Summer Special - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

Pearson ISO-IEC-27035-Lead-Incident-Manager New Attempt

PECB Certified ISO/IEC 27035 Lead Incident Manager Questions and Answers

Question 17

Which document provides guidelines for planning and preparing for incident response and for learning lessons from the incident response process?

Options:

A.

ISO/IEC 27035-1

B.

ISO/IEC 27035-2

C.

ISO/IEC 27037

Question 18

Scenario 6: EastCyber has established itself as a premier cyber security company that offers threat detection, vulnerability assessment, and penetration testing tailored to protect organizations from emerging cyber threats. The company effectively utilizes ISO/IEC 27035*1 and 27035-2 standards, enhancing its capability to manage information security incidents.

EastCyber appointed an information security management team led by Mike Despite limited resources, Mike and the team implemented advanced monitoring protocols to ensure that every device within the company’s purview is under constant surveillance This monitoring approach is crucial for covering everything thoroughly, enabling the information security and cyber management team to proactively detect and respond to any sign of unauthorized access, modifications, or malicious activity within its systems and networks.

In addition, they focused on establishing an advanced network traffic monitoring system This system carefully monitors network activity, quickly spotting and alerting the security team to unauthorized actions This vigilance is pivotal in maintaining the integrity of EastCyber’s digital infrastructure and ensuring the confidentiality, availability, and integrity of the data it protects.

Furthermore, the team focused on documentation management. They meticulously crafted a procedure to ensure thorough documentation of information security events. Based on this procedure, the company would document only the events that escalate into high-severity incidents and the subsequent actions. This documentation strategy streamlines the incident management process, enabling the team to allocate resources more effectively and focus on incidents that pose the greatest threat.

A recent incident involving unauthorized access to company phones highlighted the critical nature of incident management. Nate, the incident coordinator, quickly prepared an exhaustive incident report. His report detailed an analysis of the situation, identifying the problem and its cause. However, it became evident that assessing the seriousness and the urgency of a response was inadvertently overlooked.

In response to the incident, EastCyber addressed the exploited vulnerabilities. This action started the eradication phase, aimed at systematically eliminating the elements of the incident. This approach addresses the immediate concerns and strengthens EastCyber’s defenses against similar threats in the future.

Scenario 6: EastCyber has established itself as a premier cybersecurity company that offers threat detection, vulnerability assessment, and penetration testing tailored to protect organizations from emerging cyber threats. The company effectively utilizes ISO/IEC 27035-1 and 27035-2 standards, enhancing its capability to manage information security incidents.

EastCyber appointed an information security management team led by Mike. Despite limited resources, Mike and the team implemented advanced monitoring protocols to ensure that every device within the company’s purview is under constant surveillance. This monitoring approach is crucial for covering everything thoroughly, enabling the information security and cyber management team to proactively detect and respond to any sign of unauthorized access, modifications, or malicious activity within its systems and networks.

Based on the scenario above, answer the following question:

While implementing monitoring protocols, Mike ensured that every device within the company's purview was under constant surveillance. Is this a recommended practice?

Options:

A.

Yes. Mike defined the objective of network monitoring correctly

B.

No, Mike should have focused on new devices, as they are more likely to have undetected vulnerabilities

C.

No, Mike should have focused on the essential components to reduce the clutter and noise in the data collected

Question 19

Why is it important to identify all impacted hosts during the eradication phase?

Options:

A.

To facilitate recovery efforts

B.

To optimize hardware performance

C.

To enhance overall security

Question 20

What is the purpose of incident categorization within the incident management lifecycle?

Options:

A.

To determine the priority of incidents

B.

To automatically assign incidents to technicians

C.

To sort incidents based on the disrupted IT or business domain