Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

For risk reporting to adequately reflect current risk management capabilities, the risk report should be based on the enterprise:

A.

risk management framework.

B.

risk profile.

C.

risk appetite.

Which of the following is MOST likely to expose an organization to adverse threats?

A.

Complex enterprise architecture

B.

Improperly configured network devices

C.

Incomplete cybersecurity training records

Which of the following is a valid source or basis for selecting key risk indicators (KRIs)?

A.

Historical enterprise risk metrics

B.

Risk workshop brainstorming

C.

External threat reporting services

Which of the following risk analysis methods gathers different types of potential risk ideas to be validated and ranked by an individual or small groups during interviews?

A.

Brainstorming model

B.

Delphi technique

C.

Monte Cado analysis

What is the purpose of a control objective?

A.

To describe the result of protecting an asset for a business process

B.

To describe the risk of loss to an asset

C.

To describe the responsibility of stakeholders to protect assets

Which of the following is the MOST likely reason that a list of control deficiencies identified in a recent security assessment would be excluded from an IT risk register?

A.

The deficiencies have no business relevance.

B.

The deficiencies are actual misconfigurations.

C.

The deficiencies have already been resolved.

Which of the following is considered an exploit event?

A.

An attacker takes advantage of a vulnerability

B.

Any event that is verified as a security breach

C.

The actual occurrence of an adverse event

Which of the following is the MOST useful information to include in a risk report to indicate control effectiveness?

A.

Whether the controls are functioning properly to reduce risk to acceptable levels

B.

Whether metrics to monitor control performance align with risk management standards

C.

Whether external audits confirm the same control deficiencies as reported by internal audit

Which of the following is the MAIN reason to include previously overlooked risk in a risk report?

A.

Assurance is needed that the risk dashboard is complete and comprehensive.

B.

Overlooked or ignored risk may become relevant in the future.

C.

The risk report must contain the current state of all risk.

Which of the following would have the MOST impact on the accuracy and appropriateness of plans associated with business continuity and disaster recovery?

A.

Material updates to the incident response plan

B.

Data backups being moved to the cloud

C.

Changes to the business impact assessment (BIA)