Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

PECB ISO-IEC-27035-Lead-Incident-Manager Exam - Topic 5 Question 8 Discussion

Actual exam question for PECB's ISO-IEC-27035-Lead-Incident-Manager exam
Question #: 8
Topic #: 5
[All ISO-IEC-27035-Lead-Incident-Manager Questions]

Scenario 6: EastCyber has established itself as a premier cyber security company that offers threat detection, vulnerability assessment, and penetration testing tailored to protect organizations from emerging cyber threats. The company effectively utilizes ISO/IEC 27035-1 and 27035-2 standards, enhancing its capability to manage information security incidents.

EastCyber appointed an information security management team led by Mike. Despite limited resources, Mike and the team implemented advanced monitoring protocols to ensure that every device within the company's purview is under constant surveillance. This monitoring approach is crucial for covering everything thoroughly, enabling the information security and cyber management team to proactively detect and respond to any sign of unauthorized access, modifications, or malicious activity within its systems and networks.

A recent incident involving unauthorized access to company phones highlighted the critical nature of incident management. Nate, the incident coordinator, quickly prepared an exhaustive incident report. His report detailed an analysis of the situation, identifying the problem and its cause. In response to the incident, EastCyber addressed the exploited vulnerabilities. This action started the eradication phase, aimed at systematically eliminating the elements of the incident.

Based on scenario 6, answer the following:

EastCyber decided to address vulnerabilities exploited during an incident as part of the eradication phase, to eradicate the elements of the incident. Is this approach acceptable?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Cassi
4 days ago
I’m a bit confused. I thought we should contain the incident first before addressing vulnerabilities. Isn’t that what we practiced?
upvoted 0 times
...
Brunilda
9 days ago
I remember a practice question where we discussed the phases of incident management. It seems like the eradication phase is the right time to fix those vulnerabilities.
upvoted 0 times
...
Jaime
14 days ago
I think addressing vulnerabilities during the eradication phase makes sense, but I’m not entirely sure if it’s the best timing.
upvoted 0 times
...

Save Cancel