×

Special Offer! November Sale at DumpsCity! Get 20% Off on All Certification Exam Questions. Use Code: DC20OFF

Free PECB Lead-Cybersecurity-Manager Exam Questions

Try our Free Demo Practice Tests for Comprehensive Lead-Cybersecurity-Manager Exam Preparation

  • PECB Lead-Cybersecurity-Manager Exam Questions
  • Provided By: PECB
  • Exam: ISO/IEC 27032 Lead Cybersecurity Manager
  • Certification: PECB Auditor
  • Total Questions: 80
  • Updated On: Nov 11, 2024
  • Rated: 4.9 |
  • Online Users: 160
Page No. 1 of 16
Add To Cart
  • Question 1
    • Scenario 9:FuroDart ts a leading retail company that operates across Europe With over 5Q0 stores In several countries, EuroDart offers an extensive selection of products, including clothing, electronics, home appliances, and groceries. The company's success stems from its commitment to providing its customers with exceptional support and shopping experience.Due to the growing threats In the digital landscape. EutoDart puls a lot of efforts in ensuring cybersecurity.

      The company understands the Importance of safeguarding customer data, protecting Its infrastructure, and

      maintaining a powerful defense against cyberattacks. As such, EuroDart has Implemented robust cybersecurity

      measures 10 ensure the confidentiality, integrity, and availability of its systems and data

      EuroDart regularly conducts comprehensive testing to enhance its cybersecurity posture. Following a standard

      methodology as a reference for security testing, the company performs security tests on high-risk assets,

      utilizing its own data classification scheme. Security tests are conducted regularly on various components,

      such as applications and databases, to ensure their reliability and integrity.

      As part of these activities. EuroDart engages experienced ethical hackers to simulate real-world attacks on its

      network and applications. The purpose of such activities is to identify potential weaknesses and exploit them

      within a controlled environment to evaluate the effectiveness of existing security measures. EuroDart utilizes a

      security information and event management (SIEM) system to centralize log data from various sources within

      the network and have a customizable view for comprehending and reporting Incidents promptly and without

      delay The SiEM system enables the company to increase productivity and efficiency by collecting, analyzing,

      and correlating realtime data. The company leverages different dashboards to report on monitoring and

      measurement activities that are more tied to specific controls or processes. These dashboards enable the

      company to measure the progress of its short-term objectives.

      EuroDart recognizes that the cybersecurity program needs to be maintained and updated periodically. The

      company ensures that the cybersecurity manager is notified regarding any agreed actions to be taken. In

      addition, EuroDart regularly reviews and updates its cybersecurity policies, procedures, and controls. The

      company maintains accurate and comprehensive documentation of its cybersecurity practices including

      cybersecurity policy, cybersecurity objectives and targets, risk analysis, incident management, and business

      continuity plans, based on different factors of change, such as organizational changes, changes in the business

      scope, incidents, failures, test results, or faulty operations. Regular updates of these documents also help

      ensure that employees are aware of their roles and responsibilities in maintaining a secure environment.

      According to scenario 9. whichtype of dashboards does EuroDartemploy?


      Answer: A
  • Question 2
    • Which of the following examples is NOT a principle of COBIT 2019? 

      Answer: C
  • Question 3
    • According to the NIST Cyber security Framework, which of the following steps involves Identifying related systems and assets, regulatory requirements, and the overall risk approach?


      Answer: B
  • Question 4
    • What is a single sign-on (SSO)? 

      Answer: A
  • Question 5
    • Scenario 7:Established in 2005 in Arizona, the US. Hitec is one of The leading online retail companies. It Is

      especially known for electronic devices, such as televisions, telephones, and laptops. Hitec strives to

      continually enhance customer satisfaction and optimize its technology platforms and applications. the

      company's website and mobile application provide a range of features designed to simplify the online

      shopping experience, including customized product recommendations and a user-friendly search engine. The

      system enables customers to easily track the progress of their orders made through any of Hitec's platforms, in

      addition. Hitec employs a comprehensive customer management system to collect and manage customer

      information, including payment history, order details, and individual preferences.

      Recently. Hitec had to deal with a serious cybersecurity incident that resulted in a data breach. Following

      numerous customer complaints about the malfunctioning of the ordering system. Hitec's engineers initiated an

      investigation into their network. The investigation unveiled multiple instances of unauthorized access by two

      distinct attackers. They gamed access sensitive customer information, such as credit card numbers and login

      credentials. Instead of promptly sharing information about the detected threats with other companies in the

      cybersecurity alliance and asking for help, Hitec chose to rely solely on its own detection and response

      capabilities. After resolving the incident, the company publicly acknowledged falling victim to a data breach.

      However, it refrained from disclosing specific details regarding the impact it had on its customers

      Two weeks after the cyberattack, another retail company, Buyent, made an announcement regarding their

      successful prevention of a similar data breach unlike Hitec. Buyent took a transparent approach by providing

      detailed insights into the attacker's methods and the step-by-step procedures they employed to mitigate the

      attack. As both companies were part of the same cybersecurity alliance, Buyent willingly shared the requested

      information in accordance with their established information sharing and coordination framework, ensuring

      that any personal data shared was processed in a manner that prevented direct attribution to specific data

      subjects. This Involved utilizing additional information, which was kepi separately and secured through

      technical and organizational measures.

      To ensure secure transmission. Buyent sent links that required a password for access, protecting the encrypted

      files sent to Hitec These files included comprehensive guidelines and approaches adopted hy Buyent to

      effectively detect and respond to cybersecurity events.

      Upon careful analysis of the provided Information. Hitec concluded that their previous attack was primarily

      attributed to weaknesses in their detection capabilities in response. Hitec made strategic changes to their

      procedures. They implemented the utilization of Darknet as a technical approach to detect suspicious and

      malicious network activities. Furthermore, Hitec established a new security policy which required regular

      network and system testing By implementing these controls. Hilec aimed to strengthen Us ability to identify

      system vulnerabilities and threats, thereby boosting the overall cybersecurity defense.

      Lastly, Hitec decided to contract a training provider to conduct cybersecurity training for its employees. They

      agreed to provide a training session that covered essential cybersecurity practices applicable to all staff,

      regardless of their roles within the company As the agreed upon training date approached, the training provider

      requested the necessary documentation from Hitec. Including the cybersecurity policy and specific examples

      related to the practices or guidelines employed by the company. After Hitec did not deliver the requested

      resources, the training provider refused to conduct the training session.

      Based on the scenario above, answer the following question:

      What data protection technique did Buyem employ to safeguard personal data while sharing Information with

      Hitec regarding the cyberattack Refer to scenario 7


      Answer: A
PAGE: 1 - 16
Add To Cart

© Copyrights Dumpscity 2024. All Rights Reserved

We use cookies to ensure your best experience. So we hope you are happy to receive all cookies on the Dumpscity.