EXIN ISO/IEC 27001 Lead Implementer Exam (page: 5)
EXIN Certified ISO/IEC 27001 Lead Implementer
Updated on: 15-Feb-2026

An organization documented each security control that it Implemented by describing their functions in detail. Is this compliant with ISO/IEC 27001?

  1. No, the standard requires to document only the operation of processes and controls, so no description of each security control is needed
  2. No, because the documented information should have a strict format, including the date, version number and author identification
  3. Yes, but documenting each security control and not the process in general will make it difficult to review the documented information

Answer(s): C

Explanation:

According to ISO/IEC 27001:2022, clause 7.5, an organization is required to maintain documented information to support the operation of its processes and to have confidence that the processes are being carried out as planned. This includes documenting the information security policy, the scope of the ISMS, the risk assessment and treatment methodology, the statement of applicability, the risk treatment plan, the information security objectives, and the results of monitoring, measurement, analysis, evaluation, internal audit, and management review. However, the standard does not specify the level of detail or the format of the documented information, as long as it is suitable for the organization's needs and context. Therefore, documenting each security control that is implemented by describing their functions in detail is not a violation of the standard, but it may not be the most efficient or effective way to document the ISMS. Documenting each security control separately may make it harder to review, update, and communicate the documented information, and may also create unnecessary duplication or inconsistency. A better approach would be to document the processes and activities that involve the use of security controls, and to reference the relevant controls from Annex A or other sources. This way, the documented information would be more aligned with the process approach and the Plan-Do-Check-Act cycle that the standard promotes.


Reference:

ISO/IEC 27001:2022, Information security, cybersecurity and privacy protection -- Information security management systems -- Requirements, clauses 4.3, 5.2, 6.1, 6.2, 7.5, 8.2, 8.3, 9.1, 9.2, 9.3, and Annex A
ISO/IEC 27001:2022 Lead Implementer objectives and content, 4 and 5



Which security controls must be implemented to comply with ISO/IEC 27001?

  1. Those designed by the organization only
  2. Those included in the risk treatment plan
  3. Those listed in Annex A of ISO/IEC 27001, without any exception

Answer(s): B

Explanation:

ISO/IEC 27001:2022 does not prescribe a specific set of security controls that must be implemented by all organizations. Instead, it allows organizations to select and implement the controls that are appropriate for their context, based on the results of a risk assessment and a risk treatment plan. The risk treatment plan is a document that specifies the actions to be taken to address the identified risks, including the selection of controls from Annex A or other sources, the allocation of responsibilities, the expected outcomes, the priorities and the resources. Therefore, the security controls that must be implemented to comply with ISO/IEC 27001 are those that are included in the risk treatment plan, which may vary from one organization to another.


Reference:

ISO/IEC 27001:2022, clause 6.1.3
PECB ISO/IEC 27001 Lead Implementer Course, Module 5, slide 18



What is the main purpose of Annex A 7.1 Physical security perimeters of ISO/IEC 27001?

  1. To prevent unauthorized physical access, damage, and interference to the organization's information and other associated assets
  2. To maintain the confidentiality of information that is accessible by personnel or external parties
  3. To ensure access to information and other associated assets is defined and authorized

Answer(s): A

Explanation:

Annex A 7.1 of ISO/IEC 27001 : 2022 is a control that requires an organization to define and implement security perimeters and use them to protect areas that contain information and other associated assets. Information and information security assets can include data, infrastructure, software, hardware, and personnel. The main purpose of this control is to prevent unauthorized physical access, damage, and interference to these assets, which could compromise the confidentiality, integrity, and availability of the information. Physical security perimeters can include fences, walls, gates, locks, alarms, cameras, and other barriers or devices that restrict or monitor access to the facility or area. The organization should also consider the environmental and fire protection of the assets, as well as the disposal of any waste or media that could contain sensitive information.


Reference:

ISO/IEC 27001 : 2022 Lead Implementer Study Guide, Section 5.3.1.7, page 101 ISO/IEC 27001 : 2022 Lead Implementer Info Kit, page 17 ISO/IEC 27002 : 2022, Control 7.1 ­ Physical Security Perimeters123



An organization wants to enable the correlation and analysis of security-related events and other recorded data and to support investigations into information security incidents.
Which control should it implement?

  1. Use of privileged utility programs
  2. Clock synchronization
  3. Installation of software on operational systems

Answer(s): B

Explanation:

Clock synchronization is the control that enables the correlation and analysis of security-related events and other recorded data and to support investigations into information security incidents. According to ISO/IEC 27001:2022, Annex A, control A.8.23.1 states: "The clocks of all relevant information processing systems within an organization or security domain shall be synchronized with an agreed accurate time source." This ensures that the timestamps of the events and data are consistent and accurate across different systems and sources, which facilitates the identification of causal relationships, patterns, trends, and anomalies. Clock synchronization also helps to establish the sequence of events and the responsibility of the parties involved in an incident.


Reference:

ISO/IEC 27001:2022, Annex A, control A.8.23.1
PECB ISO/IEC 27001 Lead Implementer Course, Module 7, slide 21



The incident management process of an organization enables them to prepare for and respond to information security incidents. In addition, the organization has procedures in place for assessing information security events. According to ISO/IEC 27001, what else must an incident management process include?

  1. Processes for using knowledge gained from information security incidents
  2. Establishment of two information security incident response teams
  3. Processes for handling information security incidents of suppliers as defined in their agreements

Answer(s): A

Explanation:

According to ISO/IEC 27001, an incident management process must include processes for using knowledge gained from information security incidents to reduce the likelihood or impact of future incidents, and to improve the overall level of information security. This means that the organization should conduct a root cause analysis of the incidents, identify the lessons learned, and implement corrective actions to prevent recurrence or mitigate consequences. The organization should also document and communicate the results of the incident management process to relevant stakeholders, and update the risk assessment and treatment plan accordingly. (Must be taken from ISO/IEC 27001 : 2022 Lead Implementer resources)


Reference:

ISO/IEC 27001 : 2022 Lead Implementer Study guide and documents, specifically:
ISO/IEC 27001:2022, clause 10.2 Nonconformity and corrective action ISO/IEC 27001:2022, Annex A.16 Information security incident management ISO/IEC TS 27022:2021, clause 7.5.3.16 Information security incident management process PECB ISO/IEC 27001 Lead Implementer Course, Module 9: Incident Management



Viewing Page 5 of 44



Share your comments for EXIN ISO/IEC 27001 Lead Implementer exam with other users:

Jamil aljamil 12/4/2023 4:47:00 AM

it’s good but not senatios based
UNITED KINGDOM


tumz 1/16/2024 10:30:00 AM

very helpful
UNITED STATES


Matt 11/18/2023 2:32:00 AM

aligns with the pecd notes
Anonymous


Wafa 11/13/2023 3:06:00 AM

very helpful
Anonymous