for investments. TradeB has decided to implement an information security management system (ISMS) based on ISO/IEC 27001 Having no experience of a management [^system implementation, TradeB's top management contracted two experts to direct and manage the ISMS implementation project.

First, the project team analyzed the 93 controls of ISO/IEC 27001 Annex A and listed only the security controls deemed applicable to the company and their objectives Based on this analysis, they drafted the Statement of Applicability. Afterward, they conducted a risk assessment, during which they identified assets, such as hardware, software, and networks, as well as threats and vulnerabilities, assessed potential consequences and likelihood, and determined the level of risks based on three nonnumerical categories (low, medium, and high). They evaluated the risks based on the risk evaluation criteria and decided to treat only the high risk category They also decided to focus primarily on the unauthorized use of administrator rights and system interruptions due to several hardware failures by establishing a new version of the access control policy, implementing controls to manage and control user access, and implementing a control for ICT readiness for business continuity

Lastly, they drafted a risk assessment report, in which they wrote that if after the implementation of these security controls the level of risk is below the acceptable level, the risks will be accepted

Which of the actions presented in scenario 4 is NOT compliant with the requirements of ISO/IEC 27001?

A.

TradeB selected only ISO/IEC 27001 controls deemed applicable to the company

B.

The Statement of Applicability was drafted before conducting the risk assessment

C.

The external experts selected security controls and drafted the Statement of Applicability

Question # 6

Scenario 1: HealthGenic is a pediatric clinic that monitors the health and growth of individuals from infancy to early adulthood using a web-based medical software. The software is also used to schedule appointments, create customized medical reports, store patients' data and medical history, and communicate with all the [^involved parties, including parents, other physicians, and the medical laboratory staff.

Last month, HealthGenic experienced a number of service interruptions due to the increased number of users accessing the software Another issue the company faced while using the software was the complicated user interface, which the untrained personnel found challenging to use.

The top management of HealthGenic immediately informed the company that had developed the software about the issue. The software company fixed the issue; however, in the process of doing so, it modified some files that comprised sensitive information related to HealthGenic's patients. The modifications that were made resulted in incomplete and incorrect medical reports and, more importantly, invaded the patients' privacy.

Based on the scenario above, answer the following question:

Which of the following indicates that the confidentiality of information was compromised?

A.

Service interruptions due to the increased number of users

B.

Invasion of patients' privacy

C.

Modification of patients' medical reports

Question # 7

Based on scenario 7. what else should Texas H & H Inc. do when responding to the incident?

A.

Decide to stop using cloud services in order to eliminate the risk of similar incidents happening in the future

B.

Record and document the incident which serves as input for future corrective actions

C.

Communicate the updated Information security policy only to the top management of the company

Question # 8

Which statement is an example of risk retention?

A.

An organization has decided to release the software even though some minor bugs have not been fixed yet

B.

An organization has implemented a data loss protection software

C.

An organization terminates work in the construction site during a severe storm

Question # 9

Scenario 1: HealthGenic is a pediatric clinic that monitors the health and growth of individuals from infancy to early adulthood using a web-based medical software. The software is also used to schedule appointments, create customized medical reports, store patients' data and medical history, and communicate with all the [^involved parties, including parents, other physicians, and the medical laboratory staff.

Last month, HealthGenic experienced a number of service interruptions due to the increased number of users accessing the software Another issue the company faced while using the software was the complicated user interface, which the untrained personnel found challenging to use.

The top management of HealthGenic immediately informed the company that had developed the software about the issue. The software company fixed the issue; however, in the process of doing so, it modified some files that comprised sensitive information related to HealthGenic's patients. The modifications that were made resulted in incomplete and incorrect medical reports and, more importantly, invaded the patients' privacy.

Based on the scenario above, answer the following question:

According to scenario 1. to detect (1)____________________________, Antiques should have implemented (2)

A.

(1) Patches. (2) an access control software

B.

(1) Intrusions on networks. (?) an intrusion detection system

C.

(1) Technical vulnerabilities. (2) network intrusions

Question # 10

Employees of the Finance Department did not fully understand the awareness sessions. What should TradeB do to avoid similar situations in the future? Refer to scenario 6.

A.

Extend the duration of the training and awareness session

B.

Adjust awareness sessions to the target audience based on the activities they perform within the company

C.

Consider self-studies as the type of activities needed to address the competence gaps

Go to page: