According to ISO/IEC 27005, what is the output of the documentation of risk management processes?
Answer : B
According to ISO/IEC 27005, the output of the documentation of risk management processes should include detailed information about the results of the risk assessment and the chosen risk treatment options. This ensures transparency and provides a clear record of the decision-making process related to information security risk management. Therefore, option B is the correct answer.
After creating a plan for outsourcing to a cloud service provider to store their confidential information in cloud, OrgX decided to not pursue this business strategy since the risk of doing so was high. Which risk treatment option did OrgX use?
Answer : A
OrgX decided not to pursue a business strategy involving outsourcing to a cloud service provider due to the high risk. This decision reflects a 'risk avoidance' strategy, where the organization chooses not to engage in an activity that poses unacceptable risks. This aligns with option A.
Based on NIST Risk Management Framework, what is the last step of a risk management process?
Answer : A
Based on the NIST Risk Management Framework (RMF), the last step of the risk management process is 'Monitoring Security Controls.' This step involves continuously tracking the effectiveness of the implemented security controls, ensuring they remain effective against identified risks, and adapting them to any changes in the threat landscape. Option A correctly identifies the final step.
Which activity below is NOT included in the information security risk assessment process?
Answer : C
The information security risk assessment process, as outlined in ISO/IEC 27005, typically includes identifying risks, assessing their potential impact, and prioritizing them. However, selecting risk treatment options is not part of the risk assessment process itself; it is part of the subsequent risk treatment phase. Therefore, option C is the correct answer as it is not included in the risk assessment process.
According to CRAMM methodology, how is risk assessment initiated?
Answer : A
According to the CRAMM (CCTA Risk Analysis and Management Method) methodology, risk assessment begins by collecting detailed information on the system and identifying all assets that fall within the defined scope. This foundational step ensures that the assessment is comprehensive and includes all relevant assets, which could be potential targets for risk. This makes option A the correct answer.
Which statement regarding risks and opportunities is correct?
Answer : B
ISO standards, including ISO/IEC 27005, make a distinction between risks and opportunities. Risks are defined as the effect of uncertainty on objectives, which can result in negative consequences (such as financial loss, reputational damage, or operational disruption). Opportunities, on the other hand, are situations or conditions that have the potential to provide a positive impact on achieving objectives. Therefore, option B is correct, as it accurately reflects that risks are generally associated with negative impacts, while opportunities can lead to positive outcomes. Option A is incorrect because risks can have negative outcomes, not positive ones. Option C is incorrect because risks and opportunities have different meanings and implications and are not interchangeable.
According to ISO/IEC 27000, what is the definition of information security?
Answer : A
According to ISO/IEC 27000, information security is defined as the 'preservation of confidentiality, integrity, and availability of information.' This definition highlights the three core principles of information security:
Confidentiality ensures that information is not disclosed to unauthorized individuals or systems.
Integrity ensures the accuracy and completeness of information and its processing methods.
Availability ensures that authorized users have access to information and associated assets when required.
This definition encompasses the protection of information in all forms and aligns with ISO/IEC 27005's guidelines on managing information security risks. Therefore, option A is the correct answer. Options B and C are incorrect as they refer to more specific aspects or other areas of information management.