PECB Lead Cybersecurity Manager ISO/IEC 27032 Lead Cybersecurity Manager Online Training
PECB Lead Cybersecurity Manager Online Training
The questions for Lead Cybersecurity Manager were last updated at Feb 21,2025.
- Exam Code: Lead Cybersecurity Manager
- Exam Name: ISO/IEC 27032 Lead Cybersecurity Manager
- Certification Provider: PECB
- Latest update: Feb 21,2025
Which of the following is NOT a responsibility of the information security manager (ISM) within an organization’s cybersecurity framework?
- A . Allocating resources dedicated to the cybersecurity program
- B . Supervising the entire life cycle of cybersecurity platforms
- C . Developing a comprehensive framework of metrics and assurances to evaluate the effectiveness of controls
Among others, which of the following factors should an organisation consider when establishing, Implementing, maintaining, and continually improving asset management?
- A . Us flexible budget allocation
- B . Its location and physical infrastructure
- C . Its operating context
Among others, which of the following factors should be considered when selecting a Tier, according to the NIST Framework for Improving Critical Infrastructure Cyber security?
- A . Threat environment
- B . Number of past cybersecurity incidents
- C . Stakeholders’ involvement m the process
Which of the following represents a cyber threat related 10 system configurations and environments?
- A . The vulnerable system or service originating from IC1 supply chains
- B . The operation of the system o» service depends on network services
- C . The system or service is publicly accessible through the internet
Scenario 5: Pilotron is a large manufacturer known for its electric vehicles that use renewable energy. One of Its objectives Is 10 make the world a cleaner place by reducing the consumption of fossil fuels. In addition to electric vehicles, Pilotron also offers solar roof and advanced battery technology, all manufactured at its factory in Bastogne. Belgium. As one of the most Innovative manufacturers in Europe, Pilotron invests heavily in research and development to create unique components, such as motors, sensors, and batteries. In addillon, it places a strong emphasis on delivering high-quality products, and requires all employees to undergo an intensive onboarding program that includes hands-on training.
Pilotron did not prioritize the establishment of a cybersecurity program to protect its information. This became evident when a frustrated employee took advantage of the company’s lack of cybersecurity measures. The employee was aware that Pilotron’s existing security measures could easily be evaded The company became aware of the incident after five weeks, when a sudden surge in network data transfer raised suspicions upon investigation. Pilotron discovered that the employee had multiple requests for access to software development resources that were unrelated to their daily tasks By using a false user name and avoiding the implemented cybersecurity controls, the employee directly modified the code of one of Pilotron’s products. This unauthorized code change enabled the employee to transfer highly sensitive data to external parties
Knowing that insider threats pose a significant risk and the existing security controls were ineffective. Pilotron decided to shift its cybersecurity focus toward proactive detection and prevention strategies. It implemented a security software that detects unusual access patterns, large data upload, and credential abuse Additionally, Pilotron recognized the need to help improve the security of Its systems by Isolating devices (PCs. servers) on the opposite sides of a firewall.
The company also implemented an identity management solution to ensure the verification of Individuals requesting access. It decided to implement a mechanism that ensured only authorized individuals can access sensitive systems and data. In addition to the traditional username and password, employees were now required to provide a unique personal identifier, such as a fingerprint, as well as a one-time verification code generated through a mobile app
Moreover, in order to enhance security measures and gain the benefits of cloud computing, Pilotron decided to leverage cloud based services. A kiv factor in Pilotroo’s decision was the capability to construct and oversee its personalized Infrastructure Instead of depending on pre-set platforms or software applications, the company could craft its virtualized environments. The significant level of customization is of utmost importance to Pilotron since it enables adjusting its infrastructure to align with the specific requirements of its projects and clients.
Based on the scenario above, answer the following question:
What security software did Pilotron implement to mitigate internal attacks?
- A . Security incident and event management (SIEM)
- B . User behavior analytics (UBA)
- C . Extended detection and response (XDR)