PECB Certified NIS 2 Directive Lead Implementer v1.0

Page:    1 / 6   
Exam contains 80 questions

Scenario 4: StellarTech is a technology company that provides innovative solutions for a connected world. Its portfolio includes groundbreaking Internet of Things (IoT) devices, high-performance software applications, and state-of-the-art communication systems. In response to the ever-evolving cybersecurity landscape and the need to ensure digital resilience, StellarTech has decided to establish a cybersecurity program based on the NIS 2 Directive requirements. The company has appointed Nick, an experienced information security manager, to ensure the successful implementation of these requirements. Nick initiated the implementation process by thoroughly analyzing StellarTech’s organizational structure. He observed that the company has embraced a well-defined model that enables the allocation of verticals based on specialties or operational functions and facilitates distinct role delineation and clear responsibilities.
To ensure compliance with the NIS 2 Directive requirements, Nick and his team have implemented an asset management system and established as asset management policy, set objectives, and the processes to achieve those objectives. As part of the asset management process, the company will identify, record, maintain all assets within the system’s scope.
To manage risks effectively, the company has adopted a structured approach involving the definition of the scope and parameters governing risk management, risk assessments, risk treatment, risk acceptance, risk communication, awareness and consulting, and risk monitoring and review processes. This approach enables the application of cybersecurity practices based on previous and currently cybersecurity activities, including lessons learned and predictive indicators. StellarTech’s organization-wide risk management program aligns with objectives monitored by senior executives, who treat it like financial risk. The budget is structured according to the risk landscape, while business units implement executive vision with a strong awareness of system-level risks. The company shares real-time information, understanding its role within the larger ecosystem and actively contributing to risk understanding. StellarTech’s agile response to evolving threats and emphasis on proactive communication showcase its dedication to cybersecurity excellence and resilience.
Last month, the company conducted a comprehensive risk assessment. During this process, it identified a potential threat associated with a sophisticated form of cyber intrusion, specifically targeting IoT devices. This threat, although theoretically possible, was deemed highly unlikely to materialize due to the company’s robust security measures, the absence of prior incidents, and its existing strong cybersecurity practices.
Based on the scenario above, answer the following question:
What organizational model has StellarTech embraced?

  • A. Divisional
  • B. Matrix
  • C. Functional


Answer : C

Based on scenario 4, what will StellarTech identify record, and maintain during asset management?

  • A. An asset management plan
  • B. An asset portfolio
  • C. An asset framework


Answer : B

Based on scenario 4, which framework is StellarTech’s structured approach to managing risks aligned with?

  • A. COSO ERM Framework
  • B. ISO 31000
  • C. ENISA Risk Management Framework


Answer : B

In terms of the NIST Framework, under which implementation tier does StellarTech fall based on the level of implementation of its risk management measures within the company? Refer to scenario 4.

  • A. Tier 2: Risk informed
  • B. Tier 3: Repeatable
  • C. Tier 4: Adaptive


Answer : C

Based on scenario 4, which risk level does the identified threat during StellarTech’s assessment fall into?

  • A. Moderate
  • B. Low
  • C. Very low


Answer : C

Scenario 5: Based in Altenberg, Germany, Astral Nexus Power is an innovative company founded by visionary engineers and scientists focused on pioneering technologies in the electric power sector. It focuses on the development of next-generation energy storage solutions powered by cutting-edge quantum materials. Recognizing the critical importance of securing its energy infrastructure, the company has adopted the NIS 2 Directive requirements. In addition, it continually cooperates with cybersecurity experts to fortify its digital systems, protect against cyber threats, and ensure the integrity of the power grid. By incorporating advanced security protocols, the company contributes to the overall resilience and stability of the European energy landscape.
Dedicated to ensuring compliance with NIS 2 Directive requirements, the company initiated a comprehensive journey toward transformation, beginning with an in-depth comprehension of its structure and context, which paved the way for the clear designation of roles and responsibilities related to security, among others. The company has appointed a Chief Information Security Officer (CISO) who is responsible to set the strategic direction for cybersecurity and ensure the protection of information assets. The CISO reports directly to the Chief Executive Officer (CEO) of Astral Nexus Power which helps in making more informed decisions concerning risks, resources, and investments. To effectively carry the roles and responsibilities related to information security, the company established a cybersecurity team which includes the company’s employees and an external cybersecurity consultant to guide them.
Astral Nexus Power is also focused on managing assets effectively. It consistently identifies and categorizes all of its digital assets, develops an inventory of all assets, and assesses the risks associated with each asset. Moreover, it monitors and maintains the assets and has a process for continual improvement in place. The company has also assigned its computer security incident response team (CSIRT) with the responsibility to monitor its on and off premises internet-facing assets, which help in managing organizational risks.
Furthermore, the company initiates a thorough process of risk identification, analysis, evaluation, and treatment. By identifying operational scenarios, which are then detailed in terms of assets, threats, and vulnerabilities, the company ensures a comprehensive identification and understanding of potential risks. This understanding informs the selection and development of risk treatment strategies, which are then communicated and consulted upon with stakeholders. Astral Nexus Power’s commitment is further underscored by a meticulous recording and reporting of these measures, fostering transparency and accountability.
Based on the scenario above, answer the following question:
Which risk identification approach does Astral Nexus Power use?

  • A. Asset-based approach
  • B. Event-based approach
  • C. All-hazards approach


Answer : A

Based on scenario 5, the CISO reports directly to the CEO of Astral Nexus Power. Is this in alignment with best practices?

  • A. No, this type of structure does not allow the CISO to properly exercise the mandate with regards to cybersecurity
  • B. No, the current organizational structure impedes inter-departmental collaboration which would enable balanced distribution of tasks
  • C. Yes, it is advisable for the CISO to report directly to the top management to facilitate the process of decision-making with respect to cybersecurity


Answer : C

Has Astral Nexus Power followed all the necessary steps to manage assets in cyberspace in accordance with best practices? Refer to scenario 5.

  • A. No, the company should also implement appropriate security controls after assessing the risks associated with each asset
  • B. Yes, the company has followed all the steps required to manage assets in cyberspace in accordance with best practices
  • C. No, the company must also involve external third parties to review and validate its asset management processes


Answer : A

Based on scenario 5, which of the following best demonstrates Astral Nexus Power’s commitment to meeting NIS 2 Directive’s requirements regarding asset management?

  • A. The company’s in-depth comprehension of its structure and context
  • B. CSIRT’s monitoring of the company’s on and off premises internet-facing assets
  • C. The company’s clear designation of roles and responsibilities


Answer : B

Based on scenario 5, Astral Nexus Power’s hired an external consultant to provide guidance to the cybersecurity team compromised by the company’s employees. Is this acceptable?

  • A. No, the cybersecurity team must be compromised by inside staff only to ensure confidentiality and avoid disclosing internal processes to external parties
  • B. No, the cybersecurity team must be compromised by external cybersecurity experts only
  • C. Yes, for establishing the cybersecurity team, decisions can be made to incorporate inside staff and guidance of an external expert


Answer : C

What is the primary responsibility of an information security manager?

  • A. Ensuring the successful implementation and management of cybersecurity practices
  • B. Establishing directions and high-level goals
  • C. Securing funding and managing resources


Answer : A

What is the purpose of the RASCI model?

  • A. Defining the roles and responsibilities of individuals for performing specific activities
  • B. Establishing the organization’s long-term goals
  • C. Evaluating the effectiveness of the cybersecurity strategy


Answer : A

What information does NOT have to be included in an asset inventory for effective asset management?

  • A. Location of asset
  • B. Value of assets to the organization
  • C. Market value of assets


Answer : C

According to recital 77 of NIS 2 Directive, who holds the primary responsibility for ensuring the security of networks and information systems?

  • A. Consumers of digital services
  • B. Essential and important entities
  • C. Government agencies exclusively


Answer : B

According to recital 59 of the NIS 2 Directive, who is responsible for ensuring alignment with international standards and existing industry best practices for cybersecurity risk management?

  • A. The organizations affected by the Directive
  • B. The European Parliament and European Council
  • C. The Commission, ENISA, and Member States


Answer : C

Page:    1 / 6   
Exam contains 80 questions

Talk to us!


Have any questions or issues ? Please dont hesitate to contact us

Certlibrary.com is owned by MBS Tech Limited: Room 1905 Nam Wo Hong Building, 148 Wing Lok Street, Sheung Wan, Hong Kong. Company registration number: 2310926
Certlibrary doesn't offer Real Microsoft Exam Questions. Certlibrary Materials do not contain actual questions and answers from Cisco's Certification Exams.
CFA Institute does not endorse, promote or warrant the accuracy or quality of Certlibrary. CFA® and Chartered Financial Analyst® are registered trademarks owned by CFA Institute.
Terms & Conditions | Privacy Policy | Amazon Exams | Cisco Exams | CompTIA Exams | Databricks Exams | Fortinet Exams | Google Exams | Microsoft Exams | VMware Exams