Which three of the following options are an advantage of using a sampling plan for the audit?

Which three of the following options are an advantage of using a sampling plan for the audit?A . Overrules the auditor's instinctsB . Use of the plan for consecutive auditsC . Provides a suitable understanding of the ISMSD . Implements the audit plan efficientlyE . Gives confidence in the audit...

May 19, 2025 No Comments READ MORE +

Which two of the following phrases would apply to "plan" in relation to the Plan-Do-Check-Act cycle for a business process?

Which two of the following phrases would apply to "plan" in relation to the Plan-Do-Check-Act cycle for a business process?A . Retaining documentationB . Retaining documentationC . Organising changesD . Setting objectivesE . Training staffF . Providing ICT assetsView AnswerAnswer: DE Explanation: The Plan-Do-Check-Act (PDCA) cycle is a four-step method...

May 17, 2025 No Comments READ MORE +

Which is the glue that ties the triad together

Which is the glue that ties the triad togetherA . ProcessB . PeopleC . CollaborationD . TechnologyView AnswerAnswer: D Explanation: The triad refers to the three elements of information security: confidentiality, integrity and availability3. Technology is the glue that ties the triad together, as it provides the means to implement...

May 15, 2025 No Comments READ MORE +

In the event of an Information security incident, system users' roles and responsibilities are to be observed, except:

In the event of an Information security incident, system users' roles and responsibilities are to be observed, except: A. Report suspected or known incidents upon discovery through the Servicedesk B. Preserve evidence if necessary C. Cooperate with investigative personnel during investigation if needed D. Make the information security incident details...

May 15, 2025 No Comments READ MORE +

Which two of the following responses should the audit team leader make?

During an opening meeting of a Stage 2 audit, the Managing Director of the client organisation invites the audit team to view a new company video lasting 45 minutes. Which two of the following responses should the audit team leader make?A . Advise the Managing Director that the audit team...

May 11, 2025 No Comments READ MORE +

You ask the IT Manager why the organisation still uses the mobile app while personal data encryption and pseudonymisation tests failed. Also, whether the Service Manager is authorised to approve the test.

You ask the IT Manager why the organisation still uses the mobile app while personal data encryption and pseudonymisation tests failed. Also, whether the Service Manager is authorised to approve the test. The IT Manager explains the test results should be approved by him according to the software security management...

May 11, 2025 No Comments READ MORE +

You are an ISMS auditor conducting a third-party surveillance audit of a telecom's provider. You are in the equipment staging room where network switches are pre-programmed before being despatched to clients. You note that recently there has been a significant increase in the number of switches failing their initial configuration test and being returned for reprogramming.

You are an ISMS auditor conducting a third-party surveillance audit of a telecom's provider. You are in the equipment staging room where network switches are pre-programmed before being despatched to clients. You note that recently there has been a significant increase in the number of switches failing their initial configuration...

May 9, 2025 No Comments READ MORE +

Which four of the following actions should you take?

During a follow-up audit, you notice that a nonconformity identified for completion before the follow-up audit is still outstanding. Which four of the following actions should you take? A. Report the failure to address the corrective action for the outstanding nonconformity to the organisation's top management B. Immediately raise an...

May 7, 2025 No Comments READ MORE +

Which one action should you take?

You are an experienced ISMS auditor conducting a third-party surveillance audit at an organisation which offers ICT reclamation services. ICT equipment which companies no longer require is processed by the organisation. It Is either recommissioned and reused or is securely destroyed. You notice two servers on a bench in the...

May 5, 2025 No Comments READ MORE +