New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

PECB ISO-IEC-27005-Risk-Manager Exam - Topic 1 Question 16 Discussion

Actual exam question for PECB's ISO-IEC-27005-Risk-Manager exam
Question #: 16
Topic #: 1
[All ISO-IEC-27005-Risk-Manager Questions]

Which statement regarding information gathering techniques is correct?

Show Suggested Answer Hide Answer
Suggested Answer: C

ISO/IEC 27005 advises that even after risks have been treated, any residual risks should be continuously monitored and reviewed. This is necessary to ensure that they remain within acceptable levels and that any changes in the internal or external environment do not escalate the risk beyond acceptable thresholds. Monitoring also ensures that the effectiveness of the controls remains adequate over time. Option A is incorrect because all risks, including those meeting the risk acceptance criteria, should be monitored. Option B is incorrect because monitoring is necessary regardless of the perceived severity if it occurs, to detect changes early.


Contribute your Thoughts:

0/2000 characters
Basilia
3 months ago
B is spot on, tech tools are a game changer for identifying vulnerabilities.
upvoted 0 times
...
Larae
3 months ago
Wait, are we really saying questionnaires aren't preferred? That seems off.
upvoted 0 times
...
Leeann
3 months ago
C seems too limiting, interviews should include more perspectives.
upvoted 0 times
...
Mable
4 months ago
I disagree with A, questionnaires can be really useful!
upvoted 0 times
...
Dalene
4 months ago
B is definitely correct, tools are essential for risk assessment.
upvoted 0 times
...
William
4 months ago
I vaguely recall that sending questionnaires is often preferred for gathering diverse opinions, which makes me question option A.
upvoted 0 times
...
Madalyn
4 months ago
I'm not sure about option C. I thought interviews could be useful with a broader range of people, not just those in security management.
upvoted 0 times
...
Tamra
4 months ago
I'm leaning towards option B since we practiced a similar question about using tools for risk assessment. It seems like a solid approach.
upvoted 0 times
...
Lashawna
5 months ago
I think option A might be correct because I remember reading that questionnaires can sometimes miss important insights from stakeholders.
upvoted 0 times
...
Simona
5 months ago
Option B sounds like the most comprehensive and accurate statement. I'll go with that one.
upvoted 0 times
...
Karima
5 months ago
I'm not entirely sure about the best approach here. I'll need to review my notes on information gathering techniques to make an informed decision.
upvoted 0 times
...
Cheryl
5 months ago
Option A seems incorrect, as questionnaires can be a useful information gathering technique. I'm leaning towards B or C.
upvoted 0 times
...
Tamie
5 months ago
Hmm, I'm a bit unsure about this one. I'll need to think it through carefully before selecting an answer.
upvoted 0 times
...
Tashia
5 months ago
This question seems straightforward. I'm pretty confident that option B is the correct answer.
upvoted 0 times
...
Mari
9 months ago
Option B all the way! Gotta use all the tools in the toolbox to get a complete picture. Who needs those old-fashioned questionnaires anyway?
upvoted 0 times
Delila
8 months ago
Yeah, a combination of techniques is probably the best approach to get a comprehensive understanding.
upvoted 0 times
...
Terry
8 months ago
I think it's important to gather information from a variety of sources, not just one method.
upvoted 0 times
...
Billye
8 months ago
Questionnaires can be helpful too, but I see your point about using all available tools.
upvoted 0 times
...
Rory
9 months ago
I agree, using technical tools can really help identify vulnerabilities.
upvoted 0 times
...
...
Herman
9 months ago
Personally, I think option B covers the bases. Leveraging technology to gather intel is a smart way to go about it.
upvoted 0 times
...
Carlton
10 months ago
Ha! Option C is a bit too narrow-minded. You need input from a variety of personnel, not just the security managers.
upvoted 0 times
...
Theola
10 months ago
I disagree with option A. Gathering feedback from a range of stakeholders is crucial for understanding the full scope of information security concerns.
upvoted 0 times
Selma
8 months ago
I believe option B is more effective. Using technical tools can help identify vulnerabilities and assess risks accurately.
upvoted 0 times
...
Marleen
8 months ago
I agree with you. It's important to gather feedback from a diverse group of people to fully understand the information security landscape.
upvoted 0 times
...
Nell
9 months ago
I think option A is not the best approach. We need input from various stakeholders to get a comprehensive view of information security.
upvoted 0 times
...
...
Nichelle
10 months ago
Option B sounds like the right approach to me. Using technical tools to identify vulnerabilities and assess assets is key for a thorough risk assessment.
upvoted 0 times
Annabelle
8 months ago
Technical tools can help organizations stay ahead of potential security threats.
upvoted 0 times
...
Joaquin
9 months ago
It's important to have a holistic approach when gathering information for risk assessment.
upvoted 0 times
...
Ivette
9 months ago
I agree, using technical tools can provide a more comprehensive view of potential risks.
upvoted 0 times
...
...
Renea
10 months ago
I agree with Laura. Option C makes more sense for information gathering techniques.
upvoted 0 times
...
Laura
10 months ago
I disagree, I believe option C is the correct statement. Interviews should be conducted with those responsible for security.
upvoted 0 times
...
Keneth
10 months ago
I think option B is correct. Technical tools can help identify vulnerabilities.
upvoted 0 times
...

Save Cancel