Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

Which of the following BEST enables a risk practitioner to focus on risk factors that could potentially affect the results of an IT initiative?

A.

Prioritizing threats and controls

B.

Assessing trends in quantitative risk analysis results

C.

Measuring and reporting qualitative risk trends

D.

Conducting stakeholder surveys

An organization has identified that terminated employee accounts are not disabled or deleted within the time required by corporate policy. Unsure of the reason, the organization has decided to monitor the situation for three months to obtain more information. As a result of this decision, the risk has been:

A.

avoided.

B.

accepted.

C.

mitigated.

D.

transferred.

Which of the following would be the GREATEST challenge when implementing a corporate risk framework for a global organization?

A.

Privacy risk controls

B.

Business continuity

C.

Risk taxonomy

D.

Management support

Which of the following is the GREATEST impact of implementing a risk mitigation strategy?

A.

Improved alignment with business goals.

B.

Reduction of residual risk.

C.

Increased costs due to control implementation.

D.

Decreased overall risk appetite.

Which of the following is the MOST effective way to help ensure future risk levels do not exceed the organization's risk appetite?

A.

Developing contingency plans for key processes

B.

Implementing key performance indicators (KPIs)

C.

Adding risk triggers to entries in the risk register

D.

Establishing a series of key risk indicators (KRIs)

The BEST key performance indicator (KPI) for monitoring adherence to an organization's user accounts provisioning practices is the percentage of:

A.

accounts without documented approval

B.

user accounts with default passwords

C.

active accounts belonging to former personnel

D.

accounts with dormant activity.

Which of the following is MOST important to ensure before using risk reports in decision making?

A.

Root cause analysis is included.

B.

Risk analysis results are validated.

C.

Real-time risk information is provided.

D.

Quantitative risk data is provided.

Which strategy employed by risk management would BEST help to prevent internal fraud?

A.

Require control owners to conduct an annual control certification.

B.

Conduct regular internal and external audits on the systems supporting financial reporting.

C.

Ensure segregation of duties are implemented within key systems or processes.

D.

Require the information security officer to review unresolved incidents.

Which of the following is MOST useful input when developing risk scenarios?

A.

Common attacks in other industries.

B.

Identification of risk events.

C.

Impact on critical assets.

D.

Probability of disruptive risk events.

A risk practitioner implemented a process to notify management of emergency changes that may not be approved. Which of the following is the BEST way to provide this information to management?

A.

Change logs

B.

Change management meeting minutes

C.

Key control indicators (KCIs)

D.

Key risk indicators (KRIs)

Which of the following is MOST important to consider when assessing the likelihood that a recently discovered software vulnerability will be exploited?

A.

The skill level required of a threat actor

B.

The amount of personally identifiable information (PH) disclosed

C.

The ability to detect and trace the threat action

D.

The amount of data that might be exposed by a threat action

When determining the accuracy of a key risk indicator (KRI), it is MOST important that the indicator:

A.

is correlated to risk and tracks variances in the risk.

B.

is assigned to IT processes and projects with a low level of risk.

C.

has a high correlation with the process outcome.

D.

triggers response based on risk thresholds.

Which of the following is the BEST metric to measure employee adherence to organizational security policies?

A.

Total number of security policy audit findings

B.

Total number of regulatory violations

C.

Total number of security policy exceptions

D.

Total number of opened phishing emails

An organization uses a biometric access control system for authentication and access to its server room. Which control type has been implemented?

A.

Detective

B.

Deterrent

C.

Preventive

D.

Corrective

A risk practitioner has learned that an effort to implement a risk mitigation action plan has stalled due to lack of funding. The risk practitioner should report that the associated risk has been:

A.

mitigated

B.

accepted

C.

avoided

D.

deferred

Several network user accounts were recently created without the required management approvals. Which of the following would be the risk practitioner's BEST recommendation to address this situation?

A.

Conduct a comprehensive compliance review.

B.

Develop incident response procedures for noncompliance.

C.

Investigate the root cause of noncompliance.

D.

Declare a security breach and Inform management.

An organization has opened a subsidiary in a foreign country. Which of the following would be the BEST way to measure the effectiveness of the subsidiary's IT systems controls?

A.

Implement IT systems in alignment with business objectives.

B.

Review metrics and key performance indicators (KPIs).

C.

Review design documentation of IT systems.

D.

Evaluate compliance with legal and regulatory requirements.

When an organization’s disaster recovery plan (DRP) has a reciprocal agreement, which of the following risk treatment options is being applied?

A.

Acceptance

B.

Mitigation

C.

Transfer

D.

Avoidance

An organization's internal audit department is considering the implementation of robotics process automation (RPA) to automate certain continuous auditing tasks. Who would own the risk associated with ineffective design of the software bots?

A.

Lead auditor

B.

Project manager

C.

Chief audit executive (CAE)

D.

Chief information officer (CIO)

What is the MOST important consideration when aligning IT risk management with the enterprise risk management (ERM) framework?

A.

Risk and control ownership

B.

Senior management participation

C.

Business unit support

D.

Risk nomenclature and taxonomy

Which of the following represents a vulnerability?

A.

An identity thief seeking to acquire personal financial data from an organization

B.

Media recognition of an organization's market leadership in its industry

C.

A standard procedure for applying software patches two weeks after release

D.

An employee recently fired for insubordination

Which of the following would MOST effectively reduce risk associated with an increased volume of online transactions on a retailer website?

A.

Hot backup site

B.

Transaction limits

C.

Scalable infrastructure

D.

Website activity monitoring

A multinational organization is considering implementing standard background checks to' all new employees A KEY concern regarding this approach

A.

fail to identity all relevant issues.

B.

be too costly

C.

violate laws in other countries

D.

be too line consuming

Which of the following is the MOST important reason to communicate control effectiveness to senior management?

A.

To demonstrate alignment with industry best practices

B.

To assure management that control ownership is assigned

C.

To ensure management understands the current risk status

D.

To align risk management with strategic objectives

A hospital recently implemented a new technology to allow virtual patient appointments. Which of the following should be the risk practitioner's FIRST course of action?

A.

Reassess the risk profile.

B.

Modify the risk taxonomy.

C.

Increase the risk tolerance.

D.

Review the risk culture.

Who is MOST likely to be responsible for the coordination between the IT risk strategy and the business risk strategy?

A.

Chief financial officer

B.

Information security director

C.

Internal audit director

D.

Chief information officer

A multinational company needs to implement a new centralized security system. The risk practitioner has identified a conflict between the organization's data-handling policy and local privacy regulations. Which of the following would be the BEST recommendation?

A.

Request a policy exception from senior management.

B.

Comply with the organizational policy.

C.

Report the noncompliance to the local regulatory agency.

D.

Request an exception from the local regulatory agency.

Which of the following is a risk practitioner's BEST course of action after identifying risk scenarios related to noncompliance with new industry regulations?

A.

Escalate to senior management.

B.

Transfer the risk.

C.

Implement monitoring controls.

D.

Recalculate the risk.

Which of the following is the MOST important consideration when identifying stakeholders to review risk scenarios developed by a risk analyst? The reviewers are:

A.

accountable for the affected processes.

B.

members of senior management.

C.

authorized to select risk mitigation options.

D.

independent from the business operations.

Which of the following is the PRIMARY benefit when senior management periodically reviews and updates risk appetite and tolerance levels?

A.

It ensures compliance with the risk management framework.

B.

It ensures an effective risk aggregation process.

C.

It ensures decisions are risk-informed.

D.

It ensures a consistent approach for risk assessments.

Which of the following should be done FIRST when a new risk scenario has been identified

A.

Estimate the residual risk.

B.

Establish key risk indicators (KRIs).

C.

Design control improvements.

D.

Identify the risk owner.

A risk practitioner recently discovered that personal information from the production environment is required for testing purposes in non-production environments. Which of the following is the BEST recommendation to address this situation?

A.

Enable data encryption in the test environment.

B.

Prevent the use of production data in the test environment

C.

De-identify data before being transferred to the test environment.

D.

Enforce multi-factor authentication within the test environment.

Which of the following should be the risk practitioner s PRIMARY focus when determining whether controls are adequate to mitigate risk?

A.

Sensitivity analysis

B.

Level of residual risk

C.

Cost-benefit analysis

D.

Risk appetite

Reviewing results from which of the following is the BEST way to identify information systems control deficiencies?

A.

Vulnerability and threat analysis

B.

Control remediation planning

C.

User acceptance testing (UAT)

D.

Control self-assessment (CSA)

A risk practitioner has just learned about new done FIRST?

A.

Notify executive management.

B.

Analyze the impact to the organization.

C.

Update the IT risk register.

D.

Design IT risk mitigation plans.

A risk practitioner has learned that the number of emergency change management tickets without subsequent approval has doubled from the same period of the previous year. Which of the following is the MOST important action for the risk practitioner to take?

A.

Review the cause of the control failure.

B.

Temporarily suspend emergency changes.

C.

Recommend remedial training.

D.

Initiate a review of the change management process.

Which of the following BEST facilitates the development of effective IT risk scenarios?

A.

Utilization of a cross-functional team

B.

Participation by IT subject matter experts

C.

Integration of contingency planning

D.

Validation by senior management

Which of the following provides the BEST assurance of…..

A.

Penetration testing

B.

Service-level monitoring

C.

Service provider's control self-assessment (CSA)

D.

Independent assessment report

Who should be responsible for approving the cost of controls to be implemented for mitigating risk?

A.

Risk practitioner

B.

Risk owner

C.

Control owner

D.

Control implementer

When evaluating enterprise IT risk management it is MOST important to:

A.

create new control processes to reduce identified IT risk scenarios

B.

confirm the organization’s risk appetite and tolerance

C.

report identified IT risk scenarios to senior management

D.

review alignment with the organization's investment plan

A risk practitioner has been asked by executives to explain how existing risk treatment plans would affect risk posture at the end of the year. Which of the following is MOST helpful in responding to this request?

A.

Assessing risk with no controls in place

B.

Showing projected residual risk

C.

Providing peer benchmarking results

D.

Assessing risk with current controls in place

Which of the following is the BEST way to maintain a current list of organizational risk scenarios?

A.

Automate workflow for risk status updates.

B.

Perform regular reviews of key controls.

C.

Conduct periodic risk reviews with stakeholders.

D.

Conduct compliance reviews.

The PRIMARY purpose of using control metrics is to evaluate the:

A.

amount of risk reduced by compensating controls.

B.

amount of risk present in the organization.

C.

variance against objectives.

D.

number of incidents.

Which of the following is the MOST efficient method for monitoring control effectiveness?

A.

Conduct control self-assessments (CSAs)

B.

Review system performance logs

C.

Compare controls to business metrics

D.

Perform independent periodic control testing

Which of the following is the BEST indicator of the effectiveness of a control monitoring program?

A.

Time between control failure and failure detection

B.

Number of key controls as a percentage of total control count

C.

Time spent on internal control assessment reviews

D.

Number of internal control failures within the measurement period

Which of the following provides the MOST useful information when developing a risk profile for management approval?

A.

Residual risk and risk appetite

B.

Strength of detective and preventative controls

C.

Effectiveness and efficiency of controls

D.

Inherent risk and risk tolerance

Which of the following is the MOST important consideration when selecting key risk indicators (KRIs) to monitor risk trends over time?

A.

Ongoing availability of data

B.

Ability to aggregate data

C.

Ability to predict trends

D.

Availability of automated reporting systems

A control process has been implemented in response to a new regulatory requirement, but has significantly reduced productivity. Which of the following is the BEST way to resolve this concern?

A.

Absorb the loss in productivity.

B.

Request a waiver to the requirements.

C.

Escalate the issue to senior management

D.

Remove the control to accommodate business objectives.

Which of the following presents the GREATEST security risk associated with Internet of Things (IoT) technology?

A.

The inability to monitor via network management solutions

B.

The lack of relevant IoT security frameworks to guide the risk assessment process

C.

The heightened level of IoT threats via the widespread use of smart devices

D.

The lack of updates for vulnerable firmware

From a business perspective, which of the following is the MOST important objective of a disaster recovery test?

A.

The organization gains assurance it can recover from a disaster

B.

Errors are discovered in the disaster recovery process.

C.

All business-critical systems are successfully tested.

D.

All critical data is recovered within recovery time objectives (RTOs).