Become PECB Certified with updated ISO-IEC-27001-Lead-Implementer exam questions and correct answers
The purpose of control 5.9 inventory of Information and other associated assets of ISO/IEC 27001 is to identify organization's information and other associated assets in order to preserve their information security and assign ownership. Which of the following actions docs NOT fulfill this purpose?
Scenario 5: OperazelT is a software development company that develops applications for various companiesworldwide. Recently, the company conducted a risk assessment in response to the evolving digital landscapeand emerging information security challenges. Through rigorous testing techniques like penetration testingand code review, the company identified issues in its IT systems, including improper user permissions,misconfigured security settings, and insecure network configurations. To resolve these issues and enhanceinformation security, OperazelT implemented an information security management system (ISMS) based onISO/IEC 27001.In a collaborative effort involving the implementation team, OperazelT thoroughly assessed its businessrequirements and internal and external environment, identified its key processes and activities, and identifiedand analyzed the interested parties to establish the preliminary scope of the ISMS. Followingthis, theimplementation team conducted a comprehensive review of the company's functional units, opting to includemost of the company departments within the ISMS scope. Additionally, the team decided to include internaland external physical locations, both external and internal issues referred to in clause 4.1, the requirements inclause 4.2, and the interfaces and dependencies between activities performed by the company. The ITmanager had a pivotal role in approving the final scope, reflecting OperazelT’s commitment to informationsecurity.OperazelT's information security team created a comprehensive information security policy that aligned withthe company's strategic direction and legal requirements, informed by risk assessment findings and businessstrategies. This policy, alongside specific policies detailing security issues and assigning roles andresponsibilities, was communicated internally and shared with external parties. The drafting, review, andapproval of these policies involved active participation from top management, ensuring a robust frameworkfor safeguarding information across all interested parties.As OperazelT moved forward, the company entered the policy implementation phase, with a detailed planencompassing security definition, role assignments, and training sessions. Lastly, the policy monitoring andmaintenance phase was conducted, where monitoring mechanisms were established to ensure the company'sinformation security policy is enforced and all employees comply with its requirements.To further strengthen its information security framework, OperazelT initiated a comprehensive gap analysis aspart of the ISMS implementation process. Rather than relying solely on internal assessments, OperazelT decided to involve the services of external consultants to assess the state of its ISMS. The companycollaborated with external consultants, which brought a fresh perspective and valuable insights to the gapanalysis process, enabling OperazelT to identify vulnerabilities and areas for improvement with a higherdegree of objectivity. Lastly, OperazelT created a committee whose mission includes ensuring the properoperation of the ISMS, overseeing the company's risk assessment process, managing information securityrelated issues, recommending solutions to nonconformities, and monitoring the implementation of correctionsand corrective actions.Based on the scenario above, answer the following question:Did OperazelT include all the necessary factors when determining its scope?
Scenario 5: Operaze is a small software development company that develops applications for various
companies around the world. Recently, the company conducted a risk assessment to assess the information
security risks that could arise from operating in a digital landscape. Using different testing methods, including
penetration Resting and code review, the company identified some issues in its ICT systems, including
improper user permissions, misconfigured security settings, and insecure network configurations. To resolve
these issues and enhance information security, Operaze decided to implement an information security
management system (ISMS) based on ISO/IEC 27001.
Considering that Operaze is a small company, the entire IT team was involved in the ISMS implementation
project. Initially, the company analyzed the business requirements and the internal and external environment,
identified its key processes and activities, and identified and analyzed the interested parties In addition, the top
management of Operaze decided to Insecurity policy and communicated it to all relevant interested parties In addition, other specific policies were
developed to elaborate on security issues and the roles and responsibilities were assigned to all interested
parties.
Following that, the HR manager claimed that the paperwork created by ISMS does not justify its value and the
implementation of the ISMS should be canceled However, the top management determined that this claim was
invalid and organized an awareness session to explain the benefits of the ISMS to all interested parties.
Operaze decided to migrate Its physical servers to their virtual servers on third-party infrastructure. The new
cloud computing solution brought additional changes to the company Operaze's top management, on the other
hand, aimed to not only implement an effective ISMS but also ensure the smooth running of the ISMS
operations. In this situation, Operaze's top management concluded that the services of external experts were
required to implement their information security strategies. The IT team, on the other hand, decided to initiate
a change in the ISMS scope and implemented the required modifications to the processes of the company.
Based on scenario 5. which committee should Operaze create to ensure the smooth running of the ISMS?
The purpose of control 5.9 inventory of Information and other associated assets of ISO/IEC 27001 is to identify organization's information and other associated assets in order to preserve their information security and assign ownership. Which of the following actions docs NOT fulfill this purpose?
© Copyrights DumpsCertify 2025. All Rights Reserved
We use cookies to ensure your best experience. So we hope you are happy to receive all cookies on the DumpsCertify.