Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

An application development team has a backlog of user requirements for a new system that will process insurance claim payments for customers. Which of the following should be the MOST important consideration for a risk-based review of the user requirements?

A.

Number of claims affected by the user requirements

B.

Number of customers impacted

C.

Impact to the accuracy of claim calculation

D.

Level of resources required to implement the user requirements

Who should be responsible for determining which stakeholders need to be involved in the development of a risk scenario?

A.

Risk owner

B.

Risk practitioner

C.

Compliance manager

D.

Control owner

The MAIN purpose of having a documented risk profile is to:

A.

comply with external and internal requirements.

B.

enable well-informed decision making.

C.

prioritize investment projects.

D.

keep the risk register up-to-date.

A failure in an organization’s IT system build process has resulted in several computers on the network missing the corporate endpoint detection and response (EDR) software. Which of the following should be the risk practitioner's IMMEDIATE concern?

A.

Threats are not being detected.

B.

Multiple corporate build images exist.

C.

The IT build process was not followed.

D.

The process documentation was not updated.

Which of the following would be the BEST recommendation if the level of risk in the IT risk profile has decreased and is now below management's risk appetite?

A.

Optimize the control environment.

B.

Realign risk appetite to the current risk level.

C.

Decrease the number of related risk scenarios.

D.

Reduce the risk management budget.

A financial institution has identified high risk of fraud in several business applications. Which of the following controls will BEST help reduce the risk of fraudulent internal transactions?

A.

Periodic user privileges review

B.

Log monitoring

C.

Periodic internal audits

D.

Segregation of duties

An organization is preparing to transfer a large number of customer service representatives to the sales department. Of the following, who is responsible for mitigating the risk associated with residual system access?

A.

IT service desk manager

B.

Sales manager

C.

Customer service manager

D.

Access control manager

Which of the following would be MOST helpful when estimating the likelihood of negative events?

A.

Business impact analysis

B.

Threat analysis

C.

Risk response analysis

D.

Cost-benefit analysis

Which of the following is MOST important to the effectiveness of a senior oversight committee for risk monitoring?

A.

Key risk indicators (KRIs)

B.

Risk governance charter

C.

Organizational risk appetite

D.

Cross-business representation

Which of the following is the PRIMARY reason for a risk practitioner to review an organization's IT asset inventory?

A.

To plan for the replacement of assets at the end of their life cycles

B.

To assess requirements for reducing duplicate assets

C.

To understand vulnerabilities associated with the use of the assets

D.

To calculate mean time between failures (MTBF) for the assets

A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?

A.

The team that performed the risk assessment

B.

An assigned risk manager to provide oversight

C.

Action plans to address risk scenarios requiring treatment

D.

The methodology used to perform the risk assessment

Risk management strategies are PRIMARILY adopted to:

A.

take necessary precautions for claims and losses.

B.

achieve acceptable residual risk levels.

C.

avoid risk for business and IT assets.

D.

achieve compliance with legal requirements.

Which of the following is the BEST way to determine software license compliance?

A.

List non-compliant systems in the risk register.

B.

Conduct periodic compliance reviews.

C.

Review whistleblower reports of noncompliance.

D.

Monitor user software download activity.

A risk practitioner has been asked to propose a risk acceptance framework for an organization. Which of the following is the MOST important consideration for the risk practitioner to address in the framework?

A.

Consistent forms to document risk acceptance rationales

B.

Acceptable scenarios to override risk appetite or tolerance thresholds

C.

Individuals or roles authorized to approve risk acceptance

D.

Communication protocols when a risk is accepted

When developing a risk awareness training program, which of the following is the BEST way to promote a risk-aware culture?

A.

Emphasize individual responsibility for managing risk.

B.

Communicate incident escalation procedures.

C.

Illustrate methods to identify threats and vulnerabilities.

D.

Challenge the effectiveness of business processes.

Which of the following should be the PRIMARY driver for an organization on a multi-year cloud implementation to publish a cloud security policy?

A.

Evaluating gaps in the on-premise and cloud security profiles

B.

Establishing minimum cloud security requirements

C.

Enforcing compliance with cloud security parameters

D.

Educating IT staff on variances between on premise and cloud security

When establishing leading indicators for the information security incident response process it is MOST important to consider the percentage of reported incidents:

A.

that results in a full root cause analysis.

B.

used for verification within the SLA.

C.

that are verified as actual incidents.

D.

resolved within the SLA.

An IT operations team implements disaster recovery controls based on decisions from application owners regarding the level of resiliency needed. Who is the risk owner in this scenario?

A.

Business resilience manager

B.

Disaster recovery team lead

C.

Application owner

D.

IT operations manager

Which of the following is the MOST effective way to integrate business risk management with IT operations?

A.

Perform periodic IT control self-assessments.

B.

Require a risk assessment with change requests.

C.

Provide security awareness training.

D.

Perform periodic risk assessments.

A risk practitioner is MOST likely to use a SWOT analysis to assist with which risk process?

A.

Risk assessment

B.

Risk reporting

C.

Risk mitigation

D.

Risk identification

Which of the following BEST prevents unauthorized access to customer personal data transmitted to third-party service providers?

A.

Reviewing and testing service providers' business continuity plans (BCPs)

B.

Ensuring service providers comply with laws and regulations

C.

Implementing and reviewing data sharing controls

D.

Requiring service providers to report privacy breaches

Which of the following risk scenarios would be the GREATEST concern as a result of a single sign-on implementation?

A.

User access may be restricted by additional security.

B.

Unauthorized access may be gained to multiple systems.

C.

Security administration may become more complex.

D.

User privilege changes may not be recorded.

A public online information security training course is available to an organization's staff. The online course contains free-form discussion fields. Which of the following should be of MOST concern to the organization's risk practitioner?

A.

The form may be susceptible to SQL injection attacks.

B.

Data is not encrypted in transit to the site.

C.

Proprietary corporate information may be disclosed.

D.

Staff nondisclosure agreements (NDAs) are not in place.

Which of the following BEST enables senior management to make risk treatment decisions in line with the organization's risk appetite?

A.

Quantitative risk analysis

B.

Industry risk benchmarks

C.

Risk scenarios

D.

Risk remediation plans

Which of the following is the MOST important information to cover a business continuity awareness Ira nine, program for all employees of the organization?

A.

Recovery time objectives (RTOs)

B.

Segregation of duties

C.

Communication plan

D.

Critical asset inventory

The PRIMARY benefit of selecting an appropriate set of key risk indicators (KRIs) is that they:

A.

serve as a basis for measuring risk appetite.

B.

align with the organization's risk profile.

C.

provide a warning of emerging high-risk conditions.

D.

provide data for updating the risk register.

Which of the following is MOST important for an organization to update following a change in legislation requiring notification to individuals impacted by data breaches?

A.

Insurance coverage

B.

Security awareness training

C.

Policies and standards

D.

Risk appetite and tolerance

When reviewing a report on the performance of control processes, it is MOST important to verify whether the:

A.

business process objectives have been met.

B.

control adheres to regulatory standards.

C.

residual risk objectives have been achieved.

D.

control process is designed effectively.

Which of the following offers the SIMPLEST overview of changes in an organization's risk profile?

A.

A risk roadmap

B.

A balanced scorecard

C.

A heat map

D.

The risk register

A business is conducting a proof of concept on a vendor's Al technology. Which of the following is the MOST important consideration for managing risk?

A.

Use of a non-production environment

B.

Adequate vendor support

C.

Third-party management plan

D.

Regular security updates

When establishing an enterprise IT risk management program, it is MOST important to:

A.

review alignment with the organizations strategy.

B.

understand the organization's information security policy.

C.

validate the organization's data classification scheme.

D.

report identified IT risk scenarios to senior management.

Which of the following would BEST help an enterprise prioritize risk scenarios?

A.

Industry best practices

B.

Placement on the risk map

C.

Degree of variances in the risk

D.

Cost of risk mitigation

Which of the following BEST reduces the likelihood of fraudulent activity that occurs through use of a digital wallet?

A.

Require multi-factor authentication (MFA) to access the digital wallet.

B.

Use a digital key to encrypt the contents of the wallet.

C.

Enable audit logging on the digital wallet's device.

D.

Require public key infrastructure (PKI) to authorize transactions.

Which of the following would be of GREATEST assistance when justifying investment in risk response strategies?

A.

Total cost of ownership

B.

Resource dependency analysis

C.

Cost-benefit analysis

D.

Business impact analysis

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a vulnerability management process?

A.

Percentage of vulnerabilities remediated within the agreed service level

B.

Number of vulnerabilities identified during the period

C.

Number of vulnerabilities re-opened during the period

D.

Percentage of vulnerabilities escalated to senior management

Effective risk communication BEST benefits an organization by:

A.

helping personnel make better-informed decisions

B.

assisting the development of a risk register.

C.

improving the effectiveness of IT controls.

D.

increasing participation in the risk assessment process.

Which of the following is the PRIMARY reason for a risk practitioner to report changes and trends in the IT risk profile to senior management?

A.

To ensure risk owners understand their responsibilities

B.

To ensure IT risk is managed within acceptable limits

C.

To ensure the organization complies with legal requirements

D.

To ensure the IT risk awareness program is effective

A risk practitioner is assisting with the preparation of a report on the organization s disaster recovery (DR) capabilities. Which information would have the MOST impact on the overall recovery profile?

A.

The percentage of systems meeting recovery target times has increased.

B.

The number of systems tested in the last year has increased.

C.

The number of systems requiring a recovery plan has increased.

D.

The percentage of systems with long recovery target times has decreased.

Which of the following is the BEST evidence that a user account has been properly authorized?

A.

An email from the user accepting the account

B.

Notification from human resources that the account is active

C.

User privileges matching the request form

D.

Formal approval of the account by the user's manager

The PRIMARY benefit of using a maturity model is that it helps to evaluate the:

A.

capability to implement new processes

B.

evolution of process improvements

C.

degree of compliance with policies and procedures

D.

control requirements.

Which of the following controls BEST addresses the risk of unauthorized disclosure of sensitive data as a result of a lost bring your own device (BYOD) tablet?

A.

Unregistered device detection

B.

Device encryption

C.

Device wiping policy

D.

Mobile device antivirus

Which of the following is a PRIMARY objective of privacy impact assessments (PIAs)?

A.

To identify threats introduced by business processes

B.

To identify risk when personal information is collected

C.

To ensure senior management has approved the use of personal information

D.

To ensure compliance with data privacy laws and regulations

Which of the following BEST indicates that an organizations risk management program is effective?

A.

Fewer security incidents have been reported.

B.

The number of audit findings has decreased.

C.

Residual risk is reduced.

D.

inherent risk Is unchanged.