New Year Sale ! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

PECB Exam ISO-IEC-27005-Risk-Manager Topic 2 Question 9 Discussion

Actual exam question for PECB's ISO-IEC-27005-Risk-Manager exam
Question #: 9
Topic #: 2
[All ISO-IEC-27005-Risk-Manager Questions]

Based on NIST Risk Management Framework, what is the last step of a risk management process?

Show Suggested Answer Hide Answer
Suggested Answer: A

Based on the NIST Risk Management Framework (RMF), the last step of the risk management process is 'Monitoring Security Controls.' This step involves continuously tracking the effectiveness of the implemented security controls, ensuring they remain effective against identified risks, and adapting them to any changes in the threat landscape. Option A correctly identifies the final step.


Contribute your Thoughts:

Janine
2 months ago
Hey, this is a piece of cake! Of course, the answer is C. Communicating the results is the cherry on top of the risk management sundae. Gotta spread the word, you know?
upvoted 0 times
Elvera
2 months ago
Monitoring security controls is crucial too, but communication is the final step.
upvoted 0 times
...
Earleen
2 months ago
Definitely, it's important to let everyone know about the risks.
upvoted 0 times
...
Jerry
2 months ago
I agree, communicating findings and recommendations is key.
upvoted 0 times
...
...
Bettina
2 months ago
But monitoring security controls is crucial to ensure ongoing effectiveness.
upvoted 0 times
...
Sherita
2 months ago
This is a tough one, but I'm leaning towards C. Communicating the findings is key to the whole process, right? Gotta let everyone know what's going on, good or bad.
upvoted 0 times
...
Keith
3 months ago
I'm going with B. Accessing the security controls is crucial to evaluating the effectiveness of the risk management process. Gotta make sure those controls are up to snuff!
upvoted 0 times
Shala
2 months ago
Let's review the NIST framework to confirm the correct last step together.
upvoted 0 times
...
Chaya
2 months ago
I see your point, but I still think B is the last step. Accessing security controls is essential for evaluation.
upvoted 0 times
...
Herman
2 months ago
I disagree, I believe C is the final step. Communicating findings and recommendations is key for improvement.
upvoted 0 times
...
Roselle
2 months ago
I think A is the last step. Monitoring security controls is important to ensure ongoing protection.
upvoted 0 times
...
...
Jeanice
3 months ago
I disagree, I believe it's communicating findings and recommendations.
upvoted 0 times
...
Raina
3 months ago
Hmm, I'm not sure. Could it be A? Monitoring the security controls seems like a pretty important final step to ensure the risk management plan is working.
upvoted 0 times
Alishia
2 months ago
I'm not so sure, I think A) Monitoring security controls is the last step to ensure everything is running smoothly.
upvoted 0 times
...
Christiane
2 months ago
I agree, that does sound like a crucial final step in the risk management process.
upvoted 0 times
...
Cheryl
2 months ago
I think it's C) Communicating findings and recommendations.
upvoted 0 times
...
...
Samuel
3 months ago
I think the answer is C. Communicating findings and recommendations is the last step in the NIST Risk Management Framework process. It's all about reporting the results to stakeholders, right?
upvoted 0 times
Marsha
2 months ago
It's important to ensure that stakeholders are informed of the results and any recommendations for improving security measures.
upvoted 0 times
...
Mary
2 months ago
Yes, you are correct. Communicating findings and recommendations is indeed the last step in the NIST Risk Management Framework process.
upvoted 0 times
...
Marjory
2 months ago
C) Communicating findings and recommendations
upvoted 0 times
...
Selma
2 months ago
B) Accessing security controls
upvoted 0 times
...
Ivory
3 months ago
A) Monitoring security controls
upvoted 0 times
...
...
Bettina
3 months ago
I think the last step is monitoring security controls.
upvoted 0 times
...

Save Cancel