New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

PECB ISO-IEC-27001-Lead-Implementer Exam - Topic 2 Question 64 Discussion

Actual exam question for PECB's ISO-IEC-27001-Lead-Implementer exam
Question #: 64
Topic #: 2
[All ISO-IEC-27001-Lead-Implementer Questions]

Scenario 3: Socket Inc. is a dynamic telecommunications company specializing in wireless products and services, committed to delivering high-quality and secure communication solutions. Socket Inc. leverages innovative technology, including the MongoDB database, renowned for its high availability, scalability, and flexibility, to provide reliable, accessible, efficient, and well-organized services to its customers. Recently, the company faced a security breach where external hackers exploited the default settings of its MongoDB database due to an oversight in the configuration settings, which had not been properly addressed. Fortunately, diligent data backups and centralized logging through a server ensured no loss of information. In response to this incident, Socket Inc. undertook a thorough evaluation of its security measures. The company recognized the urgent need to improve its information security and decided to implement an information security management system (ISMS) based on ISO/IEC 27001.

To improve its data security and protect its resources, Socket Inc. implemented entry controls and secure access points. These measures were designed to prevent unauthorized access to critical areas housing sensitive data and essential assets. In compliance with relevant laws, regulations, and ethical standards, Socket Inc. implemented pre-employment background checks tailored to business needs, information classification, and associated risks. A formalized disciplinary procedure was also established to address policy violations. Additionally, security measures were implemented for personnel working remotely to safeguard information accessed, processed, or stored outside the organization's premises.

Socket Inc. safeguarded its information processing facilities against power failures and other disruptions. Unauthorized access to critical records from external sources led to the implementation of data flow control services to prevent unauthorized access between departments and external networks. In addition, Socket Inc. used data masking based on the organization's topic-level general policy on access control and other related topic-level general policies and business requirements, considering applicable legislation. It also updated and documented all operating procedures for information processing facilities and ensured that they were accessible to top management exclusively.

The company also implemented a control to define and implement rules for the effective use of cryptography, including cryptographic key management, to protect the database from unauthorized access. The implementation was based on all relevant agreements, legislation, regulations, and the information classification scheme. Network segregation using VPNs was proposed to improve security and reduce administrative efforts.

Regarding the design and description of its security controls, Socket Inc. has categorized them into groups, consolidating all controls within a single document. Lastly, Socket Inc. implemented a new system to maintain, collect, and analyze information about information security threats and integrate information security into project management.

Based on the scenario above, answer the following question:

Which of the following physical controls was NOT included in Socket Inc.'s strategy?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Lenna
5 days ago
I think they focused on access controls and securing remote work, but I can't recall if they mentioned anything about surveillance systems.
upvoted 0 times
...
Brynn
10 days ago
I remember studying physical controls, but I'm not sure which ones were specifically mentioned in the scenario.
upvoted 0 times
...
Kaitlyn
15 days ago
The scenario provides a lot of information about the security measures Socket Inc. put in place, so I'll need to carefully review all the physical controls that were discussed. That way, I can determine which one was not included in their strategy.
upvoted 0 times
...
Magnolia
20 days ago
This question is all about identifying the physical control that Socket Inc. didn't implement. I'll need to pay close attention to the details in the scenario and make sure I don't overlook any of the physical security measures that were mentioned.
upvoted 0 times
...
Carole
25 days ago
Okay, let's see. The scenario talks about entry controls, secure access points, and protecting information processing facilities. I'll need to analyze those carefully to figure out which physical control was not part of Socket Inc.'s strategy.
upvoted 0 times
...
Vincent
1 month ago
Hmm, this seems like a tricky one. The scenario covers a lot of different security measures, so I'll need to make sure I don't miss any of the physical controls that were mentioned. I'll need to read through it thoroughly to identify the one that was not included.
upvoted 0 times
...
Francine
1 month ago
I think the key here is to focus on the physical controls that Socket Inc. implemented. The scenario mentions entry controls, secure access points, and measures to safeguard information processing facilities, so I'll need to carefully review those details to determine which physical control was not included.
upvoted 0 times
...

Save Cancel