Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

IT management has asked for a consolidated view into the organization's risk profile to enable project prioritization and resource allocation. Which of the following materials would

be MOST helpful?

A.

IT risk register

B.

List of key risk indicators

C.

Internal audit reports

D.

List of approved projects

Which of the following is the BEST way to reduce the likelihood of an individual performing a potentially harmful action as the result of unnecessary entitlement?

A.

Application monitoring

B.

Separation of duty

C.

Least privilege

D.

Nonrepudiation

Which of the following is MOST effective against external threats to an organizations confidential information?

A.

Single sign-on

B.

Data integrity checking

C.

Strong authentication

D.

Intrusion detection system

Which of the following is the MOST effective way for a large and diversified organization to minimize risk associated with unauthorized software on company devices?

A.

Scan end points for applications not included in the asset inventory.

B.

Prohibit the use of cloud-based virtual desktop software.

C.

Conduct frequent reviews of software licenses.

D.

Perform frequent internal audits of enterprise IT infrastructure.

Which of the following is the MOST important reason to link an effective key control indicator (KCI) to relevant key risk indicators (KRIs)?

A.

To monitor changes in the risk environment

B.

To provide input to management for the adjustment of risk appetite

C.

To monitor the accuracy of threshold levels in metrics

D.

To obtain business buy-in for investment in risk mitigation measures

Which of the following controls will BEST mitigate risk associated with excessive access privileges?

A.

Review of user access logs

B.

Frequent password expiration

C.

Separation of duties

D.

Entitlement reviews

Which of the following presents the GREATEST challenge to managing an organization's end-user devices?

A.

Incomplete end-user device inventory

B.

Unsupported end-user applications

C.

Incompatible end-user devices

D.

Multiple end-user device models

When testing the security of an IT system, il is MOST important to ensure that;

A.

tests are conducted after business hours.

B.

operators are unaware of the test.

C.

external experts execute the test.

D.

agreement is obtained from stakeholders.

The MAIN purpose of selecting a risk response is to.

A.

ensure compliance with local regulatory requirements

B.

demonstrate the effectiveness of risk management practices.

C.

ensure organizational awareness of the risk level

D.

mitigate the residual risk to be within tolerance

An organization's Internet-facing server was successfully attacked because the server did not have the latest security patches. The risk associated with poor patch management had been documented in the risk register and accepted. Who should be accountable for any related losses to the organization?

A.

Risk owner

B.

IT risk manager

C.

Server administrator

D.

Risk practitioner

An organization has completed a risk assessment of one of its service providers. Who should be accountable for ensuring that risk responses are implemented?

A.

IT risk practitioner

B.

Third -partf3ecurity team

C.

The relationship owner

D.

Legal representation of the business

Which of the following is the PRIMARY role of a data custodian in the risk management process?

A.

Performing periodic data reviews according to policy

B.

Reporting and escalating data breaches to senior management

C.

Being accountable for control design

D.

Ensuring data is protected according to the classification

Which of the following is the PRIMARY reason to use key control indicators (KCIs) to evaluate control operating effectiveness?

A.

To measure business exposure to risk

B.

To identify control vulnerabilities

C.

To monitor the achievement of set objectives

D.

To raise awareness of operational issues

The PRIMARY benefit of conducting continuous monitoring of access controls is the ability to identify:

A.

inconsistencies between security policies and procedures

B.

possible noncompliant activities that lead to data disclosure

C.

leading or lagging key risk indicators (KRIs)

D.

unknown threats to undermine existing access controls

Which of the following is the MOST significant benefit of using quantitative risk analysis instead of qualitative risk analysis?

A.

Minimized time to completion

B.

Decreased structure

C.

Minimized subjectivity

D.

Decreased cost

An organization has identified that terminated employee accounts are not disabled or deleted within the time required by corporate policy. Unsure of the reason, the organization has decided to monitor the situation for three months to obtain more information. As a result of this decision, the risk has been:

A.

avoided.

B.

accepted.

C.

mitigated.

D.

transferred.

Which of the following is the BEST way to validate the results of a vulnerability assessment?

A.

Perform a penetration test.

B.

Review security logs.

C.

Conduct a threat analysis.

D.

Perform a root cause analysis.

Which of the following is the MOST important key risk indicator (KRI) to protect personal information on corporate mobile endpoints?

A.

Percentage of endpoints that are not encrypted

B.

Number of endpoints not compliant with patching policy

C.

Ratio of undiscoverable endpoints to encrypted endpoints

D.

Percentage of endpoints with outdated antivirus signatures