Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: dcdisc65

Page: 1 / 3
Total 24 questions
Exam Code: ISO-IEC-27035-Lead-Incident-Manager                Update: Sep 23, 2025
Exam Name: PECB Certified ISO/IEC 27035 Lead Incident Manager

PECB PECB Certified ISO/IEC 27035 Lead Incident Manager ISO-IEC-27035-Lead-Incident-Manager Exam Dumps: Updated Questions & Answers (September 2025)

Question # 1

Based on ISO/IEC 27035-2, which of the following is an example of evaluation activities used to evaluate the effectiveness of the incident management team?

A.

Conducting information security testing, particularly vulnerability assessment

B.

Analyzing the lessons learned once an information security incident has been handled and closed

C.

Evaluating the capabilities and services once they become operational

Question # 2

During an ongoing cybersecurity incident investigation, the Incident Management Team (IMT) at a cybersecurity company identifies a pattern similar to recent attacks on other organizations. According to best practices, what actions should the IMT take?

A.

Proactively exchange technical information and incident insights with trusted Incident Response Teams (IRTs) from similar organizations while adhering to predefined information-sharing protocols to improve collective security postures

B.

Focus on internal containment and eradication processes, consulting external experts strictly for legal and public relations management

C.

Delay any external communication until a thorough internal review is conducted, and the impact of the incident is fully understood to prevent any premature information leakage that could affect ongoing mitigation efforts

Question # 3

Which action is NOT involved in the process of improving controls in incident management?

A.

Documenting risk assessment results

B.

Implementing new or updated controls

C.

Updating the incident management policy

Question # 4

Which element should an organization consider when identifying the scope of their information security incident management?

A.

Hardcopy information

B.

Electronic information

C.

Both A and B

Question # 5

Scenario 1: RoLawyers is a prominent legal firm based in Guadalajara, Mexico. It specializes in a wide range of legal services tailored to meet the diverse needs of its clients. Committed to excellence and integrity, RoLawyers has a reputation for providing legal representation and consultancy to individuals, businesses, and organizations across various sectors.

Recognizing the critical importance of information security in today’s digital landscape, RoLawyers has embarked on a journey to enhance its information security measures. This company is implementing an information security incident management system aligned with ISO/IEC 27035-1 and ISO/IEC 27035-2 guidelines. This initiative aims to strengthen RoLawyers’ protections against possible cyber threats by implementing a structured incident response process to provide guidance on establishing and maintaining a competent incident response team.

After transitioning its database from physical to online infrastructure to facilitate seamless information sharing among its branches, RoLawyers encountered a significant security incident. A malicious attack targeted the online database, overloading it with traffic and causing a system crash, making it impossible for employees to access it for several hours.

In response to this critical incident, RoLawyers quickly implemented new measures to mitigate the risk of future occurrences. These measures included the deployment of a robust intrusion detection system (IDS) designed to proactively identify and alert the IT security team of potential intrusions or suspicious activities across the network infrastructure. This approach empowers RoLawyers to respond quickly to security threats, minimizing the impact on their operations and ensuring the continuity of its legal services.

By being proactive about information security and incident management, RoLawyers shows its dedication to protecting sensitive data, keeping client information confidential, and earning the trust of its stakeholders. Using the latest practices and technologies, RoLawyers stays ahead in legal innovation and is ready to handle cybersecurity threats with resilience and careful attention.

According to scenario 1, what information security incident did RoLawyers face?

A.

Denial-of-service attack

B.

Man-in-the-middle attack

C.

Malware attack

Question # 6

Which document provides guidelines for planning and preparing for incident response and for learning lessons from the incident response process?

A.

ISO/IEC 27035-1

B.

ISO/IEC 27035-2

C.

ISO/IEC 27037

Question # 7

Who is responsible for providing threat intelligence and supporting the lead investigator within an incident response team?

A.

IT support staff

B.

Analysts and researchers

C.

Team leader

Question # 8

What role do indicators of compromise play in incident management?

A.

They facilitate the forensic analysis process

B.

They assess the scope of isolation measures

C.

They uncover evidence of malicious activities

Question # 9

Scenario 6: EastCyber has established itself as a premier cyber security company that offers threat detection, vulnerability assessment, and penetration testing tailored to protect organizations from emerging cyber threats. The company effectively utilizes ISO/IEC 27035*1 and 27035-2 standards, enhancing its capability to manage information security incidents.

EastCyber appointed an information security management team led by Mike Despite limited resources, Mike and the team implemented advanced monitoring protocols to ensure that every device within the company’s purview is under constant surveillance This monitoring approach is crucial for covering everything thoroughly, enabling the information security and cyber management team to proactively detect and respond to any sign of unauthorized access, modifications, or malicious activity within its systems and networks.

In addition, they focused on establishing an advanced network traffic monitoring system This system carefully monitors network activity, quickly spotting and alerting the security team to unauthorized actions This vigilance is pivotal in maintaining the integrity of EastCyber’s digital infrastructure and ensuring the confidentiality, availability, and integrity of the data it protects.

Furthermore, the team focused on documentation management. They meticulously crafted a procedure to ensure thorough documentation of information security events. Based on this procedure, the company would document only the events that escalate into high-severity incidents and the subsequent actions. This documentation strategy streamlines the incident management process, enabling the team to allocate resources more effectively and focus on incidents that pose the greatest threat.

A recent incident involving unauthorized access to company phones highlighted the critical nature of incident management. Nate, the incident coordinator, quickly prepared an exhaustive incident report. His report detailed an analysis of the situation, identifying the problem and its cause. However, it became evident that assessing the seriousness and the urgency of a response was inadvertently overlooked.

In response to the incident, EastCyber addressed the exploited vulnerabilities. This action started the eradication phase, aimed at systematically eliminating the elements of the incident. This approach addresses the immediate concerns and strengthens EastCyber’s defenses against similar threats in the future.

Based on scenario 6, EastCyber’s team established a procedure for documenting only the information security events that escalate into high-severity incidents. According to ISO/IEC 27035-1, is this approach acceptable?

A.

The standard suggests that organizations document only events that classify as high-severity incidents

B.

No, they should use established guidelines to document events and subsequent actions when the event is classified as an information security incident

C.

No, because documentation should only occur post-incident to avoid any interference with the response process

Question # 10

What is a key activity in the response phase of information security incident management?

A.

Logging all activities, results, and related decisions for later analysis

B.

Ensuring the change control regime covers information security incident tracking

C.

Restoring systems to normal operation

Page: 1 / 3
Total 24 questions

Most Popular Certification Exams

Payment

       

Contact us

dumpscollection live chat

Site Secure

mcafee secure

TESTED 23 Sep 2025