New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

PECB Lead-Cybersecurity-Manager Exam - Topic 1 Question 4 Discussion

Actual exam question for PECB's Lead-Cybersecurity-Manager exam
Question #: 4
Topic #: 1
[All Lead-Cybersecurity-Manager Questions]

Scenario 8: FindaxLabs is a financial institution that offers money transfers services globally The company Is known for quick money transfers at a low cost. To transfer money, users register with their email addresses and submit a photo of their ID card for identity verification. They also need to provide the recipient s bank account details alongside their own bank account details. Users can track the transfer through their accounts, either from the website or mobile app. As the company operates in a highly sensitive industry, it recognizes the importance of ensuring cybersecurity. As such, FindaxLabs has addressed its cybersecurity concerns through its business continuity plan.

Nevertheless, a few months ago, FindaxLabs detected suspicious activity on its network and realized that it was being attacked The attackers tried to gain access to customer information. Including emails, bank account numbers, and records of financial transactions. Upon receiving the alert, the incident response team responded swiftly Following the ICT readiness for business continuity (IRBC) policy and procedures, they immediately took down the communication channels to the server and went offline. Subsequently, they conducted vulnerability testing and network scanning, but did not identify any other backdoors. After dodging this attack, the company completely changed its approach toward cyber threats. Consequently, cybersecurity became one of their highest priorities.

FindaxLabs established a more comprehensive cybersecurity incident management plan based on its cybersecurity Incident management policy 10 effectively handle and mitigate future incidents and vulnerabilities. The cybersecurity incident management plan outlined a structured approach based on industry best practices and included various phases of the incident response process

The company also created a post-incident report to evaluate the effectiveness of their response capabilities and identify areas for improvement It documented all relevant information related to the incident, such as category, priority, status, and actions taken to resolve it Based on this documentation, it defined the IRBC activities that helped them respond to and recover from disruptions, creating an IRBC timeline. The timeline consisted of three main stages: incident detection, response, and recovery. The company evaluated whether IRBC objectives were met for each phase. Through this evaluation, they determined that improved collaboration between business managers and ICT staff, as well as the implementation of preventive measures such as antivirus and firewalls, would have provided layered protection and better integration of cybersecurity into the business continuity strategy.

Based on the scenario above, answer the following question:

According to scenario 8. what was the role of ICT readiness for business continuity in FindaxLab' business continuity management?

Show Suggested Answer Hide Answer
Suggested Answer: B

In FindaxLabs' business continuity management, the role of ICT readiness for business continuity (IRBC) was to respond prior to system compromise. The incident response team acted swiftly upon detecting suspicious activity, following the IRBC policy and procedures to take down communication channels and conduct thorough vulnerability testing. This proactive approach helped to mitigate the impact of the attack before any significant system compromise occurred. This proactive stance is supported by ISO/IEC 27031, which emphasizes the importance of readiness and proactive measures in maintaining business continuity.


Contribute your Thoughts:

0/2000 characters
Asha
3 months ago
Their focus on cybersecurity is definitely a step in the right direction!
upvoted 0 times
...
Ilene
3 months ago
Sounds like they’re just reacting instead of being proactive.
upvoted 0 times
...
Derick
3 months ago
Surprised they didn't find any backdoors after the attack!
upvoted 0 times
...
Lanie
4 months ago
I think they should've caught the attack earlier.
upvoted 0 times
...
Colette
4 months ago
FindaxLabs had a solid incident response team!
upvoted 0 times
...
Dwight
4 months ago
This scenario reminds me of a practice question where we discussed incident response phases. I feel like option B aligns with the proactive measures we talked about.
upvoted 0 times
...
Isaiah
4 months ago
I think protecting server operations is important, but it seems more like a function of ongoing security rather than a direct role in business continuity management.
upvoted 0 times
...
Avery
4 months ago
I'm not entirely sure, but I feel like recovering from the data breach is more about what happens after the incident. Maybe option A isn't the best fit?
upvoted 0 times
...
Ahmad
5 months ago
I remember studying how ICT readiness can help in responding to incidents before they escalate, so I think option B might be the right choice.
upvoted 0 times
...
Emeline
5 months ago
This question is really testing our understanding of how the ICT readiness for business continuity plan was used in this specific scenario. I'll need to re-read the details carefully to make sure I identify the correct role it played in FindaxLabs' response.
upvoted 0 times
...
Aliza
5 months ago
I think the answer is B - responding prior to system compromise. The scenario says the incident response team responded swiftly by following the ICT readiness for business continuity policy and procedures, which allowed them to take action before the attackers could fully compromise the system.
upvoted 0 times
...
Sharita
5 months ago
Okay, based on the information provided, it seems the ICT readiness for business continuity plan helped FindaxLabs respond quickly by allowing them to take down communication channels and go offline when the attack was detected. That seems to be the key role it played in their incident response.
upvoted 0 times
...
Jani
5 months ago
Hmm, this is a tricky one. There are a lot of details about the cybersecurity incident and the company's response. I'll need to make sure I really understand how the ICT readiness for business continuity plan was involved before I can answer confidently.
upvoted 0 times
...
Bette
5 months ago
I think the key here is to focus on the role of the ICT readiness for business continuity plan in how FindaxLabs responded to the cybersecurity incident. The question is asking specifically about that, so I'll need to carefully review the details in the scenario.
upvoted 0 times
...
Tracey
5 months ago
Hmm, I'm a bit unsure about this one. There are a few different options here, and I'm not entirely sure which one is the correct configuration to update. I'll need to think this through carefully.
upvoted 0 times
...
Ceola
1 year ago
Option B seems like the correct answer here. The IRBC policy helped them respond before the system was fully compromised, which is crucial in a cybersecurity incident.
upvoted 0 times
Winfred
1 year ago
Definitely, being proactive in such situations can prevent major data breaches.
upvoted 0 times
...
Anika
1 year ago
Yes, I agree. Responding prior to system compromise is key in cybersecurity incidents.
upvoted 0 times
...
Ronnie
1 year ago
Option B seems like the correct answer here.
upvoted 0 times
...
...
Yoko
1 year ago
Ha! I bet the cybersecurity team high-fived each other after 'dodging' that attack. But seriously, it's good they learned from this and made it a top priority going forward.
upvoted 0 times
...
Ma
1 year ago
Interesting that the IRBC timeline covered the incident detection, response, and recovery stages. Seems like a well-structured approach to handle such a sensitive situation.
upvoted 0 times
Mireya
1 year ago
B) Responding prior to system compromise
upvoted 0 times
...
Vincent
1 year ago
The IRBC timeline was crucial for managing the incident effectively.
upvoted 0 times
...
Sabra
1 year ago
C) Protecting the performance of server operations
upvoted 0 times
...
Levi
1 year ago
B) Responding prior to system compromise
upvoted 0 times
...
Lashawnda
1 year ago
A) Recovering from the data breach
upvoted 0 times
...
...
Lorean
1 year ago
Yes, that's correct. They took down the communication channels to the server and went offline to prevent further compromise.
upvoted 0 times
...
Kimbery
1 year ago
So, the answer to the question would be B) Responding prior to system compromise, right?
upvoted 0 times
...
Lorean
1 year ago
I agree, they responded swiftly to the attack by following their IRBC policy and procedures.
upvoted 0 times
...
Samuel
2 years ago
The IRBC policy and procedures helped FindaxLabs respond swiftly to the attack and take down the communication channels to the server. That's exactly what they needed to do in this scenario.
upvoted 0 times
Willard
1 year ago
C) Protecting the performance of server operations
upvoted 0 times
...
Trina
1 year ago
B) Responding prior to system compromise
upvoted 0 times
...
Ashton
1 year ago
A) Recovering from the data breach
upvoted 0 times
...
...
Kimbery
2 years ago
I think the role of ICT readiness for business continuity was crucial in FindaxLab's management.
upvoted 0 times
...

Save Cancel