PECB Lead-Cybersecurity-Manager - ISO/IEC 27032 Lead Cybersecurity Manager
Total 80 questions
Which of the following examples is NOT a principle of COBIT 2019?
Scenario 3: EsteeMed is a cardiovascular institute located in Orlando. Florida H Is known for tis exceptional cardiovascular and thoracic services and offers a range of advanced procedures, including vascular surgery, heart valve surgery, arrhythmia and ablation, and lead extraction. With a dedicated team of over 30 cardiologists and cardiovascular surgeons, supported by more than IUU specialized nurses and technicians, EsteeMed Is driven by a noble mission to save lives Every year. it provides its services to over 50,000 patients from across the globe.
As Its reputation continued to grow. EsteeMed recognized the importance of protecting Its critical assets. It Identified these assets and implemented the necessary measures to ensure their security Employing a widely adopted approach to Information security governance. EsteeMed established an organizational structure that connects the cybersecurity team with the information security sector under the IT Department.
Soon after these changes, there was an incident where an unauthorized employee transferred highly restricted patient data to the cloud The Incident was detected by Tony, the IT specialist. As no specific guidelines were in place to address such unlikely scenarios, Tony promptly reported the incident to his colleagues and, together. they alerted the board of managers Following that, the management of EsteeMed arranged a meeting with their cloud provider to address the situation.
During the meeting, the representatives of the cloud provider assured the management of the EsteeMed that the situation will be managed effectively The cloud provider considered the existing security measures sufficient to ensure the confidentiality, Integrity, and availability of the transferred data Additionally, they proposed a premium cloud security package that could offer enhanced protection for assets of this nature. Subsequently, EsteeMed's management conducted an internal meeting following the discussion with the cloud provider.
After thorough discussions, the management determined that the associated costs of implementing further security measures outweigh the potential risks at the present lime Therefore, they decided to accept the actual risk level for the time being. The likelihood of a similar incident occurring in the future was considered low. Furthermore, the cloud provider had already implemented robust security protocols.
To ensure effective risk management. EsteeMed had documented and reported its risk management process and outcomes through appropriate mechanisms, it recognized that decisions about the creation, retention, and handling of documented information should consider various factors. These factors include aspects such as the intended use of the Information. Its sensitivity, and the external and internal context in which It operates.
Lastly. EsteeMed identified and recorded its assets in an inventory to ensure their protection. The inventory contained detailed information such as the type of assets, their size, location, owner, and backup information.
Based on the scenario above, answer the following question:
What did EsteeMed's approach 10 protecting its critical assets Include after the incident occurred' Refer to scenario 3
Which of the following is NOT a responsibility of the information security manager (ISM) within an organization's cybersecurity framework?
What is malware?
Which of the following statements regarding best describes vulnerability assessment?
Which of the following recommendations should an organization take into account when applying the proposed implementation approach for a cybersecurity program?
Among others, which of the following factors should be considered when selecting a Tier, according to the NIST Framework for Improving Critical Infrastructure Cyber security?
What is one of the key steps involved in effective training needs analysis?
Scenario 4:SynthiTech is a huge global Technology company that provides Innovative software solutions and cybersecurity services to businesses in various industries, including finance, healthcare, and telecommunications. It is committed to deliver cutting-edge technology solutions while prioritizing the security and protection of its clients' digital assets
The company adopted a mode) designed to ensure efficient operations and meet the specific needs of different market segments across the world Within this structure, the company's divisions are divided into financial services, healthcare solutions, telecommunications, and research and development
To establish a robust cybersecurity program, SymhiTech established a cybersecurity program team consisting of several professionals that would be responsible for protecting its digital assets and ensuring the availability, integrity, and confidentiality of information, advising the cybersecurity manager in addressing any risks that arise, and assisting in strategic decisions. In addition, the team was responsible for ensuring that the program Is properly Implemented and maintained
Understanding the importance of effectively managing (he company's assets lo ensure operational efficiency and protect critical resources, the team created an inventory of SynthiTech's assets. The team initially identified all assets, as well as their location and status. The assets were included in the inventory, which was regularly updated to reflect organizational changes In addition, the team regularly assessed the risk associated with each digital asset.
SynthiTech follows a systematic approach to identify, assess, and mitigate potential risks. This involves conducting risk assessments to Identify vulnerabilities and potential threats that may impact its assets and operations. Its cybersecurity program team tested SynthiTech's ICT system from the viewpoint of a threat source and identified potential failures in the IC1 system protection scheme. I hey also collaborated with other divisions to assess the impact and likelihood of risk and developed appropriate risk mitigation strategies. Then, the team implemented security controls, such as firewalls, Intrusion detection systems, and encryption, to ensure protection against the Identified risks. The activities of the risk treatment plan to be undertaken were ranked based on the level of risk and urgency of the treatment.
The company recognizes that effective risk management is an ongoing process and ensures monitoring, evaluation, and continual improvement of the cybersecunty program to adapt to security challenges and technological advancements.
Based on the scenario above, answer the following question:
Did SynthiTech follow the steps for implementing us cybersecurity asset management program correctly' Refer to scenario 4.
An organization operating in the food industry has recently discovered that its warehouses, which store large amounts of valuable products, are unprotected and lacks proper surveillance, thus, presenting a vulnerability that con be exploited. Which of the following threats is typically associated with the identified vulnerability?