Information Security Management Expert based on ISO/IEC 27002

Similar documents
EXIN Information Security Management Advanced

Preparation Guide. EXIN IT Service Management Executive Consultant/Manager based on ISO/IEC 20000

List of courses offered by Marc Taillefer

Preparation Guide. Side entry to the EXIN Expert in IT Service Management based on ISO/IEC 20000

EXIN Foundation in IT Service Management based on ISO/IEC 20000

Foundation Bridge in IT Service Management (ITSM) according to ISO/IEC Specification Sheet. ISO/IEC Foundation Bridge TÜV SÜD Akademie

Preparation Guide. EXIN IT Service Management Associate Bridge based on ISO/IEC 20000

Preparation Guide. EXIN IT Service Management Associate based on ISO/IEC 20000

Preparation Guide. IT Service Management Foundation Bridge based on ISO/IEC 20000

IT Service Management Practitioner: Support & Restore (based on ITIL ) (IPSR.EN)

Preparation Guide. EXIN Agile Scrum Foundation

Preparation Guide. Microsoft Operations Framework Foundation

Factsheet ITIL -V3 Capability module Release, Control and Validation

-Blue Print- The Quality Approach towards IT Service Management

ITIL Intermediate Qualification: Service Offerings and Agreement. Webinar presentation 8 May 2009

INTERMEDIATE QUALIFICATION

White paper. Secure Cloud Services: An Integrated Approach

Preparation Guide. EXIN Cloud Computing Foundation

Factsheet ITIL -V3 Capability module Service Offerings and Agreements

Preparation Guide Content. EXIN Cloud. 1. Overview 4 2. Exam Requirements 6 3. List of Basic Concepts 9 4. Exam Literature 13. Computing Foundation

IT Service Management Practitioner: Plan & Improve (based on ITIL ) (IPPI.EN)

BUSINESS STRATEGY SYLLABUS

Frameworks for IT Management

BCS Specialist Certificate in Change Management Syllabus

MASTER S DEGREE IN EUROPEAN STUDIES

Methods Commission CLUB DE LA SECURITE DE L INFORMATION FRANÇAIS. 30, rue Pierre Semard, PARIS

Mid and End of Placement Assessment Report Doctorate in Clinical Neuropsychology

NVAO Initial Accreditation Assessment. International Business Innovation Studies - Inholland University of Applied Sciences (003108)

ITIL V3 Service Design Certification Program 3 Days

Key Steps to a Management Skills Audit

Document Control Information

Internship Guidelines

ITIL Intermediate: Service Design. Lesson Plan. Mock Exam: Duration: Language:

ITIL V3 - The Future Is Here

Business Project First year (EN)

PINK ELEPHANT THOUGHT LEADERSHIP WHITE PAPER DEVELOPING AN IT SERVICE MANAGEMENT TRAINING STRATEGY & PLAN

Integrating HR & Talent Management Processes

NORTH STRATHCLYDE COMMUNITY JUSTICE AUTHORITY

Certification criteria for. Internal QMS Auditor Training Course

ITIL Intermediate Qualification: Service Strategy Certificate. Webinar presentation 15 April 2009

ISMS Implementation Guide

ITIL CSI 2011 Vernon Lloyd

THESIS GUIDELINES. Master s of Science

USING THE PRINCIPLES OF ITIL ; SERVICE CATALOGUE

Agile Service Projects

Sample Exam. IT Service Management Foundation based on ISO/IEC 20000

Governance and Management of Information Security

Guideline. Records Management Strategy. Public Record Office Victoria PROS 10/10 Strategic Management. Version Number: 1.0. Issue Date: 19/07/2010

Frameworks for IT Management

INTERMEDIATE QUALIFICATION

Professor: Dr. Esra Memili Office: 370 Bryan Office Hours: Monday 2:00-6:00pm and 8:50-9:50pm, and by appointment

USING THE PRINCIPLES OF ITIL ; SERVICE CATALOGUE. Examination Syllabus V 1.2. October 2009

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

Audit Report. Effectiveness of IT Controls at the Global Fund Follow-up report. GF-OIG-15-20b 26 November 2015 Geneva, Switzerland

NABET Criteria for INFORMATION SECURITY MANAGEMENT SYSTEMS (ISMS) Lead Auditor Training Courses

INTERMEDIATE QUALIFICATION

Communication and Problem Solving

Welcome to Asset Training Australia!

Presentation on COBIT Education

EXIN Agile Scrum Foundation

ISO20000: What it is and how it relates to ITIL v3

INSTRUCTIONS FOR PRE-EXAMINERS AND OPPONENTS AT PUBLIC DEFENCES OF DOCTORAL DISSERTATIONS

COMPETENCIES FOR TRAINERS

Information. Security Series. Evaluate Your. Information. Security Program. Survey to find out if you are making progress

Spillemyndigheden s Certification Programme Change Management Programme

Recent Advances in Automatic Control, Information and Communications

Engagement with Public Security Forces - Iraq 1

GUIDE 62. General requirements for bodies operating assessment and certification/registration of quality systems

EXIN IT Service Management Foundation based on ISO/IEC 20000

Initial Professional Development Technical Competence (Revised)

THE UNIVERSITY OF HONG KONG FACULTY OF BUSINESS AND ECONOMICS. School of Business MGMT2401 J, K: Principles of Management Second Semester

Document Control Information

ITIL 2011 Service Design Certification Program - 3 Days

Keystone STARS Core Series Training FY 05/06

BCS Specialist Certificate in Business Relationship Management Syllabus. Version 1.9 March 2015

MEDICAL OFFICE ASSISTANT

Practicum/Internship Handbook. Office of Educational Field Experiences

TOWN OF NEEDHAM PUBLIC WORKS PERFORMANCE EVALUATION POLICY #419

Background. Scope. Organizational Training Needs

International Relations

Thank you for taking the opportunity to participate in this module on Getting Ready for Performance Evaluations.!s you know, the University has

ETSI EN V2.2.2 ( )

GRADUATE STUDENT GUIDE MECHANICAL ENGINEERING (ME) PROGRAM MS

ITIL V3 Service Operation Certification Program

the role of the head of internal audit in public service organisations 2010

EXIN Accredited 4 days workshop on ITIL Intermediate Qualification- Release Control & Validation Certificate

An Overview of ISO/IEC family of Information Security Management System Standards

International Semester Social Work. September 2016 January Faculty of Social Work and Education

IT Governance using COBIT implemented in a High Public Educational Institution A Case Study

How to appraise or assess an architect?

Succession Plan. Planning Information and Plan Template December Succession Planning 2010

Nova Scotia Board of Examiners in Psychology

Primary PGCE Information for Applicants and Frequently Asked Questions

Science teachers pedagogical studies in Finland

Henley Business School Henley Executive MBA For students entering from 2011 onwards

Learning and Teaching

Author Guidelines: What to Submit & How

Transcription:

Preparation Guide Information Security Management Expert based on ISO/IEC 27002 Edition April 2014

Content 1. Overview 3 2. Exam requirements 7 3. List of basic concepts 15 4. Literature 16 Copyright 2014 EXIN All rights reserved. No part of this publication may be published, reproduced, copied or stored in a data processing system or circulated in any form by print, photo print, microfilm or any other means without written permission by EXIN.. 2

1. Overview Module name Information Security Management Expert based on ISO/IEC 27002 (ISMES.EN 1 ) Summary Information security is becoming increasingly important. Globalization of the economy leads to a growing exchange of information between organizations (their employees, customers and suppliers) and a growing use of networks, such as the internal company network, connection with the networks of other companies and the Internet. Other relevant trends include: (international) standards and certification in the field of information security continuing computerization of (IT) management development of automated security tools remote control outsourcing of management tasks compliancy Furthermore, activities of many companies now rely on IT, and information has become a valuable asset. Protection of information is crucial for the continuity and proper functioning of the organization: information must be reliable. The international standard, the Code of Practice for Information Security ISO/IEC 27002:2013 structures the organization of information security. For that reason, it is an important point of departure for this module. In the Information Security modules the definition of the Dutch platform of information security professionals is being used: Information Security deals with the definition, implementation, maintenance, compliance and evaluation of a coherent set of measures which safeguard the availability, integrity and confidentiality of the (manual and automated) information supply. The module Information Security Management Expert based on ISO/IEC 27002 (ISMES.EN) tests specialized knowledge, understanding and skills in structuring, maintaining and optimizing the security of information within an organization. Context The ISMES module is the continuation of Information Security Foundation based on ISO/IEC 27002 (ISFS.EN) and Information Security Management Advanced based on ISO/IEC 27002 (ISMAS.EN). 1 The S in the module code stands for: based on the standard. 3

The ISFS module tests basic concepts of information security and their interrelationships. The ISFS target group consists of everyone in the organization. The ISMAS module tests organizational and management aspects of information security, and it is geared toward those who, due to their position, are involved in the implementation and evaluation of information security, like the Information Security Manager, ISM) and the Information Security Officer, (ISO) or the Line Manager and the Project Manager. Target group IT professionals responsible for the partial or overall set up and development of structural information security, like the Chief Information Security Officer, CISO, the Information Security Manager, ISM, or the Business Information Security Architect, BISA. 4

Prerequisites The Information Security Management Advanced based on ISO/IEC 27002 Certificate. The participant has to have at least 2 years of tangible practical experience at the management level in at least two of the main topic areas (examination requirements) of this module. Requirements for the certificate The Information Security Management Expert training course or coaching track with an EXIN accredited training provider (ATP). Successful completion of the exam Information Security Management Expert. Examination type The Information Security Management Expert exam contains two parts: 1. The written part, a practical project In the chapter on the structure of the exam, the procedure for the practical project is outlined. 2. The oral examination In the chapter on the structure of the exam, the procedure of the oral exam is outlined. The written part has to be successfully completed before the oral exam can be taken. The language for all parts of the exam is English. The candidate can make use of translators and translations. Examination study load The estimated study load of the module Information Security Management Expert based on ISO/IEC 27002 is 200 hours, depending on knowledge and experience. Practical assignments Not applicable. Time allotted for examination The oral exam will take 90 minutes. Examination details Number of questions: not applicable Pass mark: 55% Open book/notes: power point presentation Electronic equipment permitted: yes, for power point presentation Sample questions To prepare for your examination you can order the Guide for candidates at http://www.exin.com. 5

Training Group size The maximum group size for a course is 8. Contact hours The training can consist of a course of several days, complemented with coaching or can consist of only coaching. The number of contact hours depends on how much coaching the participant needs in order to be ready for the exam. Procedure A documented procedure for the ISMES training could be: Intake Filing Assessment of prerequisites (certificates, experience) Analysis of gaps between current level and required competencies and deliverables for ISMES Services offered to fill in the gaps (for example training, coaching, project paper evaluation, peer interaction) The services can be composed according to the individual s needs Design individual training plan Exam registration at EXIN Exam preparation (i.e. practice the oral exam, individually or in peer group) Evaluation Training provider A list of accredited training providers may be found on EXIN s website http://www.exin.com. 6

2. Exam requirements The exam requirements are specified in the exam specifications. The following table lists the topics of the module (exam requirements). The weight of the different topics in the exam is expressed as a percentage of the total. Exam requirements weight (%) 1. Organization of information security (establishing ISMS) 20 2. Information security policy 10 3. Risk analysis 10 4. Organizational change and development pertaining to Information Security 40 5. Standards and norms 10 6. Audits and certification 10 Exam matrix The exam matrix specifies the number and weight of the questions in the oral exam, based on the exam requirements and specifications. Exam requirement Exam specifications at mastery level Weight (%) 1 Organization 20 1.1 Risk management 1.2 Roles 1.3 Reporting 2 Policy 10 2.1 Establish policy 2.2 Promote policy 3 Risk analysis 10 3.1 Conduct analysis 3.2 Analyze 4 Organizational change 40 4.1 Plan 4.2 Awareness 4.3 Interventions 5 Standards 10 5.1 Choose standards 7

6 Audit and certification 10 6.1 Execute audit 6.2 Evaluate ISMS Total 100 Justification of choices At the mastery level, there is no need to provide details on the underlying specifications for the breakup of the curriculum questions. The number of questions per exam, is dependent upon what the candidate has presented/answered during the oral exam. During the exam, the examiners will determine which specifications warrant further questioning, and doing so, they weigh the significance of each area carefully. Exam specifications 1. Organization of information security (establishing ISMS) (20%) 1.1 The candidate can substantiate the risk management process in relationship with the ISMS. Within a particular organization, in a specific situation, the candidate can: 1.1.1 pinpoint the importance and the consequences of various ISMS activities for the organization; 1.1.2 define the scope of the ISMS in terms of the characteristics of the business activities, the organization, the location, assets and technology; 1.1.3 describe the importance of the ISMS in a convincing way. 1.2 The candidate can define the roles of information security. Within a particular organization, in a specific situation, the candidate can: 1.2.1 determine and explain the different tasks, responsibilities and authorities; 1.2.2 determine and implement the different procedures, guidelines and rules 1.3 The candidate can set up and use a reporting system for the management. Within a particular organization, in a specific situation, the candidate can: 1.3.1 review the ISMS for suitability and effectiveness; 1.3.2 define opportunities for improvement. 8

2. Information security policy (10%) 2.1 The candidate can participate in the process of establishing the information security policy. The candidate can, within an organization, in a specific situation: 2.1.1 indicate what steps need to be taken to establish an information security policy. 2.2 The candidate can formulate, present and promote an information security policy. Within a particular organization, in a specific situation, the candidate can: 2.2.1 formulate an information security policy, while taking into account the goals of the organization, the legal framework and the organizational and technical options; 2.2.2 present and promote the established information security policy; 2.2.3 ensure acceptance of the consequences at the management level. 3. Risk analysis (10%) 3.1 Based on an understanding of various risk analysis methods, the candidate can conduct a risk analysis or guide the execution of a risk analysis. Within a particular organization, in a specific situation, the candidate can: 3.1.1 apply the risk analysis method of choice; 3.1.2 clarify various steps of the risk analysis. 3.2 The candidate can analyze the results of the risk analysis. Within a particular organization, in a specific situation, the candidate can: 3.2.1 evaluate the various intermediate results of the risk analysis; 3.2.2 evaluate the relationship between intermediate results from the risk analysis for consistency; 3.2.3 evaluate the end result of the risk analysis based on usefulness and comprehensiveness. 4. Organizational change and development, pertaining to Information Security (40%) 4.1 In a certain situation, the candidate is able to come up with or adapt a plan for change. Within a particular organization, in a specific situation, the candidate can: 4.1.1 evaluate the developmental level (level of growth) of the ISMS; 4.1.2 name the characteristics of the organizational culture as well as the opportunities and limitations for the development of the ISMS; 4.1.3 define a strategy for change and formulate the intended results. 9

4.2 The candidate can come up with an awareness program, communicate it, present it and implement it. In a particular situation within the organization, the candidate can: 4.2.1 determine for specific target groups, which change in knowledge, attitude and behavior, can contribute to the improvement of the ISMS; 4.2.2 name the success factors and compare the effectiveness of resources; 4.2.3 develop an approach to a communication plan; 4.2.4 present, defend and -if necessary- adjust proposals for change or the policy of the ISMS at management level, verbally as well as in writing. 4.3 In a particular situation within an organization, the candidate can: 4.3.1 clarify, implement and guarantee interventions in the organization; 4.3.2 deal effectively with opinions and feelings of members of the organization, and have different options for interventions; 4.3.3 evaluate the interventions that were implemented and reflect on one s own role. 5. Standards and norms (10%) 5.1 In a particular situation, the candidate can choose and use relevant standards. Within a particular organization, in a specific situation, the candidate can: 5.1.1 indicate what the consequences are when choosing a particular standard; 5.1.2 guide the process of using a particular standard; 5.1.3 evaluate and maintain the implemented framework of norms or a baseline construction. 6. Audit and certification (10%) 6.1 The candidate can organize the execution of audits. Within a particular organization, in a specific situation, the candidate can: 6.1.1 draft an audit program; 6.1.2 guide the execution of an audit; 6.1.3 suggest improvements, based on the results of the audit. 6.2 The candidate can participate in a management review of the ISMS Within a particular organization, in a specific situation, the candidate can: 6.2.1 facilitate the introduction of a management review; 6.2.2 suggest improvements, based on the review results; 6.2.3 document the results of the management review. 10

Justification of choices Examination requirement 4 is the core of the structure of information security within an organization, requirement 1 specifies what needs to be put in place, and the remaining requirements detail the set-up. The specifications do not contain any concrete techniques, because these techniques are part and parcel of the curriculum of the candidate. Between candidates there can be differences regarding content due to the contents of the presentation or alternatively, due to the selected curriculum. Examination design The exam for the module Security Management Expert based on ISO/IEC 27002 (ISMES.EN) is divided into two parts: 1. the candidate s practical project 2. the oral exam The candidate s project The written part contains a practical project of approximately 6000 words about one of the following ISMES subjects: Security Awareness plan Risk analysis Change plan ISMS plan Audit plan Quick scan Information Security policy About eight weeks prior to the proposed date for the oral exam, three copies of this project have to be sent to EXIN. The candidate is expected to include and send a management summary of the project. The criteria for the summary can be found in the Guide. The candidate also has to include a short resume to the project, outlining that he or she has had at least 2 years of management work experience at the management level in the areas of at least 2 examination requirements. The trainer will add an account of the relation between the selected topic and the examination requirement. The content of the practical project has to be related to the professional context of the candidate. The heart of the project could consist of one (of the aforementioned) documents, provided that the candidate is the author or co-author who has had a clear say in the contents of the document. In that case it should -at least- be supplemented by an introductory and final chapter, making clear what the level of involvement of the candidate has been. 11

Some of the elements of an introductory chapter are: the reason for introducing this particular document to the organization, and the relating question and purpose; the role the candidate played in the creation of the document; the role/status of the document within the organization. Some of the elements of the final chapter are: Well-thought out reflections on the different components of the process. This demonstrates how the candidate was involved; what the candidate encountered, what alternatives presented themselves, what could be improved upon next time, etcetera. A link to the introductory chapter, e.g. to the question and purpose. Ideally, the entire practical project should be written for ISMES; for example, as the logical continuation of an ongoing project, or because of the needs of the organization the candidate works for. The aforementioned guidelines for an introductory and final chapter also apply. There are criteria for every one of the aforementioned types of projects. These are listed in detail in a candidate s Guide. It is highly recommended that the candidate sends a plan for the project paper to EXIN in an early stage in order to have the minimum requirements checked. When a candidate is not able to write a practical paper based on his or her work environment, the candidate can write a paper based on the case study. This decision is taken by the trainer together with the candidate. The case study is available in the ISMES Guide. Should the candidate choose to use the case study, he or she needs to make clear what kind of personal experience was used, what relevant similarities/differences there are with his/her own work professional context, what he/she has learned from the case study that is relevant to his/her own professional environment etcetera. The project is evaluated by two EXIN examiners. Criteria have been developed for the aforementioned ISMES sections, and a project needs to meet those criteria. Apart from the contents, the layout and motivation of the project will also be evaluated (including correct use of language and style). After the evaluation, EXIN will send project feedback to the trainer. Oral exam The candidate only has access to the oral exam when his or her practical project has received a satisfactory rating (55% or more). 12

The oral exam for Information Security Management Expert based on ISO/IEC 27002 (ISMES) consists of four parts: I A presentation by the candidate The exam starts with a presentation by the candidate. He or she will do a presentation about the project they worked on. The presentation will simulate a situation in which the candidate gives a presentation to the management team with the purpose of persuading management, and to gain acceptance for certain proposals. The presentation will be evaluated on the basis of whether or not it was sufficiently geared toward the management team. The presentation lasts for a maximum of 15 minutes. An overview of the evaluation criteria can be found in the ISMES Guide (oral section). II An examination interview based on the presentation The second part of the exam consists of a conversation with the examiners about the presentation. The examiners will question the candidate in a critical way, as if they were members of the management team. The examiners could ask questions about the contents of the presentation. This conversation takes up (a maximum of ) 15 minutes. An overview of the evaluation criteria can be found in the Guide. III An examination interview about the other examination requirements In the third and last part of the exam, the examiners will ask questions about the examination requirements that were not the focus of the presentation, or in the conversation about the presentation. The examiners no longer play the part of the management team. What will be assessed is whether or not the candidate is capable to use the contents of ISMES outside their own professional context, if they can relate the project and the presentation, to their own professional context and recent developments in this specialty. Apart from that, the candidate s ability to reflect on their own conduct in relation to the contents of the module, can be assessed. This means that the candidate also has to be able to step outside the way their company operates, and they should have an understanding of the topics listed in the examination requirements. This final examination interview lasts 25 minutes. An overview of the examination criteria can be found in the Guide. IV Final result Immediately following the exam, the examiners will reach mutual agreement and will come to a final conclusion, resulting in a final mark. This takes 25 minutes. After that, the examiners notify the candidate verbally of the final mark, and they will clarify their final decision. This takes 10 minutes. The entire exam will take a maximum total of 90 minutes. The examination session During the presentation, the candidate is required to use power point slides from a cd or from their own laptop. 13

Immediately before the presentation, the examiners are provided with two sets of one-sided prints of the slides. The presentation starts with: o One slide with the title of the presentation. o One slide with the name of the candidate, his/her job title, the company and the type of company. The presentation is about the practical project, so it is not about the career history of the examinee, and it is not a description of the company the candidate works for or a description of the candidate s own company. During the presentation, the examiners can only ask clarification questions. The entire oral exam is documented using recording equipment. It is not permitted to influence the examiners by disclosing business- or private matters. The following persons are present at the oral exam: the candidate two examiners The candidate s trainer/supervisor can attend the oral exam as observer, when the candidate has given his or her approval. The exam session can be done via a web conference with video and audio facilities. In that case an EXIN accredited supervisor should be present on the candidate s side. Time frame The entire examination session lasts a maximum of 90 minutes, including communication of the result. The examination is structured as follows: 15 minutes (maximum) for the presentation 15 minutes for discussing the presentation 25 minutes for the examination interview about the other exam requirements 25 minutes evaluation meeting among the examiners 10 minutes for discussing the outcome with the candidate Conclusion The examiners evaluate the three parts of the exam based on three evaluation tools. Once the exam is over, the examiners discuss and determine the final mark and justify the result. 14

3. List of basic concepts The basic concepts as required by ISFS and ISMAS are expected to be common knowledge. 15

4. Literature Exam literature The literature as required by ISFS and ISMAS is expected to be common knowledge. The following list contains reading suggestions pertaining to the examination requirements and examination specifications. A B C D E ISO/IEC 27001:2013 (EN) Information technology - Security techniques - Information security management systems - Requirements Switzerland, ISO/IEC, 2013 www.iso.org ISO/IEC 27002:2013 (EN) Information technology - Security techniques - Code of practice for information security controls Switzerland, ISO/IEC, 2013 www.iso.org ISO/IEC 27000:2014 (EN) Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary Switzerland, ISO/IEC, 2014 www.iso.org ISO/IEC 27005:2011 (EN) Information technology -- Security techniques -- Information security risk management Switzerland, ISO/IEC, 2011 www.iso.org ISO/IEC 27799:2008 (EN) Health informatics -- Information security management in health using ISO/IEC 27002 Switzerland, ISO/IEC, 2009 www.iso.org F FIPS 200 Minimum Security Requirements for Federal Information and Information Systems http://csrc.nist.gov/publications/fips/fips200/fips-200-final-march.pdf 16

G ISO/IEC 21827:2008 Information technology -- Security techniques -- Systems Security Engineering -- Capability Maturity Model (SSE-CMM ) Switzerland, ISO/IEC, 2008 www.iso.org H ISO/IEC 27035:2011 Information technology -- Security techniques -- Information security incident management Switzerland, ISO/IEC, 2011 www.iso.org I J K Carnal, C.A. Managing Change in Organizations Financial Times/ Prentice, fourth ed., 2007 ISBN10 0273704141 ISBN13 9780273704140 J. Slocum and D. Hellriegel Principles of Organizational Behavior England, South-West Thomson Learning, 2010 ISBN: 9780538743341 Robbins, S.P. Organizational Behavior Prentice Hall, 13th edition, 2008 ISBN10 013207964X ISBN13 9780132079648 L Clinch, J. ITIL V3 and Information Security OGC White Paper May 2009 http://www.best-managementpractice.com/gempdf/itilv3_and_information_security_white_paper_may09.pdf M Cazemier, Jacques A., Paul Overbeek and Louk Peters Security Management Best Practice Van Haren, January 2010 ISBN 978-90-8753-548 3 Justification of choices At expert level, candidates are responsible for their own information needs. In order to guide this process, suggestions of pertaining literature, articles have been included. 17

This is not a comprehensive list, and there is no guarantee that the curriculum is covered in its entirety. On the other hand, the available literature is quite comprehensive, making the choices quite arbitrary and it does not do justice to the freedom of choice a candidate has at this level. 18

19

Contact EXIN www.exin.com