You have juststarted working at a large organization. You have been asked to sign a code of conduct as well as a contract. What does the organization wish to achieve with this?
Scenario 4: TradeB. a commercial bank that has just entered the market, accepts deposits from its clients and
offers basic financial services and loans for investments. TradeB has decided to implement an information
security management system (ISMS) based on ISO/IEC 27001 Having no experience of a management
[^system implementation, TradeB's top management contracted two experts to direct and manage the ISMS
implementation project.
First, the project team analyzed the 93 controls of ISO/IEC 27001 Annex A and listed only the security
controls deemed applicable to the company and their objectives Based on this analysis, they drafted the
Statement of Applicability. Afterward, they conducted a risk assessment, during which they identified assets,
such as hardware, software, and networks, as well as threats and vulnerabilities, assessed potential
consequences and likelihood, and determined the level of risks based on three nonnumerical categories (low,
medium, and high). They evaluated the risks based on the risk evaluation criteria and decided to treat only the
high risk category They also decided to focus primarily on the unauthorized use of administrator rights and
system interruptions due to several hardware failures by establishing a new version of the access control
policy, implementing controls to manage and control user access, and implementing a control for ICT
readiness for business continuity
Lastly, they drafted a risk assessment report, in which they wrote that if after the implementation of thesesecurity controls the level of risk is below the acceptable level, the risks will be accepted
Based on scenario 4, the fact that TradeB defined the level of risk based on three nonnumerical categories
indicates that;
Scenario 1: HealthGenic is a pediatric clinic that monitors the health and growth of individuals from infancy to
early adulthood using a web-based medical software. The software is also used to schedule appointments,
create customized medical reports, store patients' data and medical history, and communicate with all the
[^involved parties, including parents, other physicians, and the medical laboratory staff.
Last month, HealthGenic experienced a number of service interruptions due to the increased number of users
accessing the software Another issue the company faced while using the software was the complicated user
interface, which the untrained personnel found challenging to use.
The top management of HealthGenic immediately informed the company that had developed the software
about the issue. The software company fixed the issue; however, in the process of doing so, it modified some
files that comprised sensitive information related to HealthGenic's patients. The modifications that were made
resulted in incomplete and incorrect medical reports and, more importantly, invaded the patients' privacy.
Intrinsic vulnerabilities, such as the______________ are related to the characteristics of the asset. Refer to
scenario 1.
Scenario 9: OpenTech provides IT and communications services. It helps data communication enterprises and
network operators become multi-service providers During an internal audit, its internal auditor, Tim, has
identified nonconformities related to the monitoring procedures He identified and evaluated several system
Invulnerabilities.
Tim found out that user IDs for systems and services that process sensitive information have been reused and
the access control policy has not been followed After analyzing the root causes of this nonconformity, the
ISMS project manager developed a list of possible actions to resolve the nonconformity. Then, the ISMS
project manager analyzed the list and selected the activities that would allow the elimination of the root cause
and the prevention of a similar situation in the future. These activities were included in an action plan The
action plan, approved by the top management, was written as follows:
A new version of the access control policy will be established and new restrictions will be created to ensure
that network access is effectively managed and monitored by the Information and Communication Technology
(ICT) Department
The approved action plan was implemented and all actions described in the plan were documented.
Based on this scenario, answer the following question:
OpenTech has decided to establish a new version of its access control policy. What should the company do
when such changes occur?
Scenario 1: HealthGenic is a pediatric clinic that monitors the health and growth of individuals from infancy to
early adulthood using a web-based medical software. The software is also used to schedule appointments,
create customized medical reports, store patients' data and medical history, and communicate with all the
[^involved parties, including parents, other physicians, and the medical laboratory staff.
Last month, HealthGenic experienced a number of service interruptions due to the increased number of users
accessing the software Another issue the company faced while using the software was the complicated user
interface, which the untrained personnel found challenging to use.
The top management of HealthGenic immediately informed the company that had developed the software
about the issue. The software company fixed the issue; however, in the process of doing so, it modified some
files that comprised sensitive information related to HealthGenic's patients. The modifications that were made
resulted in incomplete and incorrect medical reports and, more importantly, invaded the patients' privacy.Based on the scenario above, answer the following question:
Which of the following indicates that the confidentiality of information was compromised?
© Copyrights FreePDFQuestions 2026. All Rights Reserved
We use cookies to ensure that we give you the best experience on our website (FreePDFQuestions). If you continue without changing your settings, we'll assume that you are happy to receive all cookies on the FreePDFQuestions.