<< Prev Question

Question 33/33

Scenario 6: EastCyber has established itself as a premier cyber security company that offers threat detection, vulnerability assessment, and penetration testing tailored to protect organizations from emerging cyber threats. The company effectively utilizes ISO/IEC 27035*1 and 27035-2 standards, enhancing its capability to manage information security incidents.
EastCyber appointed an information security management team led by Mike Despite limited resources, Mike and the team implemented advanced monitoring protocols to ensure that every device within the company's purview is under constant surveillance This monitoring approach is crucial for covering everything thoroughly, enabling the information security and cyber management team to proactively detect and respond to any sign of unauthorized access, modifications, or malicious activity within its systems and networks.
In addition, they focused on establishing an advanced network traffic monitoring system This system carefully monitors network activity, quickly spotting and alerting the security team to unauthorized actions This vigilance is pivotal in maintaining the integrity of EastCyber's digital infrastructure and ensuring the confidentiality, availability, and integrity of the data it protects.
Furthermore, the team focused on documentation management. They meticulously crafted a procedure to ensure thorough documentation of information security events. Based on this procedure, the company would document only the events that escalate into high-severity incidents and the subsequent actions. This documentation strategy streamlines the incident management process, enabling the team to allocate resources more effectively and focus on incidents that pose the greatest threat.
A recent incident involving unauthorized access to company phones highlighted the critical nature of incident management. Nate, the incident coordinator, quickly prepared an exhaustive incident report. His report detailed an analysis of the situation, identifying the problem and its cause. However, it became evident that assessing the seriousness and the urgency of a response was inadvertently overlooked.
In response to the incident, EastCyber addressed the exploited vulnerabilities. This action started the eradication phase, aimed at systematically eliminating the elements of the incident. This approach addresses the immediate concerns and strengthens EastCyber's defenses against similar threats in the future.
Based on scenario 6, EastCyber's team established a procedure for documenting only the information security events that escalate into high-severity incidents. According to ISO/IEC 27035-1, is this approach acceptable?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (33q)
Question 1: What is the primary focus of internal exercises in informati...
Question 2: How is the impact of an information security event assessed?...
Question 3: Scenario 5: Located in Istanbul. Turkey. Alura Hospital is a...
Question 4: Scenario 4: ORingo is a company based in Krakow, Poland, spe...
Question 5: Which factor of change should be monitored when maintaining ...
Question 6: Scenario 1: RoLawyers is a prominent legal firm based in Gua...
Question 7: Scenario 7: Located in central London, Konzolo has become a ...
Question 8: What is a key responsibility of the incident response team?...
Question 9: Who is responsible for providing threat intelligence and sup...
Question 10: Scenario 1: RoLawyers is a prominent legal firm based in Gua...
Question 11: What is the first step in planning the response to informati...
Question 12: Scenario 5: Located in Istanbul, Turkey, Alura Hospital is a...
Question 13: Which of the following statements regarding the principles f...
Question 14: Which document provides guidelines for planning and preparin...
Question 15: According to scenario 4, what is the next action ORingo shou...
Question 16: Who is responsible for approving an organization's informati...
Question 17: Scenario 8: Moneda Vivo, headquartered in Kuala Lumpur. Mala...
Question 18: According to ISO/IEC 27035-2, how should an organization pla...
Question 19: Scenario 3: L&amp;K Associates is a graphic design firm head...
Question 20: Scenario 5: Located in Istanbul, Turkey, Alura Hospital is a...
Question 21: What roles do business managers play in relation to the Inci...
Question 22: How should vulnerabilities lacking corresponding threats be ...
Question 23: Scenario 7: Located in central London, Konzolo has become a ...
Question 24: Scenario 1: RoLawyers is a prominent legal firm based in Gua...
Question 25: What does the Incident Cause Analysis Method (ICAM) promote?...
Question 26: What is the primary objective of an awareness program?...
Question 27: During an ongoing cybersecurity incident investigation, the ...
Question 28: Which method is used to examine a group of hosts or a networ...
Question 29: Why is it important to identify all impacted hosts during th...
Question 30: What is the primary input for the information security risk ...
Question 31: Scenario 4: ORingo is a company based in Krakow, Poland, spe...
Question 32: Scenario 8: Moneda Vivo, headquartered in Kuala Lumpur. Mala...
Question 33: Scenario 6: EastCyber has established itself as a premier cy...