PECB EBIOS Risk Manager Exam Questions
EBIOS Risk Manager (Page 4 )

Updated On: 29-Apr-2026

What does the acronym EBIOS RM stand for?

  1. Expression des Besoins et Identification des Objectifs de Sécurité Risk Manager (Expression of needs and Identification of Security Objectives Risk Manager)
  2. Evaluation des Biens et des Informations Opérationnelles pour la Sécurité et le Risk Management (Assessment of assets and operational information for Security and Risk Management)
  3. Estimation des Biens et Identification des Objets de Sécurité pour la Rentabilité des Métiers (Valuation of Goods and Identification of Security Objects for Business Profitability)

Answer(s): A

Explanation:

EBIOS RM stands for Expression des Besoins et Identification des Objectifs de Sécurité ­ Risk Manager. It is the official name defined by ANSSI and reflects the method's core purpose: identifying security needs and defining security objectives within a structured risk management approach.



Which of the following combinations gives the risk level according to the EBIOS Risk Manager method?

  1. The risk is the result of the level of severity and the level of likelihood
  2. The risk is the result of the level of residual risk following the consequences of a cyber attack
  3. The risk is the result of investments required to deal with the feared events exploited by a risk origin

Answer(s): A

Explanation:

In the EBIOS Risk Manager method, the risk level is determined by combining the severity of the impact on business assets with the likelihood of occurrence. This cross-analysis quantifies how critical a risk scenario is and supports prioritization of treatment actions.



Why is the strategic cycle necessary?

  1. The strategic cycle establishes the scope and frequency of application of the entire digital risk management process, as well as the review of strategic scenarios
  2. The strategic cycle defines the priorities to be addressed by business asset and enables senior management to take decisions at regular intervals
  3. Strategic cycle defines all stakeholder threat levels of the ecosystem

Answer(s): B

Explanation:

The strategic cycle is necessary because it enables senior management to define and regularly reassess priorities related to business assets. It provides a decision-making framework at the appropriate level, ensuring that digital risk management remains aligned with strategic objectives and evolves with changes in the organization and its context.



Does the EBIOS Risk Manager risk management method cover all types of risks for an organization (public or private)?

  1. No, the EBIOS Risk Manager method only deals with digital and intentional risks
  2. Yes, it's a complete and exhaustive method for managing all the risks of all kinds that an organization may face
  3. No, the EBIOS Risk Manager method is designed to cover only unintentional risks from third parties

Answer(s): A

Explanation:

EBIOS Risk Manager is specifically designed to address digital risks, particularly those arising from intentional and malicious actions such as cyberattacks. It does not aim to cover all categories of organizational risks, but focuses on cybersecurity-related threats and their impact on business assets.



The strategic scenarios are drawn up from the results of Workshops 1 and 2 and the stakeholders threat level.
What specific attack paths do they represent?

  1. These strategic scenarios represent the attack paths that a risk origin could take to achieve its objective
  2. These strategic scenarios represent operational attack paths, i.e. the detailed description of the methods of attack that the risk origin could take to achieve its objective
  3. These strategic scenarios represent the attack paths per level of likelihood that a risk origin could take to achieve its objective

Answer(s): A

Explanation:

Strategic scenarios describe the main attack paths that a risk origin could follow to reach its objective and impact business assets. They remain high-level and focus on the overall strategy and intent of the attacker, rather than detailing the specific operational or technical steps of the attack.



Is the EBIOS Risk Manager method compatible with the ISO 27005:2022 Standard on information security risk management?

  1. No, because the EBIOS RM method was developed in 2018 and the standard was revised in 2022, so it cannot be compliant
  2. Yes, the EBIOS RM method applies the risk management process set out in the Standard, even if the process is different over several iterations, the result is the identification of digital risks
  3. No, the standard presents a different process to the EBIOS RM workshops

Answer(s): B

Explanation:

EBIOS Risk Manager follows the same fundamental principles as ISO 27005 by structuring risk management around context establishment, risk identification, analysis, evaluation, and treatment. Although it organizes these activities through iterative workshops, it remains fully aligned with the standard's process and objectives for managing information security risks.



What is the compliance approach presented in the EBIOS Risk Manager method?

  1. The compliance approach ensures that all business assets have identified the various legal, regulatory and contractual obligations to which it is subject. This approach makes it easier to share responsibility for implementing security measures
  2. The compliance approach helps determine the threat level to be dealt with according to the list of obligations with which an organization must comply. The level of compliance determines the level of the security baseline
  3. The compliance approach is used to determine the security base on which the scenario approach is based to develop particularly targeted or sophisticated risk scenarios. Accidental and environmental risks are treated a priori via a compliance approach within the security baseline

Answer(s): C

Explanation:

In EBIOS Risk Manager, the compliance approach establishes a baseline of security measures that address common, accidental, or environmental risks by default. This baseline serves as the foundation upon which the scenario-based analysis then focuses on more targeted and sophisticated intentional threats, enabling a risk- driven and prioritized treatment strategy.



What are the exact titles used to describe the 5 workshops in the EBIOS Risk Manager method?

  1. Study of the context, study of feared events, study of threat scenarios, study of risks and study of security measures
  2. Assessment of feared events, identification of risk origins, strategic scenarios, operational scenarios, remediation plan
  3. Scope and security baseline, risk origins and target objectives, strategic scenarios, operational scenarios and risk management

Answer(s): C

Explanation:

The EBIOS Risk Manager method structures its analysis into five workshops with precise titles that reflect its progressive and scenario-based logic: defining the scope and establishing the security baseline, identifying risk origins and their target objectives, developing strategic scenarios, detailing operational scenarios, and concluding with risk management decisions and treatment planning.



Viewing page 4 of 9
Viewing questions 25 - 32 out of 59 questions


EBIOS Risk Manager Exam Discussions & Posts

AI Tutor AI Tutor 👋 I’m here to help!