<< Prev Question Next Question >>

Question 17/33

Scenario 8: Moneda Vivo, headquartered in Kuala Lumpur. Malaysia, is a distinguished name in the banking sector. It is renowned for its innovative approach to digital banking and unwavering commitment to information security. Moneda Vivo stands out by offering various banking services designed to meet the needs of its clients. Central to its operations is an information security incident management process that adheres to the recommendations of ISO/IEC 27035-1 and 27035-2.
Recently. Moneda Vivo experienced a phishing attack aimed at its employees Despite the bank's swift identification and containment of the attack, the incident led to temporary service outages and data access issues, underscoring the need for improved resilience The response team compiled a detailed review of the attack, offering valuable insights into the techniques and entry points used and identifying areas for enhancing their preparedness.
Shortly after the attack, the bank strengthened its defense by implementing a continuous review process to ensure its incident management procedures and systems remain effective and appropriate While monitoring the incident management process, a trend became apparent. The mean time between similar incidents decreased after a few occurrences; however, Moneda Vivo strategically ignored the trend and continued with regular operations This decision was rooted in a deep confidence in its existing security measures and incident management protocols, which had proven effective in quick detection and resolution of issues Moneda Vivo's commitment to transparency and continual improvement is exemplified by its utilization of a comprehensive dashboard. This tool provides real time insights into the progress of its information security incident management, helping control operational activities and ensure that processes stay within the targets of productivity, quality, and efficiency. However, securing its digital banking platform proved challenging.
Following a recent upgrade, which included a user interface change to its digital banking platform and a software update, Moneda Vivo recognized the need to immediately review its incident management process for accuracy and completeness. The top management postponed the review due to financial and time constraints.
Based on scenario 8, Moneda Vivo has recently upgraded its digital banking platform. In line with the continual improvement process, Moneda Vivo has decided to review the information security incident management process for accuracy immediately after the software update. Is this recommended?

LEAVE A REPLY

Your email address will not be published. Required fields are marked *

Question List (33q)
Question 1: What is the primary focus of internal exercises in informati...
Question 2: How is the impact of an information security event assessed?...
Question 3: Scenario 5: Located in Istanbul. Turkey. Alura Hospital is a...
Question 4: Scenario 4: ORingo is a company based in Krakow, Poland, spe...
Question 5: Which factor of change should be monitored when maintaining ...
Question 6: Scenario 1: RoLawyers is a prominent legal firm based in Gua...
Question 7: Scenario 7: Located in central London, Konzolo has become a ...
Question 8: What is a key responsibility of the incident response team?...
Question 9: Who is responsible for providing threat intelligence and sup...
Question 10: Scenario 1: RoLawyers is a prominent legal firm based in Gua...
Question 11: What is the first step in planning the response to informati...
Question 12: Scenario 5: Located in Istanbul, Turkey, Alura Hospital is a...
Question 13: Which of the following statements regarding the principles f...
Question 14: Which document provides guidelines for planning and preparin...
Question 15: According to scenario 4, what is the next action ORingo shou...
Question 16: Who is responsible for approving an organization's informati...
Question 17: Scenario 8: Moneda Vivo, headquartered in Kuala Lumpur. Mala...
Question 18: According to ISO/IEC 27035-2, how should an organization pla...
Question 19: Scenario 3: L&amp;K Associates is a graphic design firm head...
Question 20: Scenario 5: Located in Istanbul, Turkey, Alura Hospital is a...
Question 21: What roles do business managers play in relation to the Inci...
Question 22: How should vulnerabilities lacking corresponding threats be ...
Question 23: Scenario 7: Located in central London, Konzolo has become a ...
Question 24: Scenario 1: RoLawyers is a prominent legal firm based in Gua...
Question 25: What does the Incident Cause Analysis Method (ICAM) promote?...
Question 26: What is the primary objective of an awareness program?...
Question 27: During an ongoing cybersecurity incident investigation, the ...
Question 28: Which method is used to examine a group of hosts or a networ...
Question 29: Why is it important to identify all impacted hosts during th...
Question 30: What is the primary input for the information security risk ...
Question 31: Scenario 4: ORingo is a company based in Krakow, Poland, spe...
Question 32: Scenario 8: Moneda Vivo, headquartered in Kuala Lumpur. Mala...
Question 33: Scenario 6: EastCyber has established itself as a premier cy...