New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

PECB ISO-IEC-27035-Lead-Incident-Manager Exam - Topic 6 Question 4 Discussion

Actual exam question for PECB's ISO-IEC-27035-Lead-Incident-Manager exam
Question #: 4
Topic #: 6
[All ISO-IEC-27035-Lead-Incident-Manager Questions]

Scenario 6: EastCyber has established itself as a premier cyber security company that offers threat detection, vulnerability assessment, and penetration testing tailored to protect organizations from emerging cyber threats. The company effectively utilizes ISO/IEC 27035-1 and 27035-2 standards, enhancing its capability to manage information security incidents.

EastCyber appointed an information security management team led by Mike. Despite limited resources, Mike and the team implemented advanced monitoring protocols to ensure that every device within the company's purview is under constant surveillance. This monitoring approach is crucial for covering everything thoroughly, enabling the information security and cyber management team to proactively detect and respond to any sign of unauthorized access, modifications, or malicious activity within its systems and networks.

A recent incident involving unauthorized access to company phones highlighted the critical nature of incident management. Nate, the incident coordinator, quickly prepared an exhaustive incident report. His report detailed an analysis of the situation, identifying the problem and its cause. In response to the incident, EastCyber addressed the exploited vulnerabilities. This action started the eradication phase, aimed at systematically eliminating the elements of the incident.

Based on scenario 6, answer the following:

EastCyber decided to address vulnerabilities exploited during an incident as part of the eradication phase, to eradicate the elements of the incident. Is this approach acceptable?

Show Suggested Answer Hide Answer
Suggested Answer: A

Contribute your Thoughts:

0/2000 characters
Mozell
10 hours ago
Definitely agree, eradication is the right phase for that!
upvoted 0 times
...
Jodi
6 days ago
Option A is the clear choice. Gotta nip those vulnerabilities in the bud during the eradication phase.
upvoted 0 times
...
Allene
11 days ago
Haha, I bet the hackers were like "Oops, we got caught!" when the vulnerabilities were addressed.
upvoted 0 times
...
Desirae
16 days ago
Option A is the way to go. Tackling the vulnerabilities during eradication is crucial to prevent future incidents.
upvoted 0 times
...
Hobert
21 days ago
I agree with option A. Eradication is the perfect phase to address the vulnerabilities that were exploited.
upvoted 0 times
...
Brett
26 days ago
Definitely option A. Addressing vulnerabilities during the eradication phase is the right approach to eliminate the incident elements.
upvoted 0 times
...
Curt
1 month ago
I thought vulnerabilities should be handled during containment to prevent further damage, but maybe eradication is also valid? I'm confused.
upvoted 0 times
...
Celestina
1 month ago
This reminds me of a practice question where we discussed the phases of incident response. I feel like eradication is the right time to fix those issues.
upvoted 0 times
...
Barbra
1 month ago
I'm not entirely sure, but I remember something about containment needing to happen first before you can really address those vulnerabilities.
upvoted 0 times
...
Marylou
2 months ago
I think addressing vulnerabilities during the eradication phase makes sense since it's about fixing the root cause after containment.
upvoted 0 times
...
Valentine
2 months ago
Alright, let's see here. The scenario mentions the company addressed the exploited vulnerabilities, and the question is asking if that's acceptable during the eradication phase. I'll have to weigh the options carefully to determine the best answer.
upvoted 0 times
...
Larue
2 months ago
Okay, so the question is asking about the eradication phase specifically. I'll need to refresh my memory on what that phase entails and whether addressing vulnerabilities would be the right move there. Gotta make sure I get this one right.
upvoted 0 times
...
Avery
2 months ago
Addressing vulnerabilities during eradication makes total sense!
upvoted 0 times
...
Dorothea
2 months ago
B) I think it should be in the containment phase. You need to stop the damage first!
upvoted 0 times
...
Silva
2 months ago
A) Totally agree! Fixing vulnerabilities during eradication makes sense.
upvoted 0 times
...
Antione
3 months ago
Wait, shouldn't that be done in containment instead?
upvoted 0 times
...
Joana
3 months ago
Hmm, this one seems a bit tricky. I'll need to really think through the different phases of incident management and where addressing vulnerabilities fits in. I want to make sure I understand the concepts before selecting an answer.
upvoted 0 times
...
Joni
3 months ago
I think I've got a good handle on this. The key is to focus on the eradication phase and whether addressing vulnerabilities is appropriate there. I'll carefully review the details in the scenario to determine the best approach.
upvoted 0 times
Rasheeda
3 months ago
Agreed! It’s the right time to fix what caused the issue.
upvoted 0 times
...
...

Save Cancel