Winter Sale - Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: top65certs

ISO-IEC-27005-Risk-Manager Exam Dumps : PECB Certified ISO/IEC 27005 Risk Manager

PDF
ISO-IEC-27005-Risk-Manager pdf
 Real Exam Questions and Answer
 Last Update: Nov 17, 2025
 Question and Answers: 60 With Explanation
 Compatible with all Devices
 Printable Format
 100% Pass Guaranteed
$29.75  $84.99
ISO-IEC-27005-Risk-Manager exam
PDF + Testing Engine
ISO-IEC-27005-Risk-Manager PDF + engine
 Both PDF & Practice Software
 Last Update: Nov 17, 2025
 Question and Answers: 60
 Discount Offer
 Download Free Demo
 24/7 Customer Support
$47.25  $134.99
Testing Engine
ISO-IEC-27005-Risk-Manager Engine
 Desktop Based Application
 Last Update: Nov 17, 2025
 Question and Answers: 60
 Create Multiple Test Sets
 Questions Regularly Updated
  90 Days Free Updates
  Windows and Mac Compatible
$35  $99.99

Verified By IT Certified Experts

CertsTopics.com Certified Safe Files

Up-To-Date Exam Study Material

99.5% High Success Pass Rate

100% Accurate Answers

Instant Downloads

Exam Questions And Answers PDF

Try Demo Before You Buy

Certification Exams with Helpful Questions And Answers

PECB Certified ISO/IEC 27005 Risk Manager Questions and Answers

Question 1

Based on NIST Risk Management Framework, what is the last step of a risk management process?

Options:

A.

Monitoring security controls

B.

Accessing security controls

C.

Communicating findings and recommendations

Buy Now
Question 2

According to ISO/IEC 27005, what is the output of the documentation of risk management processes?

Options:

A.

Knowledge on the information security risk assessment and treatment processes in accordance with clauses 7 and 8 of the standard

B.

Documented information about the information security risk assessment and treatment results

C.

Documented information that is necessary for the effectiveness of the information security risk assessment or risk treatment processes

Question 3

Scenario 4: In 2017, seeing that millions of people turned to online shopping, Ed and James Cordon founded the online marketplace for footwear called Poshoe. In the past, purchasing pre-owned designer shoes online was not a pleasant experience because of unattractive pictures and an inability to ascertain the products’ authenticity. However, after Poshoe’s establishment, each product was well advertised and certified as authentic before being offered to clients. This increased the customers’ confidence and trust in Poshoe’s products and services. Poshoe has approximately four million users and its mission is to dominate the second-hand sneaker market and become a multi-billion dollar company.

Due to the significant increase of daily online buyers, Poshoe’s top management decided to adopt a big data analytics tool that could help the company effectively handle, store, and analyze data. Before initiating the implementation process, they decided to conduct a risk assessment. Initially, the company identified its assets, threats, and vulnerabilities associated with its information systems. In terms of assets, the company identified the information that was vital to the achievement of the organization’s mission and objectives. During this phase, the company also detected a rootkit in their software, through which an attacker could remotely access Poshoe’s systems and acquire sensitive data.

The company discovered that the rootkit had been installed by an attacker who had gained administrator access. As a result, the attacker was able to obtain the customers’ personal data after they purchased a product from Poshoe. Luckily, the company was able to execute some scans from the target device and gain greater visibility into their software’s settings in order to identify the vulnerability of the system.

The company initially used the qualitative risk analysis technique to assess the consequences and the likelihood and to determine the level of risk. The company defined the likelihood of risk as “a few times in two years with the probability of 1 to 3 times per year.” Later, it was decided that they would use a quantitative risk analysis methodology since it would provide additional information on this major risk. Lastly, the top management decided to treat the risk immediately as it could expose the company to other issues. In addition, it was communicated to their employees that they should update, secure, and back up Poshoe’s software in order to protect customers’ personal information and prevent unauthorized access from attackers.

According to scenario 4, which type of assets was identified during the risk identification process?

Options:

A.

Tangible assets

B.

Primary assets

C.

Supporting assets