Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

PECB Exam Lead-Cybersecurity-Manager Topic 2 Question 25 Discussion

Actual exam question for PECB's Lead-Cybersecurity-Manager exam
Question #: 25
Topic #: 2
[All Lead-Cybersecurity-Manager Questions]

Scenario 3: EsteeMed is a cardiovascular institute located in Orlando. Florida H Is known for tis exceptional cardiovascular and thoracic services and offers a range of advanced procedures, including vascular surgery, heart valve surgery, arrhythmia and ablation, and lead extraction. With a dedicated team of over 30 cardiologists and cardiovascular surgeons, supported by more than IUU specialized nurses and technicians, EsteeMed Is driven by a noble mission to save lives Every year. it provides its services to over 50,000 patients from across the globe.

As Its reputation continued to grow. EsteeMed recognized the importance of protecting Its critical assets. It Identified these assets and implemented the necessary measures to ensure their security Employing a widely adopted approach to Information security governance. EsteeMed established an organizational structure that connects the cybersecurity team with the information security sector under the IT Department.

Soon after these changes, there was an incident where an unauthorized employee transferred highly restricted patient data to the cloud The Incident was detected by Tony, the IT specialist. As no specific guidelines were in place to address such unlikely scenarios, Tony promptly reported the incident to his colleagues and, together. they alerted the board of managers Following that, the management of EsteeMed arranged a meeting with their cloud provider to address the situation.

During the meeting, the representatives of the cloud provider assured the management of the EsteeMed that the situation will be managed effectively The cloud provider considered the existing security measures sufficient to ensure the confidentiality, Integrity, and availability of the transferred data Additionally, they proposed a premium cloud security package that could offer enhanced protection for assets of this nature. Subsequently, EsteeMed's management conducted an internal meeting following the discussion with the cloud provider.

After thorough discussions, the management determined that the associated costs of implementing further security measures outweigh the potential risks at the present lime Therefore, they decided to accept the actual risk level for the time being. The likelihood of a similar incident occurring in the future was considered low. Furthermore, the cloud provider had already implemented robust security protocols.

To ensure effective risk management. EsteeMed had documented and reported its risk management process and outcomes through appropriate mechanisms, it recognized that decisions about the creation, retention, and handling of documented information should consider various factors. These factors include aspects such as the intended use of the Information. Its sensitivity, and the external and internal context in which It operates.

Lastly. EsteeMed identified and recorded its assets in an inventory to ensure their protection. The inventory contained detailed information such as the type of assets, their size, location, owner, and backup information.

Based on the scenario above, answer the following question:

What did EsteeMed's approach 10 protecting its critical assets Include after the incident occurred' Refer to scenario 3

Show Suggested Answer Hide Answer
Suggested Answer: C

After the incident where an unauthorized employee transferred highly restricted patient data to the cloud, EsteeMed focused on ensuring the security of virtual assets in cyberspace. The scenario indicates that the response to the incident involved discussions with the cloud provider about the security measures in place and the potential adoption of a premium cloud security package. This highlights EsteeMed's approach to protecting their critical assets by focusing on the cybersecurity measures necessary to safeguard their virtual assets stored and managed in the cloud.


ISO/IEC 27017:2015 - Provides guidelines for information security controls applicable to the provision and use of cloud services by providing additional implementation guidance for relevant controls specified in ISO/IEC 27002.

NIST SP 800-144 - Guidelines on Security and Privacy in Public Cloud Computing which emphasize the importance of protecting virtual assets in the cloud environment.

Contribute your Thoughts:

Stephane
2 days ago
I'm not entirely sure, but I think they focused more on virtual assets after the incident. It makes sense given the data breach.
upvoted 0 times
...
Catalina
8 days ago
I remember we discussed the importance of protecting both physical and virtual assets in our last class. It seems like EsteeMed is doing just that.
upvoted 0 times
...
Olive
13 days ago
I feel pretty confident about this one. The scenario clearly states that EsteeMed documented and reported its risk management process and outcomes, and it also identified and recorded its assets in an inventory to ensure their protection. Those seem to be the relevant actions taken after the incident.
upvoted 0 times
...
Rozella
19 days ago
This is a tricky one. The scenario covers a lot of ground, and it's easy to get distracted by the details. I'm going to try to stay focused on the key details about EsteeMed's actions after the incident to protect its critical assets.
upvoted 0 times
...
Edna
24 days ago
Okay, I think I've got this. Based on the information provided, EsteeMed documented and reported its risk management process and outcomes, and it also identified and recorded its assets in an inventory to ensure their protection. The question is asking about the approach after the incident, so I'll focus on those specific actions.
upvoted 0 times
...
Kami
29 days ago
Hmm, I'm a bit confused. The question is asking specifically about EsteeMed's approach to protecting its critical assets after the incident, but the options seem to cover a broader range of asset protection. I'll need to re-read the scenario carefully to identify the relevant details.
upvoted 0 times
...
Cristal
1 month ago
This scenario seems pretty straightforward. The key is to focus on the actions EsteeMed took after the incident to protect its critical assets, both physical and virtual.
upvoted 0 times
...
Fidelia
2 months ago
Yes, they decided to accept the actual risk level for the time being.
upvoted 0 times
...
Youlanda
3 months ago
I believe they also considered the costs of implementing further security measures.
upvoted 0 times
...
Norah
3 months ago
I agree, they wanted to ensure the security of all their critical assets.
upvoted 0 times
...
Fidelia
3 months ago
I think EsteeMed's approach included protecting both physical and virtual assets.
upvoted 0 times
...
Daisy
3 months ago
I bet the management team at EsteeMed felt like they were playing a real-life game of 'Protect the Vital Signs' after that incident. But hey, at least they're taking it seriously.
upvoted 0 times
Refugia
1 month ago
B) Protecting physical assets owned by the organization
upvoted 0 times
...
Vonda
2 months ago
A) Protecting both physical and virtual assets
upvoted 0 times
...
...
Sean
3 months ago
The cloud provider seems to have their act together, but I'm not surprised EsteeMed wanted to beef up security. Can't be too careful when it comes to people's health records, you know?
upvoted 0 times
...
Raul
3 months ago
Gotta hand it to Tony, the IT specialist, for promptly reporting the incident. That's the kind of vigilance you need in a healthcare organization dealing with sensitive patient data.
upvoted 0 times
Luisa
2 months ago
Tony did a great job catching that incident.
upvoted 0 times
...
...
Ryan
4 months ago
Looks like EsteeMed took a balanced approach, protecting both physical and virtual assets. The incident with the unauthorized data transfer was a wake-up call, and they're right to address the security of their critical information.
upvoted 0 times
Rodrigo
3 months ago
C) Ensuring the security of virtual assets in the cyberspace
upvoted 0 times
...
Ashlyn
3 months ago
B) Protecting physical assets owned by the organization
upvoted 0 times
...
Tamala
4 months ago
A) Protecting both physical and virtual assets
upvoted 0 times
...
...

Save Cancel