Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Which of the following is the PRIMARY reason to engage business unit managers in risk management processes'?

A.

Improved alignment will technical risk

B.

Better-informed business decisions

C.

Enhanced understanding of enterprise architecture (EA)

D.

Improved business operations efficiency

An organization recently invested in an identity and access management (IAM) solution to manage user activities across corporate mobile devices. Which of the following is MOST important to update in the risk register?

A.

Inherent risk

B.

Risk appetite

C.

Risk tolerance

D.

Residual risk

Which of the following is the BEST indication of an enhanced risk-aware culture?

A.

Users have read and agreed to comply with security policies.

B.

Risk issues are openly discussed within the organization.

C.

Scores have improved on risk awareness quizzes.

D.

There is a decrease in the number of reported incidents.

A chief information officer (CIO) has identified risk associated with shadow systems being maintained by business units to address specific functionality gaps in the organization'senterprise resource planning (ERP) system. What is the BEST way to reduce this risk going forward?

A.

Align applications to business processes.

B.

Implement an enterprise architecture (EA).

C.

Define the software development life cycle (SDLC).

D.

Define enterprise-wide system procurement requirements.

Employees are repeatedly seen holding the door open for others, so that trailing employees do not have to stop and swipe their own ID badges. This behavior BEST represents:

A.

a threat.

B.

a vulnerability.

C.

an impact

D.

a control.

An information security audit identified a risk resulting from the failure of an automated control Who is responsible for ensuring the risk register is updated accordingly?

A.

The risk practitioner

B.

The risk owner

C.

The control owner

D.

The audit manager

Which of the following should be the PRIMARY driver for the prioritization of risk responses?

A.

Residual risk

B.

Risk appetite

C.

Mitigation cost

D.

Inherent risk

An organization has outsourced its lease payment process to a service provider who lacks evidence of compliance with a necessary regulatory standard. Which risk treatment was adopted by the organization?

A.

Acceptance

B.

Transfer

C.

Mitigation

D.

Avoidance

Which of the following is the MOST significant indicator of the need to perform a penetration test?

A.

An increase in the number of high-risk audit findings

B.

An increase in the number of security incidents

C.

An increase in the percentage of turnover in IT personnel

D.

An increase in the number of infrastructure changes

Which of the following would BEST provide early warning of a high-risk condition?

A.

Risk register

B.

Risk assessment

C.

Key risk indicator (KRI)

D.

Key performance indicator (KPI)

An IT risk threat analysis is BEST used to establish

A.

risk scenarios

B.

risk maps

C.

risk appetite

D.

risk ownership.

An organization has used generic risk scenarios to populate its risk register. Which of the following presents the GREATEST challenge to assigning of the associated risk entries?

A.

The volume of risk scenarios is too large

B.

Risk aggregation has not been completed

C.

Risk scenarios are not applicable

D.

The risk analysts for each scenario is incomplete

A business unit has implemented robotic process automation (RPA) for its

repetitive back-office tasks. Which of the following should be the risk

practitioner's GREATEST concern?

A.

The security team is unaware of the implementation.

B.

The organization may lose institutional knowledge.

C.

The robots may fail to work effectively.

D.

Virtual clients are used for implementation.

Which of the following is the BEST course of action when an organization wants to reduce likelihood in order to reduce a risk level?

A.

Monitor risk controls.

B.

Implement preventive measures.

C.

Implement detective controls.

D.

Transfer the risk.

Which of the following BEST indicates the condition of a risk management program?

A.

Number of risk register entries

B.

Number of controls

C.

Level of financial support

D.

Amount of residual risk

An organization is analyzing the risk of shadow IT usage. Which of the following is the MOST important input into the assessment?

A.

Business benefits of shadow IT

B.

Application-related expresses

C.

Classification of the data

D.

Volume of data

Who is accountable for risk treatment?

A.

Enterprise risk management team

B.

Risk mitigation manager

C.

Business process owner

D.

Risk owner

Which of the following provides the BEST assurance of the effectiveness of vendor security controls?

A.

Review vendor control self-assessments (CSA).

B.

Review vendor service level agreement (SLA) metrics.

C.

Require independent control assessments.

D.

Obtain vendor references from existing customers.

Which of the following is MOST helpful in defining an early-warning threshold associated with insufficient network bandwidth’’?

A.

Average bandwidth usage

B.

Peak bandwidth usage

C.

Total bandwidth usage

D.

Bandwidth used during business hours

A department has been granted an exception to bypass the existing approval process for purchase orders. The risk practitioner should verify the exception has been approved by which of the following?

A.

Internal audit

B.

Control owner

C.

Senior management

D.

Risk manager

A key risk indicator (KRI) that incorporates data from external open-source threat intelligence sources has shown changes in risk trend data. Which of the following is MOST important to update in the risk register?

A.

Impact of risk occurrence

B.

Frequency of risk occurrence

C.

Cost of risk response

D.

Legal aspects of risk realization

The PRIMARY objective for selecting risk response options is to:

A.

reduce risk 10 an acceptable level.

B.

identify compensating controls.

C.

minimize residual risk.

D.

reduce risk factors.

Which of the following is the MOST effective way to mitigate identified risk scenarios?

A.

Assign ownership of the risk response plan

B.

Provide awareness in early detection of risk.

C.

Perform periodic audits on identified risk.

D.

areas Document the risk tolerance of the organization.

Which of the following is the MOST important characteristic of an effective risk management program?

A.

Risk response plans are documented

B.

Controls are mapped to key risk scenarios.

C.

Key risk indicators are defined.

D.

Risk ownership is assigned

Which of the following provides the MOST useful information when developing a risk profile for management approval?

A.

Residual risk and risk appetite

B.

Strength of detective and preventative controls

C.

Effectiveness and efficiency of controls

D.

Inherent risk and risk tolerance

Which of the following provides the MOST reliable evidence of a control's effectiveness?

A.

A risk and control self-assessment

B.

Senior management's attestation

C.

A system-generated testing report

D.

detailed process walk-through

Which of the following is MOST essential for an effective change control environment?

A.

Business management approval of change requests

B.

Separation of development and production environments

C.

Requirement of an implementation rollback plan

D.

IT management review of implemented changes

A risk practitioner is advising management on how to update the IT policy framework to account for the organization s cloud usage. Which of the following should be the FIRST step in this process?

A.

Consult with industry peers regarding cloud best practices.

B.

Evaluate adherence to existing IT policies and standards.

C.

Determine gaps between the current state and target framework.

D.

Adopt an industry-leading cloud computing framework.

A large organization is replacing its enterprise resource planning (ERP) system and has decided not to deploy the payroll module of the new system. Instead, the current payroll system will continue to be

used. Of the following, who should own the risk if the ERP and payroll system fail to operate as expected?

A.

The business owner

B.

The ERP administrator

C.

The project steering committee

D.

The IT project manager

An organization has implemented a policy requiring staff members to take a minimum of five consecutive days' leave per year to mitigate the risk of malicious insider activities. Which of the following is the BEST key performance indicator (KPI) of the effectiveness of this policy?

A.

Percentage of staff turnover following five consecutive days of leave

B.

Average number of consecutive days of leave per staff member

C.

Number of suspected malicious activities reported since policy implementation

D.

Financial loss incurred due to malicious activities since policy implementation

Which of the following is the BEST indicator of an effective IT security awareness program?

A.

Decreased success rate of internal phishing tests

B.

Decreased number of reported security incidents

C.

Number of disciplinary actions issued for security violations

D.

Number of employees that complete security training

Which of the following is the BEST course of action when risk is found to be above the acceptable risk appetite?

A.

Review risk tolerance levels

B.

Maintain the current controls.

C.

Analyze the effectiveness of controls.

D.

Execute the risk response plan

A control owner identifies that the organization's shared drive contains personally identifiable information (Pll) that can be accessed by all personnel. Which of the following is the MOST effective risk response?

A.

Protect sensitive information with access controls.

B.

Implement a data loss prevention (DLP) solution.

C.

Re-communicate the data protection policy.

D.

Implement a data encryption solution.

Which of the following is the MOST important objective of embedding risk management practices into the initiation phase of the project management life cycle?

A.

To deliver projects on time and on budget

B.

To assess inherent risk

C.

To include project risk in the enterprise-wide IT risk profit.

D.

To assess risk throughout the project

Avoiding a business activity removes the need to determine:

A.

systemic risk

B.

residual risk

C.

inherent risk

D.

control risk

What is the PRIMARY reason an organization should include background checks on roles with elevated access to production as part of its hiring process?

A.

Reduce internal threats

B.

Reduce exposure to vulnerabilities

C.

Eliminate risk associated with personnel

D.

Ensure new hires have the required skills

Which of the following is an IT business owner's BEST course of action following an unexpected increase in emergency changes?

A.

Evaluating the impact to control objectives

B.

Conducting a root cause analysis

C.

Validating the adequacy of current processes

D.

Reconfiguring the IT infrastructure

Before assigning sensitivity levels to information it is MOST important to:

A.

define recovery time objectives (RTOs).

B.

define the information classification policy

C.

conduct a sensitivity analyse

D.

Identify information custodians

Of the following, who is accountable for ensuing the effectiveness of a control to mitigate risk?

A.

Control owner

B.

Risk manager

C.

Control operator

D.

Risk treatment owner

Which of the following is the MOST effective way to help ensure accountability for managing risk?

A.

Assign process owners to key risk areas.

B.

Obtain independent risk assessments.

C.

Assign incident response action plan responsibilities.

D.

Create accurate process narratives.

Which of the following would be of GREATEST assistance when justifying investment in risk response strategies?

A.

Total cost of ownership

B.

Resource dependency analysis

C.

Cost-benefit analysis

D.

Business impact analysis

A bank has outsourced its statement printing function to an external service provider. Which of the following is the MOST critical requirement to include in the contract?

A.

Monitoring of service costs

B.

Provision of internal audit reports

C.

Notification of sub-contracting arrangements

D.

Confidentiality of customer data

The percentage of unpatched systems is a:

A.

threat vector.

B.

critical success factor (CSF).

C.

key performance indicator (KPI).

D.

key risk indicator (KRI).

Which of the following is MOST important for developing effective key risk indicators (KRIs)?

A.

Engaging sponsorship by senior management

B.

Utilizing data and resources internal to the organization

C.

Including input from risk and business unit management

D.

Developing in collaboration with internal audit

A systems interruption has been traced to a personal USB device plugged into the corporate network by an IT employee who bypassed internal control procedures. Of the following, who should be accountable?

A.

Business continuity manager (BCM)

B.

Human resources manager (HRM)

C.

Chief risk officer (CRO)

D.

Chief information officer (CIO)

The operational risk associated with attacks on a web application should be owned by the individual in charge of:

A.

network operations.

B.

the cybersecurity function.

C.

application development.

D.

the business function.

A risk practitioner has been notified of a social engineering attack using artificial intelligence (AI) technology to impersonate senior management personnel. Which of the following would BEST mitigate the impact of such attacks?

A.

Subscription to data breach monitoring sites

B.

Suspension and takedown of malicious domains or accounts

C.

Increased monitoring of executive accounts

D.

Training and awareness of employees for increased vigilance

Which of the following would be a risk practitioner'$ BEST recommendation to help ensure cyber risk is assessed and reflected in the enterprise-level risk profile?

A.

Manage cyber risk according to the organization's risk management framework.

B.

Define cyber roles and responsibilities across the organization

C.

Conduct cyber risk awareness training tailored specifically for senior management

D.

Implement a cyber risk program based on industry best practices

The BEST way to obtain senior management support for investment in a control implementation would be to articulate the reduction in:

A.

detected incidents.

B.

residual risk.

C.

vulnerabilities.

D.

inherent risk.

The design of procedures to prevent fraudulent transactions within an enterprise resource planning (ERP) system should be based on:

A.

stakeholder risk tolerance.

B.

benchmarking criteria.

C.

suppliers used by the organization.

D.

the control environment.