New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

PECB ISO-IEC-27035-Lead-Incident-Manager Exam - Topic 4 Question 6 Discussion

Actual exam question for PECB's ISO-IEC-27035-Lead-Incident-Manager exam
Question #: 6
Topic #: 4
[All ISO-IEC-27035-Lead-Incident-Manager Questions]

Scenario 7: Located in central London, Konzolo has become a standout innovator in the cryptocurrency field. By introducing its unique cryptocurrency, Konzolo has contributed to the variety of digital currencies and prioritized enhancing the security and reliability of its offerings.

Konzolo aimed to enhance its systems but faced challenges in monitoring the security of its own and third-party systems. These issues became especially evident during an incident that caused several hours of server downtime This downtime was primarily caused by a third-party service provider that failed to uphold strong security measures, allowing unauthorized access.

In response to this critical situation, Konzolo strengthened its information security infrastructure. The company initiated a comprehensive vulnerability scan of its cryptographic wallet software, a cornerstone of its digital currency offerings The scan revealed a critical vulnerability due to the software using outdated encryption algorithms that are susceptible to decryption by modern methods that posed a significant risk of asset exposure Noah, the IT manager, played a central role in this discovery With careful attention to detail, he documented the vulnerability and communicated the findings to the incident response team and management.

Acknowledging the need for expertise in navigating the complexities of information security incident management. Konzolo welcomed Paulina to the team. After addressing the vulnerability and updating the cryptographic algorithms, they recognized the importance of conducting a thorough investigation to prevent future vulnerabilities. This marked the stage for Paulina s crucial involvement. She performed a detailed forensic analysis of the incident, employing automated and manual methods during the collection phase. Her analysis provided crucial insights into the security breach, enabling Konzolo to understand the depth of the vulnerability and the actions required to mitigate it.

Paulina also played a crucial role in the reporting phase, as her comprehensive approach extended beyond analysis. By defining clear and actionable steps for future prevention and response, she contributed significantly to developing a resilient information security incident management system based on ISO/IEC 27035-1 and 27035-2 guidelines. This strategic initiative marked a significant milestone in Konzolo's quest to strengthen its defenses against cyber threats

Based on scenario 7, a vulnerability scan at Konzolo revealed a critical vulnerability in the cryptographic wallet software that could lead to asset exposure. Noah, the IT manager, documented the event and communicated it to the incident response team and management. Is this acceptable?

Show Suggested Answer Hide Answer
Suggested Answer: C

Contribute your Thoughts:

0/2000 characters
Sharen
3 days ago
Haha, I bet Noah was like, "Houston, we have a problem!" Glad he didn't wait around on this one.
upvoted 0 times
...
Ezekiel
8 days ago
I agree with C. Waiting to document the vulnerability could have put Konzolo's assets at even greater risk.
upvoted 0 times
...
Omega
13 days ago
Absolutely, C is the way to go. Better to be proactive and address the issue before it becomes a bigger problem.
upvoted 0 times
...
Ryan
18 days ago
C is the correct answer. Noah did the right thing by documenting the vulnerability and communicating it to the team.
upvoted 0 times
...
Kent
24 days ago
I recall some guidelines suggesting that documentation should wait until after an investigation. But in this case, it seems like Noah acted appropriately given the circumstances.
upvoted 0 times
...
Chantay
29 days ago
I think similar practice questions emphasized the need for immediate reporting of vulnerabilities. So, I lean towards saying Noah's actions were acceptable.
upvoted 0 times
...
Eleonore
1 month ago
I'm not entirely sure if he should have waited for confirmation of asset exposure. It feels like that could delay necessary actions.
upvoted 0 times
...
Terrilyn
1 month ago
I remember discussing the importance of timely documentation in incident response. It seems like Noah did the right thing by communicating the vulnerability right away.
upvoted 0 times
...
Francoise
1 month ago
C definitely seems like the way to go here. Better to be proactive and get the incident response team involved right away, rather than waiting and risking further exposure. Noah handled this the right way in my opinion.
upvoted 0 times
...
Bernadine
2 months ago
I agree with Miesha. In an information security incident, it's crucial to act quickly to address any vulnerabilities, even if the full extent of the damage isn't yet known. Noah's actions were appropriate to get the right people involved and start the mitigation process.
upvoted 0 times
...
Nada
2 months ago
I'm a bit confused on this one. Shouldn't they have waited to see if there was actual asset exposure before raising the alarm? Documenting a potential vulnerability seems a bit premature to me.
upvoted 0 times
...
Miesha
2 months ago
I think the correct answer is C. Noah did the right thing by documenting the vulnerability and communicating it to the incident response team and management. Waiting for a full investigation or confirmation of asset exposure could have put the company at further risk.
upvoted 0 times
...

Save Cancel