PECB ISO-IEC-27005-Risk-Manager Exam Real Questions

Prepare and pass your PECB Certified ISO/IEC 27005 Risk Manager Certification with free ISO-IEC-27005-Risk-Manager exam questions.

Page:    1 / 12      
Total 60 Questions | Updated On: Oct 15, 2024
Add To Cart
Question 1

Scenario 4: In 2017, seeing that millions of people turned to online shopping, Ed and James Cordon foundedthe online marketplace for footwear called Poshoe. In the past, purchasing pre-owned designer shoes onlinewas not a pleasant experience because of unattractive pictures and an inability to ascertain the products’authenticity. However, after Poshoe’s establishment, each product was well advertised and certified asauthentic before being offered to clients. This increased the customers’ confidence and trust in Poshoe’sproducts and services. Poshoe has approximately four million users and its mission is to dominate the secondhand sneaker market and become a multi-billion dollar company.Due to the significant increase of daily online buyers, Poshoe’s top management decided to adopt a big dataanalytics tool that could help the company effectively handle, store, and analyze data. Before initiating the implementation process, they decided to conduct a risk assessment. Initially, the company identified its assets,threats, and vulnerabilities associated with its information systems. In terms of assets, the company identifiedthe information that was vital to the achievement of the organization’s mission and objectives. During thisphase, the company also detected a rootkit in their software, through which an attacker could remotely accessPoshoe’s systems and acquire sensitive data.The company discovered that the rootkit had been installed by an attacker who had gained administratoraccess. As a result, the attacker was able to obtain the customers’ personal data after they purchased a productfrom Poshoe. Luckily, the company was able to execute some scans from the target device and gain greatervisibility into their software’s settings in order to identify the vulnerability of the system.The company initially used the qualitative risk analysis technique to assess the consequences and thelikelihood and to determine the level of risk. The company defined the likelihood of risk as “a few times intwo years with the probability of 1 to 3 times per year.” Later, it was decided that they would use aquantitative risk analysis methodology since it would provide additional information on this major risk.Lastly, the top management decided to treat the risk immediately as it could expose the company to otherissues. In addition, it was communicated to their employees that they should update, secure, and back upPoshoe’s software in order to protect customers’ personal information and prevent unauthorized access fromattackers.According to scenario 4, which type of assets was identified during the risk identification process?


Answer: B
Question 2

Which statement regarding information gathering techniques is correct? 


Answer: B
Question 3

Scenario 4: In 2017, seeing that millions of people turned to online shopping, Ed and James Cordon foundedthe online marketplace for footwear called Poshoe. In the past, purchasing pre-owned designer shoes onlinewas not a pleasant experience because of unattractive pictures and an inability to ascertain the products’authenticity. However, after Poshoe’s establishment, each product was well advertised and certified asauthentic before being offered to clients. This increased the customers’ confidence and trust in Poshoe’sproducts and services. Poshoe has approximately four million users and its mission is to dominate the secondhand sneaker market and become a multi-billion dollar company.Due to the significant increase of daily online buyers, Poshoe’s top management decided to adopt a big dataanalytics tool that could help the company effectively handle, store, and analyze data. Before initiating the implementation process, they decided to conduct a risk assessment. Initially, the company identified its assets,threats, and vulnerabilities associated with its information systems. In terms of assets, the company identifiedthe information that was vital to the achievement of the organization’s mission and objectives. During thisphase, the company also detected a rootkit in their software, through which an attacker could remotely accessPoshoe’s systems and acquire sensitive data.The company discovered that the rootkit had been installed by an attacker who had gained administratoraccess. As a result, the attacker was able to obtain the customers’ personal data after they purchased a productfrom Poshoe. Luckily, the company was able to execute some scans from the target device and gain greatervisibility into their software’s settings in order to identify the vulnerability of the system.The company initially used the qualitative risk analysis technique to assess the consequences and thelikelihood and to determine the level of risk. The company defined the likelihood of risk as “a few times intwo years with the probability of 1 to 3 times per year.” Later, it was decided that they would use aquantitative risk analysis methodology since it would provide additional information on this major risk.Lastly, the top management decided to treat the risk immediately as it could expose the company to otherissues. In addition, it was communicated to their employees that they should update, secure, and back upPoshoe’s software in order to protect customers’ personal information and prevent unauthorized access fromattackers.According to scenario 4, which type of assets was identified during the risk identification process?


Answer: B
Question 4

Scenario 5: Detika is a private cardiology clinic in Pennsylvania, the US. Detika has one of the most advancedhealthcare systems for treating heart diseases. The clinic uses sophisticated apparatus that detects heartdiseases in early stages. Since 2010, medical information of Detika’s patients is stored on the organization’sdigital systems. Electronic health records (EHR), among others, include patients’ diagnosis, treatment plan,and laboratory results.Storing and accessing patient and other medical data digitally was a huge and a risky step for Detika.Considering the sensitivity of information stored in their systems, Detika conducts regular risk assessments toensure that all information security risks are identified and managed. Last month, Detika conducted a riskassessment which was focused on the EHR system. During risk identification, the IT team found out thatsome employees were not updating the operating systems regularly. This could cause major problems such asa data breach or loss of software compatibility. In addition, the IT team tested the software and detected aflaw in one of the software modules used. Both issues were reported to the top management and they decidedto implement appropriate controls for treating the identified risks. They decided to organize training sessionsfor all employees in order to make them aware of the importance of the system updates. In addition, themanager of the IT Department was appointed as the person responsible for ensuring that the software isregularly tested.Another risk identified during the risk assessment was the risk of a potential ransomware attack. This risk wasdefined as low because all their data was backed up daily. The IT team decided to accept the actual risk ofransomware attacks and concluded that additional measures were not required. This decision was documentedin the risk treatment plan and communicated to the risk owner. The risk owner approved the risk treatmentplan and documented the risk assessment results.Following that, Detika initiated the implementation of new controls. In addition, one of the employees of theIT Department was assigned the responsibility for monitoring the implementation process and ensure theeffectiveness of the security controls. The IT team, on the other hand, was responsible for allocating theresources needed to effectively implement the new controls.How should Detika define which of the identified risks should be treated first? Refer to scenario 5


Answer: A
Question 5

Which activity below is NOT included in the information security risk assessment process? 


Answer: C
Page:    1 / 12      
Total 60 Questions | Updated On: Oct 15, 2024
Add To Cart

© Copyrights DumpsCertify 2024. All Rights Reserved

We use cookies to ensure your best experience. So we hope you are happy to receive all cookies on the DumpsCertify.