<< Prev Question Next Question >>

Question 26/79

You ask the IT Manager why the organisation still uses the mobile app while personal data encryption and pseudonymization tests failed. Also, whether the Service Manager is authorized to approve the test.
The IT Manager explains the test results should be approved by him according to the software security management procedure. The reason why the encryption and pseudonymization functions failed is that these functions heavily slowed down the system and service performance. An extra 150% of resources are needed to cover this. The Service Manager agreed that access control is good enough and acceptable. That's why the Service Manager signed the approval.
You sample one of the medical staff's mobile and found that ABC's healthcare mobile app, version 1.01 is installed. You found that version 1.01 has no test record.
The IT Manager explains that because of frequent ransomware attacks, the outsourced mobile app development company gave a free minor update on the tested software, performed an emergency release of the updated software, and gave a verbal guarantee that there will be no impact on any security functions. Based on his 20 years of information security experience, there is no need to re-test.
You are preparing the audit findings Select two options that are correct.

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (79q)
Question 1: Select the words that best complete the sentence below to de...
Question 2: You are performing an ISMS audit at a residential nursing ho...
Question 3: Select two of the following options that are the responsibil...
Question 4: Which one of the following options describes the main purpos...
Question 5: You are the audit team leader conducting a third-party audit...
Question 6: You are an audit team leader who has just completed a third-...
Question 7: An auditor of organisation A performs an audit of supplier B...
Question 8: Which two of the following statements are true?...
Question 9: You are an experienced ISMS audit team leader providing guid...
Question 10: Select the word that best completes the sentence: (Exhibit)...
Question 11: Which two of the following statements are true?...
Question 12: An organisation is looking for management system initial cer...
Question 13: Auditor competence is a combination of knowledge and skills....
Question 14: What is the difference between a restricted and confidential...
Question 15: Select the words that best complete the sentence: (Exhibit)...
Question 16: You are an experienced ISMS auditor, currently providing sup...
Question 17: You are performing an ISMS audit at a residential nursing ho...
Question 18: During a follow-up audit, you notice that a nonconformity id...
Question 19: You are an experienced ISMS audit team leader providing guid...
Question 20: You are performing an ISMS audit at a residential nursing ho...
Question 21: Which of the following is not a type of Information Security...
Question 22: You are an experienced ISMS audit team leader. You are provi...
Question 23: You have just completed a scheduled information security aud...
Question 24: You are performing an ISMS audit at a residential nursing ho...
Question 25: Which of the following is not a type of Information Security...
Question 26: You ask the IT Manager why the organisation still uses the m...
Question 27: CMM stands for?
Question 28: What is we do in ACT - From PDCA cycle...
Question 29: Auditors should have certain knowledge and skills; while aud...
Question 30: You are performing an ISMS audit at a residential nursing ho...
Question 31: Please match the roles to the following descriptions: (Exhib...
Question 32: In acceptable use of Information Assets, which is the best p...
Question 33: Which two of the following are examples of audit methods tha...
Question 34: You are performing an ISMS audit at a residential nursing ho...
Question 35: You are an audit team leader conducting a third-party survei...
Question 36: You are carrying out a third-party surveillance audit of a c...
Question 37: The following are purposes of Information Security, except:...
Question 38: You are an experienced audit team leader conducting a third-...
Question 39: Which one of the following options is the definition of the ...
Question 40: You have a hard copy of a customer design document that you ...
Question 41: Who are allowed to access highly confidential files?...
Question 42: You are carrying out your first third-party ISMS surveillanc...
Question 43: Which two of the following are valid audit conclusions?...
Question 44: You are performing an ISMS audit at a residential nursing ho...
Question 45: The audit lifecycle describes the ISO 19011 process for cond...
Question 46: Which two of the following statements are true?...
Question 47: The following options are key actions involved in a first-pa...
Question 48: You are an experienced audit team leader guiding an auditor ...
Question 49: You are the audit team leader conducting a third-party audit...
Question 50: Your organisation is currently seeking ISO/IEC27001:2022 cer...
Question 51: You are a certification body auditor, conducting a surveilla...
Question 52: Audit methods can be either with or without interaction with...
Question 53: During a third-party certification audit you are presented w...
Question 54: During an opening meeting of a Stage 2 audit, the Managing D...
Question 55: Please match the following situations to the type of audit r...
Question 56: You are performing an ISMS audit at a nursing home where res...
Question 57: Which four of the following statements about audit reports a...
Question 58: You are an experienced ISMS audit team leader providing guid...
Question 59: You are an experienced ISMS audit team leader, talking to an...
Question 60: During discussions with the individual(s) managing the audit...
Question 61: In the event of an Information security incident, system use...
Question 62: You are carrying out your first third-party ISMS surveillanc...
Question 63: Match the correct responsibility with each participant of a ...
Question 64: You are an experienced ISMS audit team leader guiding an aud...
Question 65: You are the person responsible for managing the audit progra...
Question 66: You are conducting a third-party surveillance audit when ano...
Question 67: You are carrying out your first third-party ISMS surveillanc...
Question 68: Which two of the following phrases would apply to "audit obj...
Question 69: Select the words that best complete the sentence: To complet...
Question 70: Select the words that best complete the sentence: To complet...
Question 71: Which two of the following phrases would apply to 'check' in...
Question 72: You are an experienced ISMS audit team leader guiding an aud...
Question 73: You are conducting an ISMS audit in the despatch department ...
Question 74: Which two activities align with the "Check'' stage of the Pl...
Question 75: In the context of a third-party certification audit, confide...
Question 76: Objectives, criteria, and scope are critical features of a t...
Question 77: Which one of the following statements best describes the pur...
Question 78: You are an ISMS audit team leader tasked with conducting a f...
Question 79: You are performing an ISMS audit at a residential nursing ho...