Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: exc65

An alert generated when network bandwidth usage exceeds a predefined level is an example of a:

A.

threat.

B.

risk event.

C.

lag indicator.

D.

key risk indicator (KRI).

Which of the following is MOST important to include when developing a business case for a specific risk response?

A.

Stakeholders responsible for the risk response plan

B.

Communication and status reporting of the related risk

C.

A justification for the expense of the investment

The MOST important reason for developing and monitoring key risk indicators (KRIs) is that they provide:

A.

measurable metrics for acceptable risk levels.

B.

information about control compliance.

C.

an early warning of possible risk materialization.

Which of the following is of GREATEST concern when aggregating risk information in management reports?

A.

Duplicating details of risk status

B.

Obfuscating the reasons behind risk

C.

Generalizing acceptable risk levels

If the residual risk associated with a particular control is within the enterprise risk appetite, the residual risk should be:

A.

accepted and updated in the risk register.

B.

mitigated through additional controls.

C.

transferred and managed by a third party.

Which of the following presents the GREATEST risk for the continued existence of an enterprise?

A.

When its risk appetite and tolerance are reviewed annually

B.

When its actual risk eventually exceeds organizational risk appetite

C.

When its risk appetite and actual risk exceed its risk capacity

To be effective, risk reporting and communication should provide:

A.

risk reports to each business unit and groups of employees.

B.

the same risk information for each decision-making stakeholder.

C.

stakeholders with concise information focused on key points.

Risk analysis makes it easier to communicate impact in terms of:

A.

criticality of I&T assets.

B.

lost productivity.

C.

reputational damage.

Which of the following risk response strategies involves the implementation of new controls?

A.

Mitigation

B.

Avoidance

C.

Acceptance

What is the FIRST step in the risk response process?

A.

Prioritize responses based on impact.

B.

Review risk analysis.

C.

Review risk appetite.