1. Home
  2. PECB
  3. ISO-IEC-27005-Risk-Manager Exam Info
  4. ISO-IEC-27005-Risk-Manager Exam Questions

Master PECB Certified ISO/IEC 27005 Risk Manager: Your Gateway to InfoSec Excellence

Aspiring information security professionals, your path to becoming a certified PECB Certified ISO/IEC 27005 Risk Manager starts here. Our comprehensive ISO-IEC-27005-Risk-Manager practice questions are your secret weapon in conquering this challenging exam. Designed by industry experts, our materials go beyond mere memorization, immersing you in real-world scenarios that sharpen your risk assessment skills. Whether you prefer the portability of PDFs, the interactivity of web-based platforms, or the robust features of desktop software, we've got you covered. Don't let exam anxiety hold you back from joining the elite ranks of cybersecurity leaders. With our proven study aids, you'll not only pass the exam but also gain the confidence to tackle complex InfoSec challenges in today's rapidly evolving digital landscape. Time is ticking – secure your future in risk management and propel your career to new heights with our unparalleled PECB exam prep resources.

Page: 1 /
Total 60 questions
Get Free Questions & Answers PDF
Question 1

What are opportunities?


Correct : B

Opportunities, according to ISO standards such as ISO 31000, are situations or conditions that have the potential to provide a favorable impact on achieving objectives. They represent circumstances that, when leveraged, can lead to beneficial outcomes for the organization, such as competitive advantage, growth, or improved performance. Option B is correct as it accurately describes opportunities as circumstances expected to be favorable to achieving objectives. Option A (Occurrence or change of a particular set of circumstances) is a more general definition that could apply to both risks and opportunities, while Option C (Outcome of an event affecting objectives) is more aligned with the concept of risk.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 2

According to ISO 31000, which of the following is a principle of risk management?


Correct : A

According to ISO 31000, a principle of risk management is that it should be dynamic. This means that risk management practices should be flexible and able to adapt to changes in the internal and external environment of the organization. Risks are constantly evolving due to changes in technology, regulatory requirements, market conditions, and other factors, and risk management must be capable of responding to these changes. Option A is correct because it aligns with this principle. Option B (Qualitative) refers to a method for assessing risk rather than a principle of risk management, and Option C (Reliability) is not listed as a principle in ISO 31000.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 3

Scenario 2: Travivve is a travel agency that operates in more than 100 countries. Headquartered in San Francisco, the US, the agency is known for its personalized vacation packages and travel services. Travivve aims to deliver reliable services that meet its clients' needs. Considering the impact of information security in its reputation, Travivve decided to implement an information security management system (ISMS) based on ISO/IEC 27001. In addition, they decided to establish and implement an information security risk management program. Based on the priority of specific departments in Travivve, the top management decided to initially apply the risk management process only in the Sales Management Department. The process would be applicable for other departments only when introducing new technology.

Travivve's top management wanted to make sure that the risk management program is established based on the industry best practices. Therefore, they created a team of three members that would be responsible for establishing and implementing it. One of the team members was Travivve's risk manager who was responsible for supervising the team and planning all risk management activities. In addition, the risk manager was responsible for monitoring the program and reporting the monitoring results to the top management.

Initially, the team decided to analyze the internal and external context of Travivve. As part of the process of understanding the organization and its context, the team identified key processes and activities. Then, the team identified the interested parties and their basic requirements and determined the status of compliance with these requirements. In addition, the team identified all the reference documents that applied to the defined scope of the risk management process, which mainly included the Annex A of ISO/IEC 27001 and the internal security rules established by Travivve. Lastly, the team analyzed both reference documents and justified a few noncompliances with those requirements.

The risk manager selected the information security risk management method which was aligned with other approaches used by the company to manage other risks. The team also communicated the risk management process to all interested parties through previously established communication mechanisms. In addition, they made sure to inform all interested parties about their roles and responsibilities regarding risk management. Travivve also decided to involve interested parties in its risk management activities since, according to the top management, this process required their active participation.

Lastly, Travivve's risk management team decided to conduct the initial information security risk assessment process. As such, the team established the criteria for performing the information security risk assessment which included the consequence criteria and likelihood criteria.

Based on the scenario above, answer the following question:

Travivve decided to initially apply the risk management process only in the Sales Management Department. Is this acceptable?


Correct : B

ISO/IEC 27005 provides guidance on risk management for information security, and it allows flexibility in applying the risk management process to different parts of an organization. The decision to initially apply the risk management process only to the Sales Management Department is acceptable under ISO/IEC 27005, as the standard supports the selective application of risk management activities based on the specific needs and priorities of the organization. This is in line with risk management best practices, where organizations may focus on critical areas first (such as high-risk departments or those that handle sensitive information) and later expand the process as needed. Therefore, applying the risk management process to a subset of departments is appropriate, making option B the correct answer.


ISO/IEC 27005:2018, Clause 7, 'Context Establishment,' which allows defining the scope and boundaries of risk management as relevant to the organization's needs.

ISO/IEC 27001:2013, Clause 4.3, 'Determining the scope of the information security management system,' which also permits defining a scope based on priorities and relevance.

Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 4

Scenario 2: Travivve is a travel agency that operates in more than 100 countries. Headquartered in San Francisco, the US, the agency is known for its personalized vacation packages and travel services. Travivve aims to deliver reliable services that meet its clients' needs. Considering the impact of information security in its reputation, Travivve decided to implement an information security management system (ISMS) based on ISO/IEC 27001. In addition, they decided to establish and implement an information security risk management program. Based on the priority of specific departments in Travivve, the top management decided to initially apply the risk management process only in the Sales Management Department. The process would be applicable for other departments only when introducing new technology.

Travivve's top management wanted to make sure that the risk management program is established based on the industry best practices. Therefore, they created a team of three members that would be responsible for establishing and implementing it. One of the team members was Travivve's risk manager who was responsible for supervising the team and planning all risk management activities. In addition, the risk manager was responsible for monitoring the program and reporting the monitoring results to the top management.

Initially, the team decided to analyze the internal and external context of Travivve. As part of the process of understanding the organization and its context, the team identified key processes and activities. Then, the team identified the interested parties and their basic requirements and determined the status of compliance with these requirements. In addition, the team identified all the reference documents that applied to the defined scope of the risk management process, which mainly included the Annex A of ISO/IEC 27001 and the internal security rules established by Travivve. Lastly, the team analyzed both reference documents and justified a few noncompliances with those requirements.

The risk manager selected the information security risk management method which was aligned with other approaches used by the company to manage other risks. The team also communicated the risk management process to all interested parties through previously established communication mechanisms. In addition, they made sure to inform all interested parties about their roles and responsibilities regarding risk management. Travivve also decided to involve interested parties in its risk management activities since, according to the top management, this process required their active participation.

Lastly, Travivve's risk management team decided to conduct the initial information security risk assessment process. As such, the team established the criteria for performing the information security risk assessment which included the consequence criteria and likelihood criteria.

Based on scenario 2, has Travivve defined the responsibilities of the risk manager appropriately?


Correct : A

ISO/IEC 27005 recommends that the risk manager or a designated authority should oversee the entire risk management process, including planning, monitoring, and reporting. In the scenario, the risk manager is responsible for supervising the team, planning all risk management activities, monitoring the program, and reporting the results to top management. This allocation of responsibilities is aligned with the guidelines of ISO/IEC 27005, which emphasizes that a risk manager should coordinate and manage all aspects of the risk management process to ensure its effectiveness and alignment with the organization's objectives. Therefore, assigning these responsibilities to the risk manager is appropriate, making option A the correct answer.


ISO/IEC 27005:2018, Clause 5.3, 'Roles and responsibilities,' which specifies that those managing risk should have defined roles and should coordinate all activities in the risk management process.

Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Question 5

Scenario 4: In 2017, seeing that millions of people turned to online shopping, Ed and James Cordon founded the online marketplace for footwear called Poshoe. In the past, purchasing pre-owned designer shoes online was not a pleasant experience because of unattractive pictures and an inability to ascertain the products' authenticity. However, after Poshoe's establishment, each product was well advertised and certified as authentic before being offered to clients. This increased the customers' confidence and trust in Poshoe's products and services. Poshoe has approximately four million users and its mission is to dominate the second-hand sneaker market and become a multi-billion dollar company.

Due to the significant increase of daily online buyers, Poshoe's top management decided to adopt a big data analytics tool that could help the company effectively handle, store, and analyze dat

a. Before initiating the implementation process, they decided to conduct a risk assessment. Initially, the company identified its assets, threats, and vulnerabilities associated with its information systems. In terms of assets, the company identified the information that was vital to the achievement of the organization's mission and objectives. During this phase, the company also detected a rootkit in their software, through which an attacker could remotely access Poshoe's systems and acquire sensitive data.

The company discovered that the rootkit had been installed by an attacker who had gained administrator access. As a result, the attacker was able to obtain the customers' personal data after they purchased a product from Poshoe. Luckily, the company was able to execute some scans from the target device and gain greater visibility into their software's settings in order to identify the vulnerability of the system.

The company initially used the qualitative risk analysis technique to assess the consequences and the likelihood and to determine the level of risk. The company defined the likelihood of risk as ''a few times in two years with the probability of 1 to 3 times per year.'' Later, it was decided that they would use a quantitative risk analysis methodology since it would provide additional information on this major risk. Lastly, the top management decided to treat the risk immediately as it could expose the company to other issues. In addition, it was communicated to their employees that they should update, secure, and back up Poshoe's software in order to protect customers' personal information and prevent unauthorized access from attackers.

According to scenario 4, which type of assets was identified during the risk identification process?


Correct : B

During the risk identification process, Poshoe identified the information that was vital to the achievement of the organization's mission and objectives. Such information is considered a primary asset because it directly supports the organization's core business objectives. Primary assets are those that are essential to the organization's functioning and achieving its strategic goals. Option A (Tangible assets) refers to physical assets like hardware or facilities, which is not relevant here. Option C (Supporting assets) refers to assets that support primary assets, like IT infrastructure or software, which also does not fit the context.


Options Selected by Other Users:
Mark Question:

Start a Discussions

Submit Your Answer:
0 / 1500
Page:    1 / 12   
Total 60 questions