Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

An organization has established a single enterprise-wide risk register that records high-level risk scenarios. The IT risk department has created its own register to record more granular scenarios applicable to IT. Which of the following is the BEST way to ensure alignment between these two registers?

A.

Map the granular risk scenarios to the high-level risk register items.

B.

List application and server vulnerabilities in the IT risk register.

C.

Identify overlapping risk scenarios between the two registers.

D.

Maintain both high-level and granular risk scenarios in a single register.

Which of the following should be the MAIN consideration when validating an organization's risk appetite?

A.

Comparison against regulations

B.

Maturity of the risk culture

C.

Capacity to withstand loss

D.

Cost of risk mitigation options

A risk practitioner notices a trend of noncompliance with an IT-related control. Which of the following would BEST assist in making a recommendation to management?

A.

Assessing the degree to which the control hinders business objectives

B.

Reviewing the IT policy with the risk owner

C.

Reviewing the roles and responsibilities of control process owners

D.

Assessing noncompliance with control best practices

A threat intelligence team has identified an indicator of compromise related to an advanced persistent threat (APT) actor. Which of the following is the risk practitioner's BEST course of action?

A.

Review the most recent vulnerability scanning report.

B.

Determine the business criticality of the asset.

C.

Determine the adequacy of existing security controls.

D.

Review prior security incidents related to the asset.

Which of the following is a risk practitioner's MOST important course of action when the level of risk has exceeded risk tolerance?

A.

Facilitate a review of risk tolerance levels

B.

Adjust the risk impact and likelihood scale

C.

Revise key risk indicator (KRI) thresholds

D.

Introduce the risk treatment process

Which of the following should be the PRIMARY input to determine risk tolerance?

A.

Regulatory requirements

B.

Organizational objectives

C.

Annual loss expectancy (ALE)

D.

Risk management costs

Which of the following is the PRIMARY reason to conduct risk assessments at periodic intervals?

A.

To ensure emerging risk is identified and monitored

B.

To establish the maturity level of risk assessment processes

C.

To promote a risk-aware culture among staff

D.

To ensure risk trend data is collected and reported

Which of the following is the MAIN benefit to an organization using key risk indicators (KRIs)?

A.

KRIs assist in the preparation of the organization's risk profile.

B.

KRIs signal that a change in the control environment has occurred.

C.

KRIs provide a basis to set the risk appetite for an organization

D.

KRIs provide an early warning that a risk threshold is about to be reached.

Which of the following is the BEST approach for an organization in a heavily regulated industry to comprehensively test application functionality?

A.

Use production data in a non-production environment

B.

Use masked data in a non-production environment

C.

Use test data in a production environment

D.

Use anonymized data in a non-production environment

Which of the following is the BEST way to determine whether new controls mitigate security gaps in a business system?

A.

Complete an offsite business continuity exercise.

B.

Conduct a compliance check against standards.

C.

Perform a vulnerability assessment.

D.

Measure the change in inherent risk.

Which of the following is the PRIMARY benefit of using a risk profile?

A.

It promotes a security-aware culture.

B.

It enables vulnerability analysis.

C.

It enhances internal risk reporting.

D.

It provides risk information to auditors.

Which of the following would BEST mitigate the risk associated with reputational damage from inappropriate use of social media sites by employees?

A.

Validating employee social media accounts and passwords

B.

Monitoring Internet usage on employee workstations

C.

Disabling social media access from the organization's technology

D.

Implementing training and awareness programs

Which of the following is the BEST approach when a risk practitioner has been asked by a business unit manager to exclude an in-scope system from a risk assessment?

A.

Postpone the risk assessment.

B.

Facilitate the exception process.

C.

Accept the manager's request.

D.

Reject the manager's request.

Which of the following is the BEST control for a large organization to implement to effectively mitigate risk related to fraudulent transactions?

A.

Segregation of duties

B.

Monetary approval limits

C.

Clear roles and responsibilities

D.

Password policies

Which of the following provides the MOST useful information when measuring the progress of risk response action plans?

A.

Results of risk remediation team interviews

B.

Annual loss expectancy (ALE) changes

C.

Vulnerability assessment results

D.

Percentage of mitigated risk scenarios

It was discovered that a service provider's administrator was accessing sensitive information without the approval of the customer in an Infrastructure as a Service (laaS) model. Which of the following would BEST protect against a future recurrence?

A.

Data encryption

B.

Intrusion prevention system (IPS)

C.

Two-factor authentication

D.

Contractual requirements

Which of the following BEST mitigates the risk of sensitive personal data leakage from a software development environment?

A.

Tokenized personal data only in test environments

B.

Data loss prevention tools (DLP) installed in passive mode

C.

Anonymized personal data in non-production environments

D.

Multi-factor authentication for access to non-production environments

Which of the following should be the risk practitioner's FIRST course of action when an organization plans to adopt a cloud computing strategy?

A.

Request a budget for implementation

B.

Conduct a threat analysis.

C.

Create a cloud computing policy.

D.

Perform a controls assessment.

Who should be responsible for implementing and maintaining security controls?

A.

End user

B.

Internal auditor

C.

Data owner

D.

Data custodian

An IT risk practitioner has been asked to regularly report on the overall status and effectiveness of the IT risk management program. Which of the following is MOST useful for this purpose?

A.

Balanced scorecard

B.

Capability maturity level

C.

Internal audit plan

D.

Control self-assessment (CSA)

An incentive program is MOST likely implemented to manage the risk associated with loss of which organizational asset?

A.

Employees

B.

Data

C.

Reputation

D.

Customer lists

The implementation of a risk treatment plan will exceed the resources originally allocated for the risk response. Which of the following should be the risk owner's NEXT action?

A.

Perform a risk assessment.

B.

Accept the risk of not implementing.

C.

Escalate to senior management.

D.

Update the implementation plan.

Which of the following is the PRIMARY reason to aggregate risk assessment results from different business units?

A.

To improve communication of risk to senior management

B.

To compare risk profiles across the business units

C.

To allocate budget for risk management resources

D.

To determine overall impact to the organization

Which of the following provides the MOST useful input to the development of realistic risk scenarios?

A.

Balanced scorecard

B.

Risk appetite

C.

Risk map

D.

Risk events

The MAIN purpose of reviewing a control after implementation is to validate that the control:

A.

operates as intended.

B.

is being monitored.

C.

meets regulatory requirements.

D.

operates efficiently.

Which of the following is the PRIMARY benefit of identifying and communicating with stakeholders at the onset of an IT risk assessment?

A.

Obtaining funding support

B.

Defining the risk assessment scope

C.

Selecting the risk assessment framework

D.

Establishing inherent risk

An IT operations team implements disaster recovery controls based on decisions from application owners regarding the level of resiliency needed. Who is the risk owner in this scenario?

A.

Business resilience manager

B.

Disaster recovery team lead

C.

Application owner

D.

IT operations manager

Which of the following should be included in a risk assessment report to BEST facilitate senior management's understanding of the results?

A.

Benchmarking parameters likely to affect the results

B.

Tools and techniques used by risk owners to perform the assessments

C.

A risk heat map with a summary of risk identified and assessed

D.

The possible impact of internal and external risk factors on the assessment results

Which of the following would present the GREATEST challenge when assigning accountability for control ownership?

A.

Weak governance structures

B.

Senior management scrutiny

C.

Complex regulatory environment

D.

Unclear reporting relationships

A hospital recently implemented a new technology to allow virtual patient appointments. Which of the following should be the risk practitioner's FIRST course of action?

A.

Reassess the risk profile.

B.

Modify the risk taxonomy.

C.

Increase the risk tolerance.

D.

Review the risk culture.

Which of the following is the PRIMARY benefit of implementing key control indicators (KCIs)?

A.

Confirming the adequacy of recovery plans.

B.

Improving compliance with control standards.

C.

Providing early detection of control degradation.

D.

Reducing the number of incidents.

Which of the following BEST confirms the existence and operating effectiveness of information systems controls?

A.

Self-assessment questionnaires completed by management

B.

Review of internal audit and third-party reports

C.

Management review and sign-off on system documentation

D.

First-hand direct observation of the controls in operation

Which of the following is the MOST important characteristic when designing a key risk indicator (KRI)?

A.

It is linked to a key performance indicator (KPI)

B.

It is linked to a key control indicator (KCI)

C.

It contains an objective alert threshold

D.

It aligns with industry benchmarks

Key control indicators (KCls) help to assess the effectiveness of the internal control environment PRIMARILY by:

A.

ensuring controls are operating efficiently and facilitating productivity.

B.

enabling senior leadership to better understand the level of risk the organization is facing.

C.

monitoring changes in the likelihood of adverse events due to ineffective controls.

D.

providing information on the degree to which controls are meeting intended objectives.

The risk appetite for an organization could be derived from which of the following?

A.

Cost of controls

B.

Annual loss expectancy (ALE)

C.

Inherent risk

D.

Residual risk

Which of the following is the MOST important technology control to reduce the likelihood of fraudulent payments committed internally?

A.

Automated access revocation

B.

Daily transaction reconciliation

C.

Rule-based data analytics

D.

Role-based user access model

Which of the following should be the PRIMARY driver for an organization on a multi-year cloud implementation to publish a cloud security policy?

A.

Evaluating gaps in the on-premise and cloud security profiles

B.

Establishing minimum cloud security requirements

C.

Enforcing compliance with cloud security parameters

D.

Educating IT staff on variances between on premise and cloud security

What is the MOST important consideration when aligning IT risk management with the enterprise risk management (ERM) framework?

A.

Risk and control ownership

B.

Senior management participation

C.

Business unit support

D.

Risk nomenclature and taxonomy

When reporting on the performance of an organization's control environment including which of the following would BEST inform stakeholders risk decision-making?

A.

The audit plan for the upcoming period

B.

Spend to date on mitigating control implementation

C.

A report of deficiencies noted during controls testing

D.

A status report of control deployment

The PRIMARY goal of conducting a business impact analysis (BIA) as part of an overall continuity planning process is to:

A.

obtain the support of executive management.

B.

map the business processes to supporting IT and other corporate resources.

C.

identify critical business processes and the degree of reliance on support services.

D.

document the disaster recovery process.

What are the MOST essential attributes of an effective Key control indicator (KCI)?

A.

Flexibility and adaptability

B.

Measurability and consistency

C.

Robustness and resilience

D.

Optimal cost and benefit

Which of the following approaches would BEST help to identify relevant risk scenarios?

A.

Engage line management in risk assessment workshops.

B.

Escalate the situation to risk leadership.

C.

Engage internal audit for risk assessment workshops.

D.

Review system and process documentation.

Which of the following should be done FIRST when developing a data protection management plan?

A.

Perform a cost-benefit analysis.

B.

Identify critical data.

C.

Establish a data inventory.

D.

Conduct a risk analysis.

An organization retains footage from its data center security camera for 30 days when the policy requires 90-day retention The business owner challenges whether the situation is worth remediating Which of the following is the risk manager s BEST response'

A.

Identify the regulatory bodies that may highlight this gap

B.

Highlight news articles about data breaches

C.

Evaluate the risk as a measure of probable loss

D.

Verify if competitors comply with a similar policy

Which of the following is MOST important for an organization to have in place to identify unauthorized devices on the network?

A.

A technology review and approval process

B.

An acceptable use policy

C.

An automated network scanning solution

D.

A bring your own device (BYOD) policy

Which of the blowing is MOST important when implementing an organization s security policy?

A.

Obtaining management support

B.

Benchmarking against industry standards

C.

Assessing compliance requirements

D.

Identifying threats and vulnerabilities

Which of the following is the MOST important requirement for monitoring key risk indicators (KRls) using log analysis?

A.

Obtaining logs m an easily readable format

B.

Providing accurate logs m a timely manner

C.

Collecting logs from the entire set of IT systems

D.

implementing an automated log analysis tool

Which of the following is MOST helpful in verifying that the implementation of a risk mitigation control has been completed as intended?

A.

An updated risk register

B.

Risk assessment results

C.

Technical control validation

D.

Control testing results

Which of the following is the PRIMARY objective of risk management?

A.

Identify and analyze risk.

B.

Achieve business objectives

C.

Minimi2e business disruptions.

D.

Identify threats and vulnerabilities.

When creating a program to manage data privacy risk, which of the following is MOST important to ensure that the program is successful?

A.

Compliance with industry frameworks

B.

Alignment with applicable legal and regulatory requirements

C.

Approval of mitigating and compensating controls

D.

Adoption of mission and vision statements