New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

PECB ISO-IEC-27005-Risk-Manager Exam - Topic 2 Question 9 Discussion

Actual exam question for PECB's ISO-IEC-27005-Risk-Manager exam
Question #: 9
Topic #: 2
[All ISO-IEC-27005-Risk-Manager Questions]

Scenario 6: Productscape is a market research company headquartered in Brussels, Belgium. It helps organizations understand the needs and expectations of their customers and identify new business opportunities. Productscape's teams have extensive experience in marketing and business strategy and work with some of the best-known organizations in Europe. The industry in which Productscape operates requires effective risk management. Considering that Productscape has access to clients' confidential information, it is responsible for ensuring its security. As such, the company conducts regular risk assessments. The top management appointed Alex as the risk manager, who is responsible for monitoring the risk management process and treating information security risks.

The last risk assessment conducted was focused on information assets. The purpose of this risk assessment was to identify information security risks, understand their level, and take appropriate action to treat them in order to ensure the security of their systems. Alex established a team of three members to perform the risk assessment activities. Each team member was responsible for specific departments included in the risk assessment scope. The risk assessment provided valuable information to identify, understand, and mitigate the risks that Productscape faces.

Initially, the team identified potential risks based on the risk identification results. Prior to analyzing the identified risks, the risk acceptance criteria were established. The criteria for accepting the risks were determined based on Productscape's objectives, operations, and technology. The team created various risk scenarios and determined the likelihood of occurrence as ''low,'' ''medium,'' or ''high.'' They decided that if the likelihood of occurrence for a risk scenario is determined as ''low,'' no further action would be taken. On the other hand, if the likelihood of occurrence for a risk scenario is determined as ''high'' or ''medium,'' additional controls will be implemented. Some information security risk scenarios defined by Productscape's team were as follows:

1. A cyber attacker exploits a security misconfiguration vulnerability of Productscape's website to launch an attack, which, in turn, could make the website unavailable to users.

2. A cyber attacker gains access to confidential information of clients and may threaten to make the information publicly available unless a ransom is paid.

3. An internal employee clicks on a link embedded in an email that redirects them to an unsecured website, installing a malware on the device.

The likelihood of occurrence for the first risk scenario was determined as ''medium.'' One of the main reasons that such a risk could occur was the usage of default accounts and password. Attackers could exploit this vulnerability and launch a brute-force attack. Therefore, Productscape decided to start using an automated ''build and deploy'' process which would test the software on deploy and minimize the likelihood of such an incident from happening. However, the team made it clear that the implementation of this process would not eliminate the risk completely and that there was still a low possibility for this risk to occur. Productscape documented the remaining risk and decided to monitor it for changes.

The likelihood of occurrence for the second risk scenario was determined as ''medium.'' Productscape decided to contract an IT company that would provide technical assistance and monitor the company's systems and networks in order to prevent such incidents from happening.

The likelihood of occurrence for the third risk scenario was determined as ''high.'' Thus, Productscape decided to include phishing as a topic on their information security training sessions. In addition, Alex reviewed the controls of Annex A of ISO/IEC 27001 in order to determine the necessary controls for treating this risk. Alex decided to implement control A.8.23 Web filtering which would help the company to reduce the risk of accessing unsecure websites. Although security controls were implemented to treat the risk, the level of the residual risk still did not meet the risk acceptance criteria defined in the beginning of the risk assessment process. Since the cost of implementing additional controls was too high for the company, Productscape decided to accept the residual risk. Therefore, risk owners were assigned the responsibility of managing the residual risk.

Based on scenario 6, Productscape decided to accept the residual risk and risk owners were assigned the responsibility of managing this risk.

Based on the guidelines of ISO/IEC 27005, is this acceptable?

Show Suggested Answer Hide Answer
Suggested Answer: A

Based on the NIST Risk Management Framework (RMF), the last step of the risk management process is 'Monitoring Security Controls.' This step involves continuously tracking the effectiveness of the implemented security controls, ensuring they remain effective against identified risks, and adapting them to any changes in the threat landscape. Option A correctly identifies the final step.


Contribute your Thoughts:

0/2000 characters
Miles
3 months ago
Good to see they’re training employees on phishing!
upvoted 0 times
...
Wilda
3 months ago
Isn't it risky to just monitor and not eliminate the threat completely?
upvoted 0 times
...
Kenny
3 months ago
Surprised they accepted residual risk without more controls!
upvoted 0 times
...
Alisha
4 months ago
I don't agree, top management should be more involved in this.
upvoted 0 times
...
Allene
4 months ago
Sounds like a solid plan for risk management!
upvoted 0 times
...
Sherly
4 months ago
I feel like the answer is A because it aligns with the idea that risk owners need to take responsibility, but I could see how some might argue for option C as well.
upvoted 0 times
...
Yuette
4 months ago
I think I read somewhere that top management has a crucial role in risk management, but I’m not clear if they have to manage residual risks directly.
upvoted 0 times
...
An
4 months ago
This scenario feels similar to a practice question we did about risk acceptance and management. I think the answer might be A, but I’m a bit confused about the role of risk approvers.
upvoted 0 times
...
Eden
5 months ago
I remember studying that risk owners should indeed be aware of residual risks, but I'm not entirely sure if they should be the ones managing them.
upvoted 0 times
...
Sage
5 months ago
The scenario provides a lot of details, so I think I can piece together the right answer here. I just need to make sure I understand the relationship between risk acceptance, residual risk, and risk management responsibilities.
upvoted 0 times
...
Miriam
5 months ago
I'm not entirely sure about the responsibilities for managing the residual risk. I'll need to review the options carefully before selecting my answer.
upvoted 0 times
...
Dottie
5 months ago
Okay, the key here is that Productscape has accepted the residual risk and assigned risk owners to manage it. Based on the ISO/IEC 27005 guidelines, I believe this is the correct approach.
upvoted 0 times
...
Luz
5 months ago
Hmm, I'm a bit confused about the risk acceptance criteria and how that relates to the residual risk. I'll need to re-read that part carefully.
upvoted 0 times
...
Nan
5 months ago
This question seems straightforward. I think I can handle it.
upvoted 0 times
...
Marguerita
5 months ago
Hmm, I'm a bit confused by the question. I'm not sure which Azure service would be best for isolating the compute components on a virtual network. I'll need to do some research on the different options.
upvoted 0 times
...
Malcom
10 months ago
Wait, they're asking the IT guys to monitor the company's systems and networks? I bet that's going to be a full-time job! And the 'Web filtering' control - I can just imagine the employees trying to find ways around that.
upvoted 0 times
...
Skye
10 months ago
Ooh, a risk management question! I love these. Honestly, the scenario sounds like it's straight out of a textbook. Now, let's see what the standard says about who should manage the residual risk...
upvoted 0 times
Jina
8 months ago
Definitely, they have the most knowledge about the specific risks and how to handle them.
upvoted 0 times
...
Raina
8 months ago
That makes sense. It's important for the people directly involved to take charge of managing the risk.
upvoted 0 times
...
Sherell
8 months ago
Yes, risk owners must be aware of the residual risk and accept the responsibility for managing it
upvoted 0 times
...
...
Cammy
10 months ago
Interesting scenario! The company seems to have done a pretty thorough job with the risk assessment, but I'm curious about how they decided to accept the residual risk. Guess we'll have to see what the ISO/IEC 27005 guidelines say about that.
upvoted 0 times
Delmy
8 months ago
Interesting approach, but I think the responsibility should lie with the risk owners.
upvoted 0 times
...
Emile
8 months ago
C) No, the top management should manage the residual risk
upvoted 0 times
...
Felicia
9 months ago
A) Yes, risk owners must be aware of the residual risk and accept the responsibility for managing it
upvoted 0 times
...
...
Elbert
10 months ago
Haha, the 'Web filtering' control got me chuckling! I bet the IT guys had a field day implementing that one. But seriously, I think the key here is understanding who's responsible for managing the residual risk.
upvoted 0 times
Eden
9 months ago
C) No, the top management should manage the residual risk
upvoted 0 times
...
Salome
9 months ago
Haha, yeah, the 'Web filtering' control does sound interesting. But you're right, knowing who's in charge of managing the risk is crucial.
upvoted 0 times
...
Dan
9 months ago
A) Yes, risk owners must be aware of the residual risk and accept the responsibility for managing it
upvoted 0 times
...
...
Dante
10 months ago
Ah, this is a tricky one! The scenario mentions that the risk owners were assigned the responsibility of managing the residual risk, but the question is whether that's acceptable according to ISO/IEC 27005. Hmm, let me think about this...
upvoted 0 times
Brittney
8 months ago
I think A) makes sense. The risk owners should be the ones managing the residual risk.
upvoted 0 times
...
Ezekiel
8 months ago
C) No, the top management should manage the residual risk
upvoted 0 times
...
Alison
9 months ago
B) No, risk approvers are responsible for managing the residual risk after accepting it
upvoted 0 times
...
Coleen
9 months ago
A) Yes, risk owners must be aware of the residual risk and accept the responsibility for managing it
upvoted 0 times
...
...
Cecil
10 months ago
I disagree. I believe the top management should manage the residual risk.
upvoted 0 times
...
Tyra
10 months ago
I agree with Mozell. Risk owners should be aware of the residual risk.
upvoted 0 times
...
Mozell
11 months ago
I think the answer is A.
upvoted 0 times
...

Save Cancel