Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

The PRIMARY reason to have risk owners assigned to entries in the risk register is to ensure:

A.

risk is treated appropriately

B.

mitigating actions are prioritized

C.

risk entries are regularly updated

D.

risk exposure is minimized.

Who is accountable for authorizing application access in a cloud Software as a Service (SaaS) solution?

A.

Cloud service provider

B.

IT department

C.

Senior management

D.

Business unit owner

In addition to the risk register, what should a risk practitioner review to develop an understanding of the organization's risk profile?

A.

The control catalog

B.

The asset profile

C.

Business objectives

D.

Key risk indicators (KRls)

An organization has outsourced its backup and recovery procedures to a cloud service provider. The provider's controls are inadequate for the organization's level of risk tolerance. As a result, the organization has internally implemented additional backup and recovery controls. Which risk response has been adopted?

A.

Mitigation

B.

Acceptance

C.

Transfer

D.

Avoidance

The PRIMARY objective for requiring an independent review of an organization's IT risk management process should be to:

A.

assess gaps in IT risk management operations and strategic focus.

B.

confirm that IT risk assessment results are expressed as business impact.

C.

verify implemented controls to reduce the likelihood of threat materialization.

D.

ensure IT risk management is focused on mitigating potential risk.

Which of the following is MOST important to identify when developing top-down risk scenarios?

A.

Key procedure control gaps

B.

Business objectives

C.

Senior management's risk appetite

D.

Hypothetical scenarios

Which of the following is PRIMARILY a risk management responsibly of the first line of defense?

A.

Implementing risk treatment plans

B.

Validating the status of risk mitigation efforts

C.

Establishing risk policies and standards

D.

Conducting independent reviews of risk assessment results

Which of the following risk activities is BEST facilitated by enterprise architecture (EA)?

A.

Aligning business unit risk responses to organizational priorities

B.

Determining attack likelihood per business unit

C.

Adjusting business unit risk tolerances

D.

Customizing incident response plans for each business unit

Which of the following is the BEST key control indicator (KCI) for risk related to IT infrastructure failure?

A.

Number of times the recovery plan is reviewed

B.

Number of successful recovery plan tests

C.

Percentage of systems with outdated virus protection

D.

Percentage of employees who can work remotely

In an organization that allows employee use of social media accounts for work purposes, which of the following is the BEST way to protect company sensitive information from being exposed?

A.

Educating employees on what needs to be kept confidential

B.

Implementing a data loss prevention (DLP) solution

C.

Taking punitive action against employees who expose confidential data

D.

Requiring employees to sign nondisclosure agreements

Which of the following is the MAIN reason for documenting the performance of controls?

A.

Obtaining management sign-off

B.

Demonstrating effective risk mitigation

C.

Justifying return on investment

D.

Providing accurate risk reporting

Which of the following controls will BEST detect unauthorized modification of data by a database administrator?

A.

Reviewing database access rights

B.

Reviewing database activity logs

C.

Comparing data to input records

D.

Reviewing changes to edit checks

Which of the following activities would BEST contribute to promoting an organization-wide risk-aware culture?

A.

Performing a benchmark analysis and evaluating gaps

B.

Conducting risk assessments and implementing controls

C.

Communicating components of risk and their acceptable levels

D.

Participating in peer reviews and implementing best practices

The acceptance of control costs that exceed risk exposure is MOST likely an example of:

A.

low risk tolerance.

B.

corporate culture misalignment.

C.

corporate culture alignment.

D.

high risk tolerance

The PRIMARY reason to implement a formalized risk taxonomy is to:

A.

reduce subjectivity in risk management.

B.

comply with regulatory requirements.

C.

demonstrate best industry practice.

D.

improve visibility of overall risk exposure.

Which of the following factors will have the GREATEST impact on the implementation of a risk mitigation strategy for an organization?

A.

Cost-benefit analysis

B.

Risk tolerance

C.

Known vulnerabilities

D.

Cyber insurance

An organization has committed to a business initiative with the knowledge that the risk exposure is higher than the risk appetite. Which of the following is the risk practitioner's MOST important action related to this decision?

A.

Recommend rejection of the initiative.

B.

Change the level of risk appetite.

C.

Document formal acceptance of the risk.

D.

Initiate a reassessment of the risk.

An organization is making significant changes to an application. At what point should the application risk profile be updated?

A.

After user acceptance testing (UAT)

B.

Upon release to production

C.

During backlog scheduling

D.

When reviewing functional requirements

Which of the following would MOST effectively reduce the potential for inappropriate exposure of vulnerabilities documented in an organization's risk register?

A.

Limit access to senior management only.

B.

Encrypt the risk register.

C.

Implement role-based access.

D.

Require users to sign a confidentiality agreement.

During the control evaluation phase of a risk assessment, it is noted that multiple controls are ineffective. Which of the following should be the risk practitioner's FIRST course of action?

A.

Recommend risk remediation of the ineffective controls.

B.

Compare the residual risk to the current risk appetite.

C.

Determine the root cause of the control failures.

D.

Escalate the control failures to senior management.

Which of the following is MOST likely to be identified from an information systems audit report?

A.

Resiliency

B.

Regulatory requirements

C.

Data ownership

D.

Vulnerabilities

An organization has completed a project to implement encryption on all databases that host customer data. Which of the following elements of the risk register should be updated the reflect this change?

A.

Risk likelihood

B.

Inherent risk

C.

Risk appetite

D.

Risk tolerance

An internal audit report reveals that a legacy system is no longer supported Which of the following is the risk practitioner's MOST important action before recommending a risk response'

A.

Review historical application down me and frequency

B.

Assess the potential impact and cost of mitigation

C.

identify other legacy systems within the organization

D.

Explore the feasibility of replacing the legacy system

The PRIMARY reason for establishing various Threshold levels for a set of key risk indicators (KRIs) is to:

A.

highlight trends of developing risk.

B.

ensure accurate and reliable monitoring.

C.

take appropriate actions in a timely manner.

D.

set different triggers for each stakeholder.

Which of the following BEST indicates that security requirements have been incorporated into the system development life cycle (SDLC)?

A.

Comprehensive security training of developers

B.

Validated security requirements and design documents

C.

Completed user acceptance testing (UAT)

D.

Compliance with laws and regulatory requirements

A risk practitioner has collaborated with subject matter experts from the IT department to develop a large list of potential key risk indicators (KRIs) for all IT operations within theorganization of the following, who should review the completed list and select the appropriate KRIs for implementation?

A.

IT security managers

B.

IT control owners

C.

IT auditors

D.

IT risk owners

A risk practitioner is summarizing the results of a high-profile risk assessment sponsored by senior management. The BEST way to support risk-based decisions by senior management would be to:

A.

map findings to objectives.

B.

provide quantified detailed analysis

C.

recommend risk tolerance thresholds.

D.

quantify key risk indicators (KRls).

Which of the following roles is BEST suited to help a risk practitioner understand the impact of IT-related events on business objectives?

A.

IT management

B.

Internal audit

C.

Process owners

D.

Senior management

A risk practitioner is reviewing accountability assignments for data risk in the risk register. Which of the following would pose the GREATEST concern?

A.

The risk owner is not the control owner for associated data controls.

B.

The risk owner is in a business unit and does not report through the IT department.

C.

The risk owner is listed as the department responsible for decision-making.

D.

The risk owner is a staff member rather than a department manager.

Which of the following would be the BEST justification to invest in the development of a governance, risk, and compliance (GRC) solution?

A.

Facilitating risk-aware decision making by stakeholders

B.

Demonstrating management commitment to mitigate risk

C.

Closing audit findings on a timely basis

D.

Ensuring compliance to industry standards

Which of the following is MOST helpful in identifying gaps between the current and desired state of the IT risk environment?

A.

Analyzing risk appetite and tolerance levels

B.

Assessing identified risk and recording results in the risk register

C.

Evaluating risk scenarios and assessing current controls

D.

Reviewing guidance from industry best practices and standards

Which of the following can be interpreted from a single data point on a risk heat map?

A.

Risk tolerance

B.

Risk magnitude

C.

Risk response

D.

Risk appetite

Which of the following is the MOST important consideration for effectively maintaining a risk register?

A.

An IT owner is assigned for each risk scenario.

B.

The register is updated frequently.

C.

The register is shared with executive management.

D.

Compensating controls are identified.

An organization is considering allowing users to access company data from their personal devices. Which of the following is the MOST important factor when assessing the risk?

A.

Classification of the data

B.

Type of device

C.

Remote management capabilities

D.

Volume of data

Which organizational role should be accountable for ensuring information assets are appropriately classified?

A.

Data protection officer

B.

Chief information officer (CIO)

C.

Information asset custodian

D.

Information asset owner

An application owner has specified the acceptable downtime in the event of an incident to be much lower than the actual time required for the response team to recover the application. Which of the following should be the NEXT course of action?

A.

Invoke the disaster recovery plan during an incident.

B.

Prepare a cost-benefit analysis of alternatives available

C.

Implement redundant infrastructure for the application.

D.

Reduce the recovery time by strengthening the response team.

An organization is concerned that a change in its market situation may impact the current level of acceptable risk for senior management. As a result, which of the following is MOST important to reevaluate?

A.

Risk classification

B.

Risk policy

C.

Risk strategy

D.

Risk appetite

Which of the following would be MOST relevant to stakeholders regarding ineffective control implementation?

A.

Threat to IT

B.

Number of control failures

C.

Impact on business

D.

Risk ownership

Which of the following would provide the MOST comprehensive information for updating an organization's risk register?

A.

Results of the latest risk assessment

B.

Results of a risk forecasting analysis

C.

A review of compliance regulations

D.

Findings of the most recent audit

Which of the following provides the MOST important information to facilitate a risk response decision?

A.

Audit findings

B.

Risk appetite

C.

Key risk indicators

D.

Industry best practices

Which of the following is the MOST significant indicator of the need to perform a penetration test?

A.

An increase in the number of high-risk audit findings

B.

An increase in the number of security incidents

C.

An increase in the percentage of turnover in IT personnel

D.

An increase in the number of infrastructure changes

An organization is planning to engage a cloud-based service provider for some of its data-intensive business processes. Which of the following is MOST important to help define the IT risk associated with this outsourcing activity?

A.

Service level agreement

B.

Customer service reviews

C.

Scope of services provided

D.

Right to audit the provider

Which of the following is the MOST likely reason an organization would engage an independent reviewer to assess its IT risk management program?

A.

To ensure IT risk management is focused on mitigating emerging risk

B.

To confirm that IT risk assessment results are expressed in quantitative terms

C.

To evaluate threats to the organization's operations and strategy

D.

To identify gaps in the alignment of IT risk management processes and strategy

The BEST way for management to validate whether risk response activities have been completed is to review:

A.

the risk register change log.

B.

evidence of risk acceptance.

C.

control effectiveness test results.

D.

control design documentation.

Which of the following is MOST helpful to review when identifying risk scenarios associated with the adoption of Internet of Things (loT) technology in an organization?

A.

The business case for the use of loT

B.

The loT threat landscape

C.

Policy development for loT

D.

The network that loT devices can access

An organization has completed a risk assessment of one of its service providers. Who should be accountable for ensuring that risk responses are implemented?

A.

IT risk practitioner

B.

Third -partf3ecurity team

C.

The relationship owner

D.

Legal representation of the business

Which of the following will BEST help mitigate the risk associated with malicious functionality in outsourced application development?

A.

Perform an in-depth code review with an expert

B.

Validate functionality by running in a test environment

C.

Implement a service level agreement.

D.

Utilize the change management process.

Which of the following is a drawback in the use of quantitative risk analysis?

A.

It assigns numeric values to exposures of assets.

B.

It requires more resources than other methods

C.

It produces the results in numeric form.

D.

It is based on impact analysis of information assets.

To enable effective integration of IT risk scenarios and enterprise risk management (ERM), it is MOST important to have a consistent approach to reporting:

A.

Key risk indicators (KRIs).

B.

Risk velocity.

C.

Risk response plans and owners.

D.

Risk impact and likelihood.

Which risk analysis methodology uses diagrams to analyze causes and consequences of particular risk events?

A.

Failure mode and effects analysis

B.

Process and control mapping

C.

Monte Carlo simulation

D.

Fault tree analysis