New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

PECB ISO-IEC-27005-Risk-Manager Exam - Topic 2 Question 15 Discussion

Actual exam question for PECB's ISO-IEC-27005-Risk-Manager exam
Question #: 15
Topic #: 2
[All ISO-IEC-27005-Risk-Manager Questions]

Scenario 4: In 2017, seeing that millions of people turned to online shopping, Ed and James Cordon founded the online marketplace for footwear called Poshoe. In the past, purchasing pre-owned designer shoes online was not a pleasant experience because of unattractive pictures and an inability to ascertain the products' authenticity. However, after Poshoe's establishment, each product was well advertised and certified as authentic before being offered to clients. This increased the customers' confidence and trust in Poshoe's products and services. Poshoe has approximately four million users and its mission is to dominate the second-hand sneaker market and become a multi-billion dollar company.

Due to the significant increase of daily online buyers, Poshoe's top management decided to adopt a big data analytics tool that could help the company effectively handle, store, and analyze dat

a. Before initiating the implementation process, they decided to conduct a risk assessment. Initially, the company identified its assets, threats, and vulnerabilities associated with its information systems. In terms of assets, the company identified the information that was vital to the achievement of the organization's mission and objectives. During this phase, the company also detected a rootkit in their software, through which an attacker could remotely access Poshoe's systems and acquire sensitive data.

The company discovered that the rootkit had been installed by an attacker who had gained administrator access. As a result, the attacker was able to obtain the customers' personal data after they purchased a product from Poshoe. Luckily, the company was able to execute some scans from the target device and gain greater visibility into their software's settings in order to identify the vulnerability of the system.

The company initially used the qualitative risk analysis technique to assess the consequences and the likelihood and to determine the level of risk. The company defined the likelihood of risk as ''a few times in two years with the probability of 1 to 3 times per year.'' Later, it was decided that they would use a quantitative risk analysis methodology since it would provide additional information on this major risk. Lastly, the top management decided to treat the risk immediately as it could expose the company to other issues. In addition, it was communicated to their employees that they should update, secure, and back up Poshoe's software in order to protect customers' personal information and prevent unauthorized access from attackers.

Based on the scenario above, answer the following question:

Poshoe detected a rootkit installed in their software. In which category of threats does this threat belong?

Show Suggested Answer Hide Answer
Suggested Answer: B

A rootkit installed in software due to an attacker gaining administrator access is considered a threat resulting from human actions. In this scenario, the attacker deliberately exploited a vulnerability to install the rootkit and gain unauthorized access to sensitive data. ISO/IEC 27005 categorizes threats into three main types: technical failures, human actions, and environmental events. Since this threat is a result of intentional malicious activity by an individual (human), it falls under the category of human actions. Option A (Technical failures) would refer to failures in hardware or software that are not caused by deliberate actions, while Option C (Organizational threats) would relate to internal organizational issues, neither of which apply to this case.


Contribute your Thoughts:

0/2000 characters
Lynna
3 months ago
Sounds like a mix of human error and technical issues to me.
upvoted 0 times
...
Soledad
3 months ago
Agreed, they need to tighten their security measures ASAP!
upvoted 0 times
...
Frank
3 months ago
Wow, I can't believe they had a rootkit! That's scary for online shoppers.
upvoted 0 times
...
Salley
4 months ago
Really? I thought it was more about human actions leading to that kind of access.
upvoted 0 times
...
An
4 months ago
Definitely a technical failure. Rootkits are all about software vulnerabilities.
upvoted 0 times
...
Edelmira
4 months ago
I thought organizational threats were more about policies and procedures, so I lean towards technical failures for the rootkit.
upvoted 0 times
...
Casie
4 months ago
I practiced a similar question where we had to categorize threats, and I think this one is definitely a technical failure because it involves malicious software.
upvoted 0 times
...
Aliza
4 months ago
I'm not entirely sure, but I feel like it could also relate to human actions if someone intentionally installed it.
upvoted 0 times
...
Adelle
5 months ago
I remember studying about different types of threats, and I think a rootkit falls under technical failures since it's a software issue.
upvoted 0 times
...
Refugia
5 months ago
Based on the information given, the rootkit seems to be a technical vulnerability that allowed an attacker to access the system. I think this would be considered a "Technical failures" type of threat.
upvoted 0 times
...
Roselle
5 months ago
The scenario provides a lot of details, but I'm still a bit confused about the different threat categories. I'll need to review my notes before selecting an answer.
upvoted 0 times
...
Serina
5 months ago
Okay, let me think this through. The rootkit allowed an attacker to gain unauthorized access, so I believe this would fall under the "Human actions" category of threats. I'll go with that.
upvoted 0 times
...
Juliann
5 months ago
Hmm, I'm a bit unsure about this one. The scenario mentions a rootkit, which sounds like a technical issue, but I want to make sure I understand the different threat categories before answering.
upvoted 0 times
...
Brynn
5 months ago
This seems like a straightforward question about the type of threat detected in the scenario. I'm pretty confident I can identify the correct category.
upvoted 0 times
...
Ma
1 year ago
Rootkits, huh? Sounds like someone's been watching too many hacking movies. But hey, at least they caught it before it turned into a real nightmare.
upvoted 0 times
...
Azzie
1 year ago
Rootkits? More like 'root-kits' if you ask me. Those sneaky hackers are always up to no good. Definitely a human-driven threat, no doubt about it.
upvoted 0 times
Aliza
1 year ago
Yes, it's definitely a human-driven threat. We need to be extra cautious with our online security.
upvoted 0 times
...
Brunilda
1 year ago
I agree, those hackers are always finding new ways to cause trouble.
upvoted 0 times
...
...
Hassie
1 year ago
Rootkits, huh? That's just the tip of the iceberg when it comes to cybersecurity these days. Better keep an eye on those human actors, they're the real threat here.
upvoted 0 times
Chauncey
1 year ago
User 2
upvoted 0 times
...
Albert
1 year ago
User 1
upvoted 0 times
...
...
Tanja
1 year ago
Ah, the classic rootkit threat. Gotta love how those hackers get creative. Definitely a human-induced problem, not some technical glitch.
upvoted 0 times
Bok
1 year ago
Poshoe made the right call by treating the risk immediately and taking steps to protect their customers' data.
upvoted 0 times
...
Lynelle
1 year ago
I agree, it's definitely a human-induced problem. We need to be extra cautious with our software security.
upvoted 0 times
...
Craig
1 year ago
Yeah, those hackers are always finding new ways to cause trouble.
upvoted 0 times
...
...
Joaquin
1 year ago
Rootkits? Ugh, that's a nasty piece of work. Definitely belongs in the human actions category. Someone's been meddling where they shouldn't.
upvoted 0 times
Hoa
1 year ago
It's important for companies to constantly update and secure their software.
upvoted 0 times
...
Laine
1 year ago
Poshoe had to act fast to protect their customers' data.
upvoted 0 times
...
Shawnda
1 year ago
I agree, someone intentionally installed it to gain unauthorized access.
upvoted 0 times
...
Novella
1 year ago
Yeah, rootkits are a real pain. Definitely falls under human actions.
upvoted 0 times
...
...
Joseph
1 year ago
I think it could also be considered an organizational threat, as it involves unauthorized access to sensitive data.
upvoted 0 times
...
Wenona
1 year ago
I disagree, I believe the threat falls under human actions.
upvoted 0 times
...
Luke
1 year ago
I think the threat belongs to technical failures.
upvoted 0 times
...

Save Cancel