New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

PECB ISO-IEC-27005-Risk-Manager Exam - Topic 1 Question 7 Discussion

Actual exam question for PECB's ISO-IEC-27005-Risk-Manager exam
Question #: 7
Topic #: 1
[All ISO-IEC-27005-Risk-Manager Questions]

Scenario 4: In 2017, seeing that millions of people turned to online shopping, Ed and James Cordon founded the online marketplace for footwear called Poshoe. In the past, purchasing pre-owned designer shoes online was not a pleasant experience because of unattractive pictures and an inability to ascertain the products' authenticity. However, after Poshoe's establishment, each product was well advertised and certified as authentic before being offered to clients. This increased the customers' confidence and trust in Poshoe's products and services. Poshoe has approximately four million users and its mission is to dominate the second-hand sneaker market and become a multi-billion dollar company.

Due to the significant increase of daily online buyers, Poshoe's top management decided to adopt a big data analytics tool that could help the company effectively handle, store, and analyze dat

a. Before initiating the implementation process, they decided to conduct a risk assessment. Initially, the company identified its assets, threats, and vulnerabilities associated with its information systems. In terms of assets, the company identified the information that was vital to the achievement of the organization's mission and objectives. During this phase, the company also detected a rootkit in their software, through which an attacker could remotely access Poshoe's systems and acquire sensitive data.

The company discovered that the rootkit had been installed by an attacker who had gained administrator access. As a result, the attacker was able to obtain the customers' personal data after they purchased a product from Poshoe. Luckily, the company was able to execute some scans from the target device and gain greater visibility into their software's settings in order to identify the vulnerability of the system.

The company initially used the qualitative risk analysis technique to assess the consequences and the likelihood and to determine the level of risk. The company defined the likelihood of risk as ''a few times in two years with the probability of 1 to 3 times per year.'' Later, it was decided that they would use a quantitative risk analysis methodology since it would provide additional information on this major risk. Lastly, the top management decided to treat the risk immediately as it could expose the company to other issues. In addition, it was communicated to their employees that they should update, secure, and back up Poshoe's software in order to protect customers' personal information and prevent unauthorized access from attackers.

Based on scenario 4, which scanning tool did Poshoe use to detect the vulnerability in their software?

Show Suggested Answer Hide Answer
Suggested Answer: B

According to ISO/IEC 27005, the output of the documentation of risk management processes should include detailed information about the results of the risk assessment and the chosen risk treatment options. This ensures transparency and provides a clear record of the decision-making process related to information security risk management. Therefore, option B is the correct answer.


Contribute your Thoughts:

0/2000 characters
Harrison
3 months ago
Good call on the risk assessment, but wow, 4 million users is a lot!
upvoted 0 times
...
Arleen
3 months ago
I think a penetration testing tool would have been better for this situation.
upvoted 0 times
...
Vallie
3 months ago
Wait, how did they not notice the rootkit earlier? Seems sketchy.
upvoted 0 times
...
Lavonda
4 months ago
Totally agree, host-based makes the most sense here!
upvoted 0 times
...
Jeff
4 months ago
They probably used a host-based scanning tool to find that rootkit.
upvoted 0 times
...
Jacob
4 months ago
I feel like they definitely needed a host-based tool to check their systems directly, but I could be mixing it up with something else we studied.
upvoted 0 times
...
Bev
4 months ago
This scenario reminds me of a practice question where we discussed penetration testing tools. I wonder if that could be relevant here too?
upvoted 0 times
...
Dierdre
4 months ago
I'm not entirely sure, but I remember something about network-based tools being more about scanning traffic rather than software vulnerabilities.
upvoted 0 times
...
Abel
5 months ago
I think they might have used a host-based scanning tool since they were looking for vulnerabilities in their software specifically.
upvoted 0 times
...
Lashawna
5 months ago
I'm not entirely sure about this one. The scenario talks about a rootkit and unauthorized access, but it doesn't clearly state what tool was used to detect the vulnerability. I'll have to re-read the details carefully and try to eliminate the options that don't seem to fit.
upvoted 0 times
...
Daron
5 months ago
Ah, I think I've got it! Since the scenario says Poshoe was able to execute scans from the target device, that suggests they used a host-based scanning tool to detect the vulnerability. I'm confident that B is the correct answer here.
upvoted 0 times
...
Willodean
5 months ago
Hmm, this is a tricky one. The scenario mentions that Poshoe was able to identify the vulnerability in their system, but it doesn't specify the exact tool they used. I'll have to weigh the options carefully and try to infer the best answer from the information provided.
upvoted 0 times
...
Dorathy
5 months ago
I'm a little confused by this question. The scenario talks about a rootkit being detected, but it doesn't explicitly say what tool was used to detect it. I'll have to think this through carefully before answering.
upvoted 0 times
...
Zena
5 months ago
This seems like a straightforward question. The scenario mentions that Poshoe was able to execute some scans from the target device to gain greater visibility into their software's settings, so I think the answer is B - Host-based scanning tool.
upvoted 0 times
...
Marget
5 months ago
I'm a bit confused on this one. I'm not sure if Read Attributes is necessary or not. I'll have to review the security settings more closely.
upvoted 0 times
...
Mary
9 months ago
Ah, the old rootkit-in-the-software trick. Bet the hacker was feeling pretty sneaky until Poshoe's scanning tool caught them red-handed. Gotta love it when the good guys use their own tools against the bad guys!
upvoted 0 times
Wilson
8 months ago
B) Host-based scanning tool
upvoted 0 times
...
Rhea
8 months ago
C) Penetration testing tool
upvoted 0 times
...
Nicolette
8 months ago
C) Penetration testing tool
upvoted 0 times
...
Kirby
8 months ago
B) Host-based scanning tool
upvoted 0 times
...
Millie
8 months ago
B) Host-based scanning tool
upvoted 0 times
...
Mertie
8 months ago
A) Network-based scanning tool
upvoted 0 times
...
Carissa
8 months ago
A) Network-based scanning tool
upvoted 0 times
...
...
Yolando
10 months ago
Host-based scanning tool all the way! Just like a doctor checking your vital signs, this tool gets up close and personal with the software to find the problem. No need for network-based tools or fancy penetration testing here.
upvoted 0 times
Carline
8 months ago
Using a host-based scanning tool was a smart move by Poshoe to ensure the security of their systems.
upvoted 0 times
...
Leontine
8 months ago
Definitely, it's like having a doctor for your software, checking for any issues internally.
upvoted 0 times
...
Isaac
9 months ago
I agree, host-based scanning tools are great for digging deep into the software to find vulnerabilities.
upvoted 0 times
...
...
Loreen
10 months ago
I agree, the host-based scanning tool is the correct answer. It's like a virtual stethoscope for your software - checking it out from the inside to find any bugs or vulnerabilities.
upvoted 0 times
Paulina
8 months ago
I agree, the host-based scanning tool is the correct answer. It's like a virtual stethoscope for your software - checking it out from the inside to find any bugs or vulnerabilities.
upvoted 0 times
...
Tamar
9 months ago
C) Penetration testing tool
upvoted 0 times
...
Corazon
9 months ago
B) Host-based scanning tool
upvoted 0 times
...
Stephane
9 months ago
A) Network-based scanning tool
upvoted 0 times
...
...
Rosendo
10 months ago
Definitely a host-based scanning tool. Penetration testing would have been overkill, and a network-based tool wouldn't have been able to identify the rootkit installed on the system.
upvoted 0 times
Helene
10 months ago
Using a network-based scanning tool wouldn't have been effective in detecting the rootkit.
upvoted 0 times
...
Van
10 months ago
I agree, a host-based scanning tool would have been the most appropriate choice.
upvoted 0 times
...
...
Solange
11 months ago
The company used a host-based scanning tool to detect the vulnerability in their software. This makes sense since they were able to execute scans from the target device and gain visibility into the software's settings.
upvoted 0 times
Melodie
10 months ago
The company used a host-based scanning tool to detect the vulnerability in their software.
upvoted 0 times
...
Kaycee
10 months ago
C) Penetration testing tool
upvoted 0 times
...
Malcom
10 months ago
B) Host-based scanning tool
upvoted 0 times
...
Christene
10 months ago
A) Network-based scanning tool
upvoted 0 times
...
...
Renea
11 months ago
I'm not sure, but I think Poshoe might have also used a network-based scanning tool to detect the vulnerability.
upvoted 0 times
...
Elvis
11 months ago
I agree with Gerald. A host-based scanning tool would be more effective in detecting vulnerabilities in their software.
upvoted 0 times
...
Gerald
11 months ago
I think Poshoe used a host-based scanning tool.
upvoted 0 times
...

Save Cancel