Welcome to ExamTopics
ExamTopics Logo
- Expert Verified, Online, Free.
 

PECB Risk Manager Exam Actual Questions

The questions for Risk Manager were last updated on Oct. 23, 2024.
  • Viewing page 1 out of 15 pages.
  • Viewing questions 1-4 out of 60 questions

Topic 1 - Exam A

Question #1 Topic 1

Can organizations obtain certification against ISO 31000?

  • A. Yes, organizations of any type or size can obtain certification against ISO 31000
  • B. Yes, but only organizations that manufacture products can obtain an ISO 31000 certification
  • C. No, organizations cannot obtain certification against ISO 31000, as the standard provides only guidelines
Reveal Solution Hide Solution   Discussion  

Correct Answer: C 🗳️

Question #2 Topic 1

Which of the following statements best defines information security risk?

  • A. The potential that threats will exploit vulnerabilities of an information asset and cause harm to an organization
  • B. Weakness of an asset or control that can be exploited by one or a group of threats
  • C. Potential cause of an unwanted incident related to information security that can cause harm to an organization
Reveal Solution Hide Solution   Discussion  

Correct Answer: A 🗳️

Question #3 Topic 1

Scenario 1 -
The risk assessment process was led by Henry, Bontton’s risk manager. The first step that Henry took was identifying the company’s assets. Afterward, Henry created various potential incident scenarios. One of the main concerns regarding the use of the application was the possibility of being targeted by cyber attackers, as a great number of organizations were experiencing cyberattacks during that time. After analyzing the identified risks, Henry evaluated them and concluded that new controls must be implemented if the company wants to use the application. Among others, he stated that training should be provided to personnel regarding the use of the application and that awareness sessions should be conducted regarding the importance of protecting customers’ personal data.
Lastly, Henry communicated the risk assessment results to the top management. They decided that the application will be used only after treating the identified risks.
Based on the scenario above, answer the following question:
Bontton established a risk management process based on ISO/IEC 27005, to systematically manage information security threats. Is this a good practice?

  • A. Yes, ISO/IEC 27005 provides guidelines for information security risk management that enable organizations to systematically manage information security threats
  • B. Yes, ISO/IEC 27005 provides guidelines to systematically manage all types of threats that organizations may face
  • C. No, ISO/IEC 27005 cannot be used to manage information security threats in the food sector
Reveal Solution Hide Solution   Discussion  

Correct Answer: A 🗳️

Question #4 Topic 1

Scenario 1 -
The risk assessment process was led by Henry, Bontton’s risk manager. The first step that Henry took was identifying the company’s assets. Afterward, Henry created various potential incident scenarios. One of the main concerns regarding the use of the application was the possibility of being targeted by cyber attackers, as a great number of organizations were experiencing cyberattacks during that time. After analyzing the identified risks, Henry evaluated them and concluded that new controls must be implemented if the company wants to use the application. Among others, he stated that training should be provided to personnel regarding the use of the application and that awareness sessions should be conducted regarding the importance of protecting customers’ personal data.
Lastly, Henry communicated the risk assessment results to the top management. They decided that the application will be used only after treating the identified risks.
Based on scenario 1, Bontton used ISO/IEC 27005 to ensure effective implementation of all ISO/IEC 27001 requirements. Is this appropriate?

  • A. Yes, ISO/IEC 27005 provides direct guidance on the implementation of the requirements given in ISO/IEC 27001
  • B. Yes, ISO/IEC 27005 provides a number of methodologies that can be used under the risk management framework for implementing all requirements given in ISO/IEC 27001
  • C. No, ISO/IEC 27005 does not contain direct guidance on the implementation of all requirements given in ISO/IEC 27001
Reveal Solution Hide Solution   Discussion  

Correct Answer: C 🗳️

Community vote distribution
A (35%)
C (25%)
B (20%)
Other
Most Voted
A voting comment increases the vote count for the chosen answer by one.

Upvoting a comment with a selected answer will also increase the vote count towards that answer by one. So if you see a comment that you already agree with, you can upvote it instead of posting a new comment.

SaveCancel
Loading ...