BlackFriday 2024! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

PECB Exam Lead-Cybersecurity-Manager Topic 1 Question 4 Discussion

Actual exam question for PECB's Lead-Cybersecurity-Manager exam
Question #: 4
Topic #: 1
[All Lead-Cybersecurity-Manager Questions]

Scenario 8: FindaxLabs is a financial institution that offers money transfers services globally The company Is known for quick money transfers at a low cost. To transfer money, users register with their email addresses and submit a photo of their ID card for identity verification. They also need to provide the recipient s bank account details alongside their own bank account details. Users can track the transfer through their accounts, either from the website or mobile app. As the company operates in a highly sensitive industry, it recognizes the importance of ensuring cybersecurity. As such, FindaxLabs has addressed its cybersecurity concerns through its business continuity plan.

Nevertheless, a few months ago, FindaxLabs detected suspicious activity on its network and realized that it was being attacked The attackers tried to gain access to customer information. Including emails, bank account numbers, and records of financial transactions. Upon receiving the alert, the incident response team responded swiftly Following the ICT readiness for business continuity (IRBC) policy and procedures, they immediately took down the communication channels to the server and went offline. Subsequently, they conducted vulnerability testing and network scanning, but did not identify any other backdoors. After dodging this attack, the company completely changed its approach toward cyber threats. Consequently, cybersecurity became one of their highest priorities.

FindaxLabs established a more comprehensive cybersecurity incident management plan based on its cybersecurity Incident management policy 10 effectively handle and mitigate future incidents and vulnerabilities. The cybersecurity incident management plan outlined a structured approach based on industry best practices and included various phases of the incident response process

The company also created a post-incident report to evaluate the effectiveness of their response capabilities and identify areas for improvement It documented all relevant information related to the incident, such as category, priority, status, and actions taken to resolve it Based on this documentation, it defined the IRBC activities that helped them respond to and recover from disruptions, creating an IRBC timeline. The timeline consisted of three main stages: incident detection, response, and recovery. The company evaluated whether IRBC objectives were met for each phase. Through this evaluation, they determined that improved collaboration between business managers and ICT staff, as well as the implementation of preventive measures such as antivirus and firewalls, would have provided layered protection and better integration of cybersecurity into the business continuity strategy.

Based on the scenario above, answer the following question:

According to scenario 8. what was the role of ICT readiness for business continuity in FindaxLab' business continuity management?

Show Suggested Answer Hide Answer
Suggested Answer: B

In FindaxLabs' business continuity management, the role of ICT readiness for business continuity (IRBC) was to respond prior to system compromise. The incident response team acted swiftly upon detecting suspicious activity, following the IRBC policy and procedures to take down communication channels and conduct thorough vulnerability testing. This proactive approach helped to mitigate the impact of the attack before any significant system compromise occurred. This proactive stance is supported by ISO/IEC 27031, which emphasizes the importance of readiness and proactive measures in maintaining business continuity.


Contribute your Thoughts:

Ceola
1 months ago
Option B seems like the correct answer here. The IRBC policy helped them respond before the system was fully compromised, which is crucial in a cybersecurity incident.
upvoted 0 times
Winfred
21 days ago
Definitely, being proactive in such situations can prevent major data breaches.
upvoted 0 times
...
Anika
24 days ago
Yes, I agree. Responding prior to system compromise is key in cybersecurity incidents.
upvoted 0 times
...
Ronnie
1 months ago
Option B seems like the correct answer here.
upvoted 0 times
...
...
Yoko
2 months ago
Ha! I bet the cybersecurity team high-fived each other after 'dodging' that attack. But seriously, it's good they learned from this and made it a top priority going forward.
upvoted 0 times
...
Ma
2 months ago
Interesting that the IRBC timeline covered the incident detection, response, and recovery stages. Seems like a well-structured approach to handle such a sensitive situation.
upvoted 0 times
Mireya
16 days ago
B) Responding prior to system compromise
upvoted 0 times
...
Vincent
17 days ago
The IRBC timeline was crucial for managing the incident effectively.
upvoted 0 times
...
Sabra
21 days ago
C) Protecting the performance of server operations
upvoted 0 times
...
Levi
26 days ago
B) Responding prior to system compromise
upvoted 0 times
...
Lashawnda
1 months ago
A) Recovering from the data breach
upvoted 0 times
...
...
Lorean
2 months ago
Yes, that's correct. They took down the communication channels to the server and went offline to prevent further compromise.
upvoted 0 times
...
Kimbery
2 months ago
So, the answer to the question would be B) Responding prior to system compromise, right?
upvoted 0 times
...
Lorean
2 months ago
I agree, they responded swiftly to the attack by following their IRBC policy and procedures.
upvoted 0 times
...
Samuel
2 months ago
The IRBC policy and procedures helped FindaxLabs respond swiftly to the attack and take down the communication channels to the server. That's exactly what they needed to do in this scenario.
upvoted 0 times
Willard
2 months ago
C) Protecting the performance of server operations
upvoted 0 times
...
Trina
2 months ago
B) Responding prior to system compromise
upvoted 0 times
...
Ashton
2 months ago
A) Recovering from the data breach
upvoted 0 times
...
...
Kimbery
3 months ago
I think the role of ICT readiness for business continuity was crucial in FindaxLab's management.
upvoted 0 times
...

Save Cancel