PECB Lead Implementer Exam Practice Questions (P. 1)
- Full Access (208 questions)
- Six months of Premium Access
- Access to one million comments
- Seamless ChatGPT Integration
- Ability to download PDF files
- Anki Flashcard files for revision
- No Captcha & No AdSense
- Advanced Exam Configuration
Question #1
Scenario 1: HealthGenic is a pediatric clinic that monitors the health and growth of individuals from infancy to early adulthood using a web-based medical software. The software is also used to schedule appointments, create customized medical reports, store patients’ data and medical history, and communicate with all the involved parties, including parents, other physicians, and the medical laboratory staff.
Last month, HealthGenic experienced a number of service interruptions due to the increased number of users accessing the software. Another issue the company faced while using the software was the complicated user interface, which the untrained personnel found challenging to use.
The top management of HealthGenic immediately informed the company that had developed the software about the issue. The software company fixed the issue; however, in the process of doing so, it modified some files that comprised sensitive information related to HealthGenic’s patients. The modifications that were made resulted in incomplete and incorrect medical reports and, more importantly, invaded the patients’ privacy.
Based on the scenario above, answer the following question:
Which of the following indicates that the confidentiality of information was compromised?
Last month, HealthGenic experienced a number of service interruptions due to the increased number of users accessing the software. Another issue the company faced while using the software was the complicated user interface, which the untrained personnel found challenging to use.
The top management of HealthGenic immediately informed the company that had developed the software about the issue. The software company fixed the issue; however, in the process of doing so, it modified some files that comprised sensitive information related to HealthGenic’s patients. The modifications that were made resulted in incomplete and incorrect medical reports and, more importantly, invaded the patients’ privacy.
Based on the scenario above, answer the following question:
Which of the following indicates that the confidentiality of information was compromised?
- AService interruptions due to the increased number of users
- BInvasion of patients’ privacy
- CModification of patients’ medical reports
send
light_mode
delete
Question #2
Based on scenario 1, what is a potential impact of the loss of integrity of information in HealthGenic?
- ADisruption of operations and performance degradation
- BIncomplete and incorrect medical reports
- CService interruptions and complicated user interface
send
light_mode
delete
Question #3
Intrinsic vulnerabilities, such as the _____________, are related to the characteristics of the asset. Refer to scenario 1.
- ASoftware malfunction
- BService interruptions
- CComplicated user interface
send
light_mode
delete
Question #4
Which situation described in scenario 1 represents a threat to HealthGenic?
- AHealthGenic did not train its personnel to use the software
- BThe software company modified information related to HealthGenic’s patients
- CHealthGenic used a web-based medical software for storing patients' confidential information
send
light_mode
delete
Question #5
In scenario 1, HealthGenic experienced a number of service interruptions due to the loss of functionality of the software. Which principle of information security has been affected in this case?
send
light_mode
delete
All Pages