ExamGecko
Home Home / IAPP / CIPM
Question list
Search
Search

List of questions

Search

Related questions











Question 19 - CIPM discussion

Report
Export

SCENARIO

Please use the following to answer the next QUESTION:

Ben works in the IT department of IgNight, Inc., a company that designs lighting solutions for its clients. Although IgNight's customer base consists primarily of offices in the US, some individuals have been so impressed by the unique aesthetic and energy-saving design of the light fixtures that they have requested IgNight's installations in their homes across the globe.

One Sunday morning, while using his work laptop to purchase tickets for an upcoming music festival, Ben happens to notice some unusual user activity on company files. From a cursory review, all the data still appears to be where it is meant to be but he can't shake off the feeling that something is not right. He knows that it is a possibility that this could be a colleague performing unscheduled maintenance, but he recalls an email from his company's security team reminding employees to be on alert for attacks from a known group of malicious actors specifically targeting the industry.

Ben is a diligent employee and wants to make sure that he protects the company but he does not want to bother his hard-working colleagues on the weekend. He is going to discuss the matter with this manager first thing in the morning but wants to be prepared so he can demonstrate his knowledge in this area and plead his case for a promotion.

Going forward, what is the best way for IgNight to prepare its IT team to manage these kind of security events?

A.

Tabletop exercises.

Answers
A.

Tabletop exercises.

B.

Update its data inventory.

Answers
B.

Update its data inventory.

C.

IT security awareness training.

Answers
C.

IT security awareness training.

D.

Share communications relating to scheduled maintenance.

Answers
D.

Share communications relating to scheduled maintenance.

Suggested answer: A

Explanation:

The best way for IgNight to prepare its IT team to manage these kind of security events is to conduct tabletop exercises. Tabletop exercises are simulated scenarios that test the organization's ability to respond to security incidents in a realistic and interactive way. Tabletop exercises typically involve:

A facilitator who guides the participants through the scenario and injects additional challenges or variables

A scenario that describes a plausible security incident based on real-world threats or past incidents

A set of objectives that define the expected outcomes and goals of the exercise

A set of questions that prompt the participants to discuss their roles, responsibilities, actions, decisions, and communications during the incident response process

A feedback mechanism that collects the participants' opinions and suggestions on how to improve the incident response plan and capabilities

Tabletop exercises help an organization prepare for and deal with security incidents by:

Enhancing the awareness and skills of the IT team and other stakeholders involved in incident response

Identifying and addressing the gaps, weaknesses, and challenges in the incident response plan and process

Improving the coordination and collaboration among the IT team and other stakeholders during incident response

Evaluating and validating the effectiveness and efficiency of the incident response plan and process

Generating and implementing lessons learned and best practices for incident response

The other options are not as effective or useful as tabletop exercises for preparing the IT team to manage security events. Updating the data inventory is a good practice for maintaining an accurate and comprehensive record of the personal data that the organization collects, processes, stores, shares, or disposes of. However, it does not test or improve the organization's incident response capabilities or readiness. IT security awareness training is a good practice for educating the IT team and other employees on the basic principles and practices of cybersecurity. However, it does not simulate or replicate the real-world situations and challenges that the IT team may face during security incidents. Sharing communications relating to scheduled maintenance is a good practice for informing the IT team and other stakeholders of the planned activities and potential impacts on the IT systems and infrastructure. However, it does not prepare the IT team for dealing with unplanned or unexpected security events that may require immediate and coordinated response.Reference:CISA Tabletop Exercise Packages;Cybersecurity Tabletop Exercise Examples, Best Practices, and Considerations;Six Tabletop Exercises to Help Prepare Your Cybersecurity Team

asked 22/11/2024
Samya Sharab
40 questions
User
Your answer:
0 comments
Sorted by

Leave a comment first