New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

PECB ISO-IEC-27005-Risk-Manager Exam - Topic 1 Question 12 Discussion

Actual exam question for PECB's ISO-IEC-27005-Risk-Manager exam
Question #: 12
Topic #: 1
[All ISO-IEC-27005-Risk-Manager Questions]

Scenario 4: In 2017, seeing that millions of people turned to online shopping, Ed and James Cordon founded the online marketplace for footwear called Poshoe. In the past, purchasing pre-owned designer shoes online was not a pleasant experience because of unattractive pictures and an inability to ascertain the products' authenticity. However, after Poshoe's establishment, each product was well advertised and certified as authentic before being offered to clients. This increased the customers' confidence and trust in Poshoe's products and services. Poshoe has approximately four million users and its mission is to dominate the second-hand sneaker market and become a multi-billion dollar company.

Due to the significant increase of daily online buyers, Poshoe's top management decided to adopt a big data analytics tool that could help the company effectively handle, store, and analyze dat

a. Before initiating the implementation process, they decided to conduct a risk assessment. Initially, the company identified its assets, threats, and vulnerabilities associated with its information systems. In terms of assets, the company identified the information that was vital to the achievement of the organization's mission and objectives. During this phase, the company also detected a rootkit in their software, through which an attacker could remotely access Poshoe's systems and acquire sensitive data.

The company discovered that the rootkit had been installed by an attacker who had gained administrator access. As a result, the attacker was able to obtain the customers' personal data after they purchased a product from Poshoe. Luckily, the company was able to execute some scans from the target device and gain greater visibility into their software's settings in order to identify the vulnerability of the system.

The company initially used the qualitative risk analysis technique to assess the consequences and the likelihood and to determine the level of risk. The company defined the likelihood of risk as ''a few times in two years with the probability of 1 to 3 times per year.'' Later, it was decided that they would use a quantitative risk analysis methodology since it would provide additional information on this major risk. Lastly, the top management decided to treat the risk immediately as it could expose the company to other issues. In addition, it was communicated to their employees that they should update, secure, and back up Poshoe's software in order to protect customers' personal information and prevent unauthorized access from attackers.

According to scenario 4, which type of assets was identified during the risk identification process?

Show Suggested Answer Hide Answer
Suggested Answer: B

During the risk identification process, Poshoe identified the information that was vital to the achievement of the organization's mission and objectives. Such information is considered a primary asset because it directly supports the organization's core business objectives. Primary assets are those that are essential to the organization's functioning and achieving its strategic goals. Option A (Tangible assets) refers to physical assets like hardware or facilities, which is not relevant here. Option C (Supporting assets) refers to assets that support primary assets, like IT infrastructure or software, which also does not fit the context.


Contribute your Thoughts:

0/2000 characters
Taryn
3 months ago
Wait, a rootkit? How did they let that happen?
upvoted 0 times
...
Cristy
3 months ago
Primary assets make sense for an online marketplace.
upvoted 0 times
...
Pamella
3 months ago
I thought they’d focus more on tangible assets, interesting choice!
upvoted 0 times
...
Erasmo
4 months ago
Totally agree, protecting customer data is crucial!
upvoted 0 times
...
Patti
4 months ago
They identified vital information as their main asset.
upvoted 0 times
...
Ressie
4 months ago
I feel like supporting assets could also be a possibility, but I lean towards primary assets since they were focused on customer data and system integrity.
upvoted 0 times
...
Therese
4 months ago
I’m a bit confused about the terminology. Could it be tangible assets? I recall that term being used for physical items, but this scenario seems more about data.
upvoted 0 times
...
Jesse
4 months ago
I think they might have identified primary assets since they were looking at vital information for their objectives. It sounds like a similar question we practiced in class.
upvoted 0 times
...
Nu
5 months ago
I remember studying about asset types in risk management, but I'm not entirely sure which one fits here. It seems like they were focusing on something crucial for their mission.
upvoted 0 times
...
Salome
5 months ago
This is a tricky one. The scenario mentions several different types of assets, and I'm not sure which one they're specifically asking about. I'll need to re-read it a few times to make sure I don't miss any important details.
upvoted 0 times
...
Tomas
5 months ago
I'm feeling pretty confident about this one. The scenario clearly states that the company identified a rootkit in their software, which allowed an attacker to access sensitive customer data. That seems like the key information I need to answer the question.
upvoted 0 times
...
Jillian
5 months ago
Okay, let me think this through. The scenario talks about the company identifying "the information that was vital to the achievement of the organization's mission and objectives" during the risk identification process. That sounds like they're referring to primary assets.
upvoted 0 times
...
Justine
5 months ago
Hmm, I'm a bit confused about the different types of assets mentioned. I'll need to re-read that part of the scenario carefully to make sure I understand which one they're asking about.
upvoted 0 times
...
Glenna
5 months ago
This seems like a straightforward question about risk assessment. I think I can handle this one - the scenario provides a lot of details about the company's assets, threats, and vulnerabilities.
upvoted 0 times
...
Stevie
1 year ago
Haha, yeah, can't have those pesky hackers messing with the second-hand sneaker market. That would really put a damper on the whole operation.
upvoted 0 times
...
Gracia
1 year ago
Well, that's a relief they caught the rootkit before it caused more damage. I hope they gave the IT team a raise for their quick thinking!
upvoted 0 times
Daniel
1 year ago
The company made the right decision to treat the risk immediately and communicate the importance of software updates to their employees.
upvoted 0 times
...
Delisa
1 year ago
It's important for companies to prioritize cybersecurity measures to protect customer data.
upvoted 0 times
...
Nell
1 year ago
I'm glad they were able to identify the vulnerability in their system before it led to more serious consequences.
upvoted 0 times
...
Sonia
1 year ago
I agree, the IT team definitely deserves recognition for their quick response.
upvoted 0 times
...
...
Leatha
1 year ago
I agree, the scenario clearly states that the company identified the information that was crucial to their goals as the assets during the risk assessment.
upvoted 0 times
...
Adell
1 year ago
The company identified the information that was vital to the achievement of the organization's mission and objectives as the primary assets during the risk identification process.
upvoted 0 times
Mariann
1 year ago
The company identified the information that was vital to the achievement of the organization's mission and objectives as the primary assets during the risk identification process.
upvoted 0 times
...
Benedict
1 year ago
C) Supporting assets
upvoted 0 times
...
Nilsa
1 year ago
B) Primary assets
upvoted 0 times
...
Mozell
1 year ago
A) Tangible assets
upvoted 0 times
...
...
Norah
1 year ago
I agree with you, Christiane. Tangible assets are physical items that can be touched and seen.
upvoted 0 times
...
Christiane
1 year ago
I think the answer is A) Tangible assets.
upvoted 0 times
...

Save Cancel