Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

Of the following, who is BEST suited to be responsible for continuous monitoring of risk?

A.

Chief risk officer (CRO)

B.

Risk analysts

C.

Risk owners

Which of the following is the MOST important aspect of key performance indicators (KPIs)?

A.

KPIs identify underperforming assets that may impact the achievement of operational goals.

B.

KPIs provide inputs for monitoring the usage of IT assets to determine return on investment (ROI).

C.

KPIs aid management in monitoring the organization's IT infrastructure capacity.

Detailed risk management reports should be targeted to a specific audience based on:

A.

need to know.

B.

industry benchmarks.

C.

seniority levels in the enterprise.

A risk practitioner has been tasked with analyzing new risk events added to the risk register. Which of the following analysis methods would BEST enable the risk practitioner to minimize ambiguity and subjectivity?

A.

Annual loss expectancy (ALE)

B.

Delphi method

C.

Brainstorming

In the context of enterprise risk management (ERM), what is the overall role of l&T risk management stakeholders?

A.

Stakeholders set direction and provide support for risk management practices.

B.

Stakeholders are accountable for all risk management activities within an enterprise.

C.

Stakeholders are responsible for protecting enterprise assets to achieve business objectives.

Which of the following provides the MOST important input for analyzing I&T-related risk?

A.

Information about market trends and technology evolution

B.

Information about past incidents, frequency, and loss to the organization

C.

Information about threats and vulnerabilities

Which of the following BEST supports a risk-aware culture within an enterprise?

A.

Risk issues and negative outcomes are only shared within a department.

B.

The enterprise risk management (ERM) function manages all risk-related activities.

C.

Risk is identified, documented, and discussed to make business decisions.

Which of the following is the PRIMARY reason for an organization to monitor and review l&T-related risk periodically?

A.

To address changes in external and internal risk factors

B.

To ensure risk is managed within acceptable limits

C.

To facilitate the timely identification and replacement of legacy IT assets

Which of the following is the MAIN reason to conduct a penetration test?

A.

To validate the results of a vulnerability assessment

B.

To validate the results of a control self-assessment

C.

To validate the results of a threat assessment

What is the basis for determining the sensitivity of an IT asset?

A.

Potential damage to the business due to unauthorized disclosure

B.

Cost to replace the asset if lost, damaged, or deemed obsolete

C.

Importance of the asset to the business