Free PECB ISO-IEC-27005-Risk-Manager Exam Actual Questions

The questions for ISO-IEC-27005-Risk-Manager were last updated On Sep 17, 2024

Question No. 1

According to CRAMM methodology, how is risk assessment initiated?

Show Answer Hide Answer
Correct Answer: A

According to the CRAMM (CCTA Risk Analysis and Management Method) methodology, risk assessment begins by collecting detailed information on the system and identifying all assets that fall within the defined scope. This foundational step ensures that the assessment is comprehensive and includes all relevant assets, which could be potential targets for risk. This makes option A the correct answer.


Question No. 2

Which activity below is NOT included in the information security risk assessment process?

Show Answer Hide Answer
Correct Answer: C

The information security risk assessment process, as outlined in ISO/IEC 27005, typically includes identifying risks, assessing their potential impact, and prioritizing them. However, selecting risk treatment options is not part of the risk assessment process itself; it is part of the subsequent risk treatment phase. Therefore, option C is the correct answer as it is not included in the risk assessment process.


Question No. 3

Based on NIST Risk Management Framework, what is the last step of a risk management process?

Show Answer Hide Answer
Correct Answer: A

Based on the NIST Risk Management Framework (RMF), the last step of the risk management process is 'Monitoring Security Controls.' This step involves continuously tracking the effectiveness of the implemented security controls, ensuring they remain effective against identified risks, and adapting them to any changes in the threat landscape. Option A correctly identifies the final step.


Question No. 4

After creating a plan for outsourcing to a cloud service provider to store their confidential information in cloud, OrgX decided to not pursue this business strategy since the risk of doing so was high. Which risk treatment option did OrgX use?

Show Answer Hide Answer
Correct Answer: A

OrgX decided not to pursue a business strategy involving outsourcing to a cloud service provider due to the high risk. This decision reflects a 'risk avoidance' strategy, where the organization chooses not to engage in an activity that poses unacceptable risks. This aligns with option A.


Question No. 5

According to ISO/IEC 27005, what is the output of the documentation of risk management processes?

Show Answer Hide Answer
Correct Answer: B

According to ISO/IEC 27005, the output of the documentation of risk management processes should include detailed information about the results of the risk assessment and the chosen risk treatment options. This ensures transparency and provides a clear record of the decision-making process related to information security risk management. Therefore, option B is the correct answer.