Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following is the MOST important update for keeping the risk register current?

A.

Modifying organizational structures when lines of business merge

B.

Adding new risk assessment results annually

C.

Retiring risk scenarios that have been avoided

D.

Changing risk owners due to employee turnover

An organization wants to transfer risk by purchasing cyber insurance. Which of the following would be MOST important for the risk practitioner to communicate to senior management for contract negotiation purposes?

A.

Most recent IT audit report results

B.

Replacement cost of IT assets

C.

Current annualized loss expectancy report

D.

Cyber insurance industry benchmarking report

Which of the following is MOST important when identifying an organization's risk exposure associated with Internet of Things (loT) devices?

A.

Defined remediation plans

B.

Management sign-off on the scope

C.

Manual testing of device vulnerabilities

D.

Visibility into all networked devices

Which of the following is the GREATEST risk of relying on artificial intelligence (Al) within heuristic security systems?

A.

Al may result in less reliance on human intervention.

B.

Malicious activity may inadvertently be classified as normal during baselining.

C.

Risk assessments of heuristic security systems are more difficult.

D.

Predefined patterns of malicious activity may quickly become outdated.

Which of the following will BEST support management repotting on risk?

A.

Risk policy requirements

B.

A risk register

C.

Control self-assessment

D.

Key performance Indicators

Which of the following is the MOST important reason to communicate risk assessments to senior management?

A.

To ensure actions can be taken to align assessment results to risk appetite

B.

To ensure key risk indicator (KRI) thresholds can be adjusted for tolerance

C.

To ensure awareness of risk and controls is shared with key decision makers

D.

To ensure the maturity of the assessment program can be validated

Which of the following BEST helps to ensure disaster recovery staff members

are able to complete their assigned tasks effectively during a disaster?

A.

Performing parallel disaster recovery testing

B.

Documenting the order of system and application restoration

C.

Involving disaster recovery staff members in risk assessments

D.

Conducting regular tabletop exercises and scenario analysis

A bank wants to send a critical payment order via email to one of its offshore branches. Which of the following is the BEST way to ensure the message reaches the intended recipient without alteration?

A.

Add a digital certificate

B.

Apply multi-factor authentication

C.

Add a hash to the message

D.

Add a secret key

An organization is adopting block chain for a new financial system. Which of the following should be the GREATEST concern for a risk practitioner evaluating the system's production readiness?

A.

Limited organizational knowledge of the underlying technology

B.

Lack of commercial software support

C.

Varying costs related to implementation and maintenance

D.

Slow adoption of the technology across the financial industry

Which of the following should an organization perform to forecast the effects of a disaster?

A.

Develop a business impact analysis (BIA).

B.

Define recovery time objectives (RTO).

C.

Analyze capability maturity model gaps.

D.

Simulate a disaster recovery.

A risk practitioner observed Vial a high number of pokey exceptions were approved by senior management. Which of the following is the risk practitioner’s BEST course of action to determine root cause?

A.

Review the risk profile

B.

Review pokey change history

C.

interview the control owner

D.

Perform control testing

Which of the following is MOST helpful to facilitate the decision of recovery priorities in a disaster situation?

A.

Business Impact Analysis (BIA)

B.

Key Risk Indicators (KRIs)

C.

Recovery Point Objective (RPO)

D.

Risk Scenario Analysis

Which of the following controls BEST helps to ensure that transaction data reaches its destination?

A.

Securing the network from attacks

B.

Providing acknowledgments from receiver to sender

C.

Digitally signing individual messages

D.

Encrypting data-in-transit

A risk practitioners PRIMARY focus when validating a risk response action plan should be that risk response:

A.

reduces risk to an acceptable level

B.

quantifies risk impact

C.

aligns with business strategy

D.

advances business objectives.

Which of the following is the MOST important reason to validate that risk responses have been executed as outlined in the risk response plan''

A.

To ensure completion of the risk assessment cycle

B.

To ensure controls arc operating effectively

C.

To ensure residual risk Is at an acceptable level

D.

To ensure control costs do not exceed benefits

A risk practitioner has recently become aware of unauthorized use of confidential personal information within the organization. Which of the following should the risk practitioner do FIRST?

A.

Establish database activity monitoring

B.

Report the incident to the chief privacy officer (CPO)

C.

Invoke the incident response plan

D.

Escalate the issue to the data owner

Which of the following will help ensure the elective decision-making of an IT risk management committee?

A.

Key stakeholders are enrolled as members

B.

Approved minutes ate forwarded to senior management

C.

Committee meets at least quarterly

D.

Functional overlap across the business is minimized

Which of the following BEST balances the costs and benefits of managing IT risk*?

A.

Prioritizing and addressing risk in line with risk appetite. Eliminating risk through preventive and detective controls

B.

Considering risk that can be shared with a third party

C.

Evaluating the probability and impact of risk scenarios

How does an organization benefit by purchasing cyber theft insurance?

A.

It decreases the amount of organizational loss if risk events occur.

B.

It justifies the acceptance of risk associated with cyber theft events.

C.

It transfers risk ownership along with associated liabilities to a third party.

D.

It decreases the likelihood of risk events occurring.

A newly incorporated enterprise needs to secure its information assets From a governance perspective which of the following should be done FIRST?

A.

Define information retention requirements and policies

B.

Provide information security awareness training

C.

Establish security management processes and procedures

D.

Establish an inventory of information assets

Which of the following is the PRIMARY benefit of using a risk map with stakeholders?

A.

Consolidates risk response options by severity

B.

Aligns risk appetite with business objectives

C.

Correlates risk scenarios to risk appetite

D.

Defines an organizational risk taxonomy

The purpose of requiring source code escrow in a contractual agreement is to:

A.

ensure that the source code is valid and exists.

B.

ensure that the source code is available if the vendor ceases to exist.

C.

review the source code for adequacy of controls.

D.

ensure the source code is available when bugs occur.

Which of the following is the GREATEST benefit of updating the risk register to include outcomes from a risk assessment?

A.

It maintains evidence of compliance with risk policy.

B.

It facilitates timely risk-based decisions.

C.

It validates the organization's risk appetite.

D.

It helps to mitigate internal and external risk factors.

The PRIMARY reason for tracking the status of risk mitigation plans is to ensure:

A.

the proposed controls are implemented as scheduled.

B.

security controls are tested prior to implementation.

C.

compliance with corporate policies.

D.

the risk response strategy has been decided.

Which of the following controls would BEST reduce the likelihood of a successful network attack through social engineering?

A.

Automated controls

B.

Security awareness training

C.

Multifactor authentication

D.

Employee sanctions

Which of the following should be the PRIMARY basis for establishing a priority sequence when restoring business processes after a disruption?

A.

Recovery Time Objective (RTO)

B.

Mean Time to Recover (MTTR)

C.

Mean Time Between Failures (MTBF)

D.

Recovery Point Objective (RPO)

Which of the following roles would be MOST helpful in providing a high-level view of risk related to customer data loss?

A.

Customer database manager

B.

Customer data custodian

C.

Data privacy officer

D.

Audit committee

Which of the following provides the MOST comprehensive information when developing a risk profile for a system?

A.

Results of a business impact analysis (BIA)

B.

Risk assessment results

C.

A mapping of resources to business processes

D.

Key performance indicators (KPIs)

Which of the following is the BEST approach for determining whether a risk action plan is effective?

A.

Comparing the remediation cost against budget

B.

Assessing changes in residual risk

C.

Assessing the inherent risk

D.

Monitoring changes of key performance indicators(KPIs)

Which of the following is the PRIMARY reason to perform ongoing risk assessments?

A.

Emerging risk must be continuously reported to management.

B.

New system vulnerabilities emerge at frequent intervals.

C.

The risk environment is subject to change.

D.

The information security budget must be justified.

Which of the following provides the MOST helpful information in identifying risk in an organization?

A.

Risk registers

B.

Risk analysis

C.

Risk scenarios

D.

Risk responses

Which of the following is the MOST important consideration when determining the appropriate data retention period throughout the data management life cycle?

A.

Data storage and collection methods

B.

Data owner preferences

C.

Legal and regulatory requirements

D.

Choice of encryption algorithms

Which of the following is MOST important to add to the risk register for a remediated risk scenario?

A.

Notification to technical teams of implementation schedules

B.

Sign-off by senior executives

C.

Evidence of successfully implemented controls

D.

Minutes from control design meetings

A recent regulatory requirement has the potential to affect an organization's use of a third party to supply outsourced business services. Which of the following is the BEST course of action?

A.

Conduct a gap analysis.

B.

Terminate the outsourcing agreement.

C.

Identify compensating controls.

D.

Transfer risk to the third party.

Which of the following would BEST prevent an unscheduled application of a patch?

A.

Network-based access controls

B.

Compensating controls

C.

Segregation of duties

D.

Change management

When performing a risk assessment of a new service to support a ewe Business process. which of the following should be done FRST10 ensure continuity of operations?

A.

a identity conditions that may cause disruptions

B.

Review incident response procedures

C.

Evaluate the probability of risk events

D.

Define metrics for restoring availability

Which of the following would MOST effectively protect financial records from ransomware attacks?

A.

Enforcement of encryption at rest for backups

B.

Multi-factor authentication (MFA) on storage points

C.

Classifying and encrypting data on backups

D.

Immutable storage and backups

Which of the following is MOST important requirement to include in a Software as a Service (SaaS) vendor contract to ensure data is protected?

A.

The vendor must provide periodic independent assurance reports.

B.

The vendor must host data in a specific geographic location.

C.

The vendor must be held liable for regulatory fines for failure to protect data.

D.

The vendor must participate in an annual vendor performance review.

Which of the following is the GREATEST benefit of involving business owners in risk scenario development?

A.

Business owners have the ability to effectively manage risk.

B.

Business owners have authority to approve control implementation.

C.

Business owners understand the residual risk of competitors.

D.

Business owners are able to assess the impact.

Which of the following should a risk practitioner recommend FIRST when an increasing trend of risk events and subsequent losses has been identified?

A.

Conduct root cause analyses for risk events.

B.

Educate personnel on risk mitigation strategies.

C.

Integrate the risk event and incident management processes.

D.

Implement controls to prevent future risk events.

It is MOST important that security controls for a new system be documented in:

A.

testing requirements

B.

the implementation plan.

C.

System requirements

D.

The security policy

Which of the following is a risk practitioner's BEST recommendation upon learning that an employee inadvertently disclosed sensitive data to a vendor?

A.

Enroll the employee in additional security training.

B.

Invoke the incident response plan.

C.

Conduct an internal audit.

D.

Instruct the vendor to delete the data.

A risk practitioner has observed that there is an increasing trend of users sending sensitive information by email without using encryption. Which of the following would be the MOST effective approach to mitigate the risk associated with data loss?

A.

Implement a tool to create and distribute violation reports

B.

Raise awareness of encryption requirements for sensitive data.

C.

Block unencrypted outgoing emails which contain sensitive data.

D.

Implement a progressive disciplinary process for email violations.

The MOST important reason for implementing change control procedures is to ensure:

A.

only approved changes are implemented

B.

timely evaluation of change events

C.

an audit trail exists.

D.

that emergency changes are logged.

A risk practitioner has been notified that an employee sent an email in error containing customers' personally identifiable information (Pll). Which of the following is the risk practitioner's BEST course of action?

A.

Report it to the chief risk officer.

B.

Advise the employee to forward the email to the phishing team.

C.

follow incident reporting procedures.

D.

Advise the employee to permanently delete the email.

An organization's IT department wants to complete a proof of concept (POC) for a security tool. The project lead has asked for approval to use the production data for testing purposes as it will yield the best results. Which of the following is the risk practitioner's BEST recommendation?

A.

Accept the risk of using the production data to ensure accurate results.

B.

Assess the risk of using production data for testing before making a decision.

C.

Benchmark against what peer organizations are doing with POC testing environments.

D.

Deny the request, as production data should not be used for testing purposes.

A risk heat map is MOST commonly used as part of an IT risk analysis to facilitate risk:

A.

communication

B.

identification.

C.

treatment.

D.

assessment.

An IT department has organized training sessions to improve user awareness of organizational information security policies. Which of the following is the BEST key performance indicator (KPI) to reflect effectiveness of the training?

A.

Number of training sessions completed

B.

Percentage of staff members who complete the training with a passing score

C.

Percentage of attendees versus total staff

D.

Percentage of staff members who attend the training with positive feedback

A.

Ensure compliance with local legislation because it has a higher priority.

B.

Conduct a risk assessment and develop mitigation options.

C.

Terminate the current cloud contract and migrate to a local cloud provider.

D.

Accept the risk because foreign legislation does not apply to the organization.

Which of the following should be used as the PRIMARY basis for evaluating the state of an organization's cloud computing environment against leading practices?

A.

The cloud environment's capability maturity model

B.

The cloud environment's risk register

C.

The cloud computing architecture

D.

The organization's strategic plans for cloud computing