New Year Sale 2026! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

PECB ISO-IEC-27005-Risk-Manager Exam - Topic 3 Question 8 Discussion

Actual exam question for PECB's ISO-IEC-27005-Risk-Manager exam
Question #: 8
Topic #: 3
[All ISO-IEC-27005-Risk-Manager Questions]

Based on the EBIOS RM method, which of the following is one of the four attack sequence phases?

Show Suggested Answer Hide Answer
Suggested Answer: A

OrgX decided not to pursue a business strategy involving outsourcing to a cloud service provider due to the high risk. This decision reflects a 'risk avoidance' strategy, where the organization chooses not to engage in an activity that poses unacceptable risks. This aligns with option A.


Contribute your Thoughts:

0/2000 characters
Terrilyn
3 months ago
I'm surprised "Treating" is even an option!
upvoted 0 times
...
Ranee
3 months ago
"Treating" doesn't sound right at all.
upvoted 0 times
...
Lucina
3 months ago
Wait, isn't "Attacking" a phase too?
upvoted 0 times
...
Han
4 months ago
Totally agree, "Exploiting" makes sense here.
upvoted 0 times
...
Jettie
4 months ago
I think the correct phase is "Exploiting."
upvoted 0 times
...
Kristin
4 months ago
I’m leaning towards "exploiting" as a phase, but I wish I had reviewed the EBIOS RM phases more thoroughly before the exam.
upvoted 0 times
...
Graham
4 months ago
I remember "treating" being discussed, but I thought that was more about risk management rather than an attack phase.
upvoted 0 times
...
Nell
4 months ago
I feel like "attacking" sounds familiar, but I’m not sure if it’s one of the specific phases they mentioned in our practice questions.
upvoted 0 times
...
Venita
5 months ago
I think one of the phases is definitely about exploiting, but I can't remember if that's the right term used in EBIOS RM.
upvoted 0 times
...
Rolande
5 months ago
I think the key here is focusing on the EBIOS RM method specifically. The phases are likely more technical than just "Exploiting" or "Attacking." I'll need to think this through carefully.
upvoted 0 times
...
Quentin
5 months ago
Wait, is Attacking one of the phases? I can't quite remember how the EBIOS RM method breaks down the attack sequence. Better double-check my textbook.
upvoted 0 times
...
Avery
5 months ago
Okay, I've got this. The EBIOS RM attack sequence phases are Exploiting, Treating, Attacking, and Defending. I'm confident that Exploiting is one of the four.
upvoted 0 times
...
Kristeen
5 months ago
Hmm, I'm a little fuzzy on the EBIOS RM framework. I'll have to review my notes to see if I can recall the four phases.
upvoted 0 times
...
Talia
5 months ago
I'm pretty sure this is asking about the EBIOS RM method, which I've studied a bit. Let me think through the attack sequence phases...
upvoted 0 times
...
Beatriz
5 months ago
Okay, let's see. If the Meraki management profile is removed, does that mean the Systems Manager profiles are also removed? Or do they stay? I'm a bit confused on the details here.
upvoted 0 times
...
Shannon
10 months ago
I'll go with C) Attacking. Gotta love a good old-fashioned attack, am I right?
upvoted 0 times
...
Carlene
10 months ago
Hmm, I'm going to guess C) Attacking. Can't have an attack sequence without the actual attacking part!
upvoted 0 times
Marti
8 months ago
User 3: I agree with Marti, it's definitely C) Attacking.
upvoted 0 times
...
Herminia
8 months ago
User 2: Herminia, I believe it's C) Attacking.
upvoted 0 times
...
Dominga
8 months ago
User 1: I think it's A) Exploiting.
upvoted 0 times
...
...
Audrie
10 months ago
A) Exploiting - that's where the attacker gets their foot in the door, right?
upvoted 0 times
Luis
8 months ago
Attacking is also not one of the four attack sequence phases mentioned in the method.
upvoted 0 times
...
Antonio
9 months ago
Treating is not one of the attack sequence phases in the EBIOS RM method.
upvoted 0 times
...
Sean
10 months ago
After that, they move on to the next phase in the attack sequence.
upvoted 0 times
...
Fannie
10 months ago
Yes, that's correct. Exploiting is the phase where the attacker gains initial access.
upvoted 0 times
...
Gearldine
10 months ago
Once they exploit a vulnerability, they can move on to the next phase.
upvoted 0 times
...
Rocco
10 months ago
Yes, that's correct. It's the initial stage of the attack.
upvoted 0 times
...
...
Avery
10 months ago
I'm pretty sure it's B) Treating. Gotta address those risks, you know?
upvoted 0 times
...
Phyliss
11 months ago
C) Attacking sounds about right. That's the key step in the attack sequence, isn't it?
upvoted 0 times
Marylyn
10 months ago
C) Attacking sounds about right. That's the key step in the attack sequence, isn't it?
upvoted 0 times
...
Dominque
10 months ago
C) Attacking
upvoted 0 times
...
Martina
10 months ago
B) Treating
upvoted 0 times
...
Carol
10 months ago
A) Exploiting
upvoted 0 times
...
...
Twanna
11 months ago
I'm not sure, but I think it might be C) Attacking. Can someone explain why it's not treating?
upvoted 0 times
...
Brandon
11 months ago
I agree with Fausto, because in the EBIOS RM method, exploiting is one of the attack sequence phases.
upvoted 0 times
...
Fausto
11 months ago
I think the answer is A) Exploiting.
upvoted 0 times
...

Save Cancel