New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

PECB Lead-Cybersecurity-Manager Exam - Topic 7 Question 24 Discussion

Actual exam question for PECB's Lead-Cybersecurity-Manager exam
Question #: 24
Topic #: 7
[All Lead-Cybersecurity-Manager Questions]

Scenario 3: EsteeMed is a cardiovascular institute located in Orlando. Florida H Is known for tis exceptional cardiovascular and thoracic services and offers a range of advanced procedures, including vascular surgery, heart valve surgery, arrhythmia and ablation, and lead extraction. With a dedicated team of over 30 cardiologists and cardiovascular surgeons, supported by more than IUU specialized nurses and technicians, EsteeMed Is driven by a noble mission to save lives Every year. it provides its services to over 50,000 patients from across the globe.

As Its reputation continued to grow. EsteeMed recognized the importance of protecting Its critical assets. It Identified these assets and implemented the necessary measures to ensure their security Employing a widely adopted approach to Information security governance. EsteeMed established an organizational structure that connects the cybersecurity team with the information security sector under the IT Department.

Soon after these changes, there was an incident where an unauthorized employee transferred highly restricted patient data to the cloud The Incident was detected by Tony, the IT specialist. As no specific guidelines were in place to address such unlikely scenarios, Tony promptly reported the incident to his colleagues and, together. they alerted the board of managers Following that, the management of EsteeMed arranged a meeting with their cloud provider to address the situation.

During the meeting, the representatives of the cloud provider assured the management of the EsteeMed that the situation will be managed effectively The cloud provider considered the existing security measures sufficient to ensure the confidentiality, Integrity, and availability of the transferred data Additionally, they proposed a premium cloud security package that could offer enhanced protection for assets of this nature. Subsequently, EsteeMed's management conducted an internal meeting following the discussion with the cloud provider.

After thorough discussions, the management determined that the associated costs of implementing further security measures outweigh the potential risks at the present lime Therefore, they decided to accept the actual risk level for the time being. The likelihood of a similar incident occurring in the future was considered low. Furthermore, the cloud provider had already implemented robust security protocols.

To ensure effective risk management. EsteeMed had documented and reported its risk management process and outcomes through appropriate mechanisms, it recognized that decisions about the creation, retention, and handling of documented information should consider various factors. These factors include aspects such as the intended use of the Information. Its sensitivity, and the external and internal context in which It operates.

Lastly. EsteeMed identified and recorded its assets in an inventory to ensure their protection. The inventory contained detailed information such as the type of assets, their size, location, owner, and backup information.

Based on the scenario above, answer the following question:

Based on scenario 3, EsteeMed's decisions on the creation of documented information regarding risk management took into account the intended use of the information. Its sensitivity, and the external and internal context in which it operates. Is this acceptable?

Show Suggested Answer Hide Answer
Suggested Answer: C

EsteeMed's approach to the creation, retention, and handling of documented information regarding risk management, which considers the intended use of the information, its sensitivity, and the external and internal context, aligns with best practices. It ensures that documentation practices are tailored to the specific needs and context of the organization, enhancing the effectiveness and relevance of the documentation.


ISO/IEC 27001:2013 - Highlights the importance of considering the context of the organization when developing and maintaining documented information for the ISMS.

NIST SP 800-53 - Recommends that documentation and information management practices should consider the specific context, sensitivity, and intended use of the information.

Contribute your Thoughts:

0/2000 characters
Kati
2 months ago
Definitely agree with considering sensitivity and context!
upvoted 0 times
...
Matthew
2 months ago
I disagree, they should document everything, no exceptions!
upvoted 0 times
...
Brice
3 months ago
Wow, I can't believe they decided to accept the risk.
upvoted 0 times
...
Felix
3 months ago
Are they really sure the risk is low? Seems risky to me.
upvoted 0 times
...
Twana
3 months ago
Sounds reasonable to consider all those factors!
upvoted 0 times
...
Tamala
3 months ago
I thought we learned that every process needs documentation regardless of context. But EsteeMed's situation seems unique, so maybe they have a point?
upvoted 0 times
...
Annice
4 months ago
I feel like the answer should be C. It makes sense to evaluate all those factors when creating documented information. Otherwise, it could lead to oversights.
upvoted 0 times
...
Gwenn
4 months ago
I'm not entirely sure if they should also consider the external and internal context. I think we had a similar question in practice, but I can't recall the specifics.
upvoted 0 times
...
Sena
4 months ago
I remember discussing the importance of considering both the intended use and sensitivity of information in our risk management classes. It seems like a reasonable approach for EsteeMed.
upvoted 0 times
...
Lisandra
4 months ago
This is a tricky one. There are a lot of moving parts, but I think the core issue is whether EsteeMed's approach to documented information was acceptable. I'll need to weigh the pros and cons carefully before selecting an answer.
upvoted 0 times
...
Carmen
4 months ago
Okay, I think I've got a good handle on the situation now. The key is that EsteeMed considered factors like the intended use, sensitivity, and internal/external context when deciding how to document their risk management process. That sounds like the right approach to me.
upvoted 0 times
...
Marti
4 months ago
Hmm, I'm a bit confused by all the details in the scenario. I'll need to carefully read through it again to make sure I understand the context before trying to answer the question.
upvoted 0 times
...
Frederic
5 months ago
This question seems straightforward. I'll focus on understanding the key details about EsteeMed's risk management process and how they made decisions about documented information.
upvoted 0 times
...
Chery
6 months ago
Personally, I'd be a little worried if a healthcare organization didn't consider the sensitivity of their patient data. C is definitely the way to go here.
upvoted 0 times
...
Frederica
6 months ago
Ha, 'regardless of the intended use'? That's just asking for trouble. Of course they need to take that into account, along with the other factors.
upvoted 0 times
Ming
5 months ago
A) No, the organization should create and retain documented information for each process, regardless of the intended use of information or its sensitivity
upvoted 0 times
...
...
Aliza
7 months ago
Ah, this is a tricky one. But I agree with C - you can't just create documentation without thinking about how it will be used and the broader context.
upvoted 0 times
...
Cecil
7 months ago
Hmm, I think C is the right answer. The organization needs to consider all those factors when creating and handling documented information.
upvoted 0 times
Evangelina
5 months ago
Definitely, considering the intended use, sensitivity, and context of the information is crucial for making informed decisions.
upvoted 0 times
...
Lai
7 months ago
Yeah, it's important to take into account all those factors for effective risk management.
upvoted 0 times
...
Luann
7 months ago
I agree, C seems like the most comprehensive option.
upvoted 0 times
...
...
Earnestine
7 months ago
Yes, it's about finding a balance between security and cost effectiveness.
upvoted 0 times
...
Iola
7 months ago
That's a valid point. Maybe they can prioritize based on the level of risk.
upvoted 0 times
...
Garry
7 months ago
This seems like a straightforward question. The scenario clearly states that EsteeMed considered the intended use, sensitivity, and context of the information, which is the correct approach.
upvoted 0 times
Huey
7 months ago
A) No, the organization should create and retain documented information for each process, regardless of the intended use of information or its sensitivity
upvoted 0 times
...
Tiffiny
7 months ago
C) Yes, decisions concerning the creation, retention, and handling of documented Information should take into account, their use, information sensitivity, and external and internal context
upvoted 0 times
...
...
Jennie
7 months ago
But what if the cost of implementing further security measures is too high?
upvoted 0 times
...
Earnestine
7 months ago
I agree. It's important to take into account the intended use, sensitivity, and context.
upvoted 0 times
...
Iola
8 months ago
I think the organization should consider all factors when creating documented information.
upvoted 0 times
...

Save Cancel