Summer Special Discount 60% Offer - Ends in 0d 00h 00m 00s - Coupon code: brite60

Certified in Risk and Information Systems Control (CRISC) Question and Answers

Certified in Risk and Information Systems Control (CRISC)

Last Update Apr 15, 2024
Total Questions : 1197

We are offering FREE CRISC Isaca exam questions. All you do is to just go and sign up. Give your details, prepare CRISC free exam questions and then go for complete pool of Certified in Risk and Information Systems Control (CRISC) test questions that will help you more.

CRISC pdf

CRISC PDF

$40  $99.99
CRISC Engine

CRISC Testing Engine

$48  $119.99
CRISC PDF + Engine

CRISC PDF + Testing Engine

$64  $159.99
Questions 1

Which of the following is the BEST metric to demonstrate the effectiveness of an organization's change management process?

Options:

A.  

Increase in the frequency of changes

B.  

Percent of unauthorized changes

C.  

Increase in the number of emergency changes

D.  

Average time to complete changes

Discussion 0
Questions 2

Which of the following is the MOST important foundational element of an effective three lines of defense model for an organization?

Options:

A.  

A robust risk aggregation tool set

B.  

Clearly defined roles and responsibilities

C.  

A well-established risk management committee

D.  

Well-documented and communicated escalation procedures

Discussion 0
Questions 3

An organization has determined a risk scenario is outside the defined risk tolerance level. What should be the NEXT course of action?

Options:

A.  

Develop a compensating control.

B.  

Allocate remediation resources.

C.  

Perform a cost-benefit analysis.

D.  

Identify risk responses

Discussion 0
Questions 4

Which of the following would be MOST helpful when estimating the likelihood of negative events?

Options:

A.  

Business impact analysis

B.  

Threat analysis

C.  

Risk response analysis

D.  

Cost-benefit analysis

Discussion 0
Questions 5

Which of the following will BEST quantify the risk associated with malicious users in an organization?

Options:

A.  

Business impact analysis

B.  

Risk analysis

C.  

Threat risk assessment

D.  

Vulnerability assessment

Discussion 0
Questions 6

Which of the following should be the PRIMARY consideration when assessing the automation of control monitoring?

Options:

A.  

impact due to failure of control

B.  

Frequency of failure of control

C.  

Contingency plan for residual risk

D.  

Cost-benefit analysis of automation

Discussion 0
Questions 7

Which of the following is the BEST indication of an improved risk-aware culture following the implementation of a security awareness training program for all employees?

Options:

A.  

A reduction in the number of help desk calls

B.  

An increase in the number of identified system flaws

C.  

A reduction in the number of user access resets

D.  

An increase in the number of incidents reported

Discussion 0
Questions 8

A risk practitioner is organizing a training session lo communicate risk assessment methodologies to ensure a consistent risk view within the organization Which of the following i< the MOST important topic to cover in this training?

Options:

A.  

Applying risk appetite

B.  

Applying risk factors

C.  

Referencing risk event data

D.  

Understanding risk culture

Discussion 0
Questions 9

Which of the following is the PRIMARY factor in determining a recovery time objective (RTO)?

Options:

A.  

Cost of offsite backup premises

B.  

Cost of downtime due to a disaster

C.  

Cost of testing the business continuity plan

D.  

Response time of the emergency action plan

Discussion 0
Questions 10

An organization that has been the subject of multiple social engineering attacks is developing a risk awareness program. The PRIMARY goal of this program should be to:

Options:

A.  

reduce the risk to an acceptable level.

B.  

communicate the consequences for violations.

C.  

implement industry best practices.

D.  

reduce the organization's risk appetite

Discussion 0
Questions 11

A data processing center operates in a jurisdiction where new regulations have significantly increased penalties for data breaches. Which of the following elements of the risk register is MOST important to update to reflect this change?

Options:

A.  

Risk impact

B.  

Risk trend

C.  

Risk appetite

D.  

Risk likelihood

Discussion 0
Questions 12

A risk practitioner discovers several key documents detailing the design of a product currently in development have been posted on the Internet. What should be the risk practitioner's FIRST course of action?

Options:

A.  

invoke the established incident response plan.

B.  

Inform internal audit.

C.  

Perform a root cause analysis

D.  

Conduct an immediate risk assessment

Discussion 0
Questions 13

Which of the following is MOST critical when designing controls?

Options:

A.  

Involvement of internal audit

B.  

Involvement of process owner

C.  

Quantitative impact of the risk

D.  

Identification of key risk indicators

Discussion 0
Questions 14

A risk practitioner is summarizing the results of a high-profile risk assessment sponsored by senior management. The BEST way to support risk-based decisions by senior management would be to:

Options:

A.  

map findings to objectives.

B.  

provide a quantified detailed analysts.

C.  

recommend risk tolerance thresholds.

D.  

quantify key risk indicators (KRls).

Discussion 0
Questions 15

A risk practitioners PRIMARY focus when validating a risk response action plan should be that risk response:

Options:

A.  

reduces risk to an acceptable level

B.  

quantifies risk impact

C.  

aligns with business strategy

D.  

advances business objectives.

Discussion 0
Questions 16

A key risk indicator (KRI) is reported to senior management on a periodic basis as exceeding thresholds, but each time senior management has decided to take no action to reduce the risk. Which of the following is the MOST likely reason for senior management's response?

Options:

A.  

The underlying data source for the KRI is using inaccurate data and needs to be corrected.

B.  

The KRI is not providing useful information and should be removed from the KRI inventory.

C.  

The KRI threshold needs to be revised to better align with the organization s risk appetite

D.  

Senior management does not understand the KRI and should undergo risk training.

Discussion 0
Questions 17

Numerous media reports indicate a recently discovered technical vulnerability is being actively exploited. Which of the following would be the BEST response to this scenario?

Options:

A.  

Assess the vulnerability management process.

B.  

Conduct a control serf-assessment.

C.  

Conduct a vulnerability assessment.

D.  

Reassess the inherent risk of the target.

Discussion 0
Questions 18

Which of the following is the BEST method to maintain a common view of IT risk within an organization?

Options:

A.  

Collecting data for IT risk assessment

B.  

Establishing and communicating the IT risk profile

C.  

Utilizing a balanced scorecard

D.  

Performing and publishing an IT risk analysis

Discussion 0
Questions 19

An organization's recovery team is attempting to recover critical data backups following a major flood in its data center. However, key team members do not know exactly what steps should be taken to address this crisis. Which of the following is the MOST likely cause of this situation?

Options:

A.  

Failure to test the disaster recovery plan (DRP)

B.  

Lack of well-documented business impact analysis (BIA)

C.  

Lack of annual updates to the disaster recovery plan (DRP)

D.  

Significant changes in management personnel

Discussion 0
Questions 20

Which of the following would be of GREATEST concern regarding an organization's asset management?

Options:

A.  

Lack of a mature records management program

B.  

Lack of a dedicated asset management team

C.  

Decentralized asset lists

D.  

Incomplete asset inventory

Discussion 0
Questions 21

When evaluating a number of potential controls for treating risk, it is MOST important to consider:

Options:

A.  

risk appetite and control efficiency.

B.  

inherent risk and control effectiveness.

C.  

residual risk and cost of control.

D.  

risk tolerance and control complexity.

Discussion 0
Questions 22

A failed IT system upgrade project has resulted in the corruption of an organization's asset inventory database. Which of the following controls BEST mitigates the impact of this incident?

Options:

A.  

Encryption

B.  

Authentication

C.  

Configuration

D.  

Backups

Discussion 0
Questions 23

Which of the following is the MOST important consideration when developing risk strategies?

Options:

A.  

Organization's industry sector

B.  

Long-term organizational goals

C.  

Concerns of the business process owners

D.  

History of risk events

Discussion 0
Questions 24

An organization plans to implement a new Software as a Service (SaaS) speech-to-text solution Which of the following is MOST important to mitigate risk associated with data privacy?

Options:

A.  

Secure encryption protocols are utilized.

B.  

Multi-factor authentication is set up for users.

C.  

The solution architecture is approved by IT.

D.  

A risk transfer clause is included in the contact

Discussion 0
Questions 25

Which of the following is the GREATEST benefit of a three lines of defense structure?

Options:

A.  

An effective risk culture that empowers employees to report risk

B.  

Effective segregation of duties to prevent internal fraud

C.  

Clear accountability for risk management processes

D.  

Improved effectiveness and efficiency of business operations

Discussion 0
Questions 26

A risk practitioner is reviewing accountability assignments for data risk in the risk register. Which of the following would pose the GREATEST concern?

Options:

A.  

The risk owner is not the control owner for associated data controls.

B.  

The risk owner is in a business unit and does not report through the IT department.

C.  

The risk owner is listed as the department responsible for decision making.

D.  

The risk owner is a staff member rather than a department manager.

Discussion 0
Questions 27

Which of the following would be a risk practitioner's BEST course of action when a project team has accepted a risk outside the established risk appetite?

Options:

A.  

Reject the risk acceptance and require mitigating controls.

B.  

Monitor the residual risk level of the accepted risk.

C.  

Escalate the risk decision to the project sponsor for review.

D.  

Document the risk decision in the project risk register.

Discussion 0
Questions 28

Who is MOST appropriate to be assigned ownership of a control

Options:

A.  

The individual responsible for control operation

B.  

The individual informed of the control effectiveness

C.  

The individual responsible for resting the control

D.  

The individual accountable for monitoring control effectiveness

Discussion 0
Questions 29

Which of the following is MOST important to update when an organization's risk appetite changes?

Options:

A.  

Key risk indicators (KRIs)

B.  

Risk reporting methodology

C.  

Key performance indicators (KPIs)

D.  

Risk taxonomy

Discussion 0
Questions 30

Which of the following is MOST important to consider before determining a response to a vulnerability?

Options:

A.  

The likelihood and impact of threat events

B.  

The cost to implement the risk response

C.  

Lack of data to measure threat events

D.  

Monetary value of the asset

Discussion 0
Questions 31

Which of the following contributes MOST to the effective implementation of risk responses?

Options:

A.  

Clear understanding of the risk

B.  

Comparable industry risk trends

C.  

Appropriate resources

D.  

Detailed standards and procedures

Discussion 0
Questions 32

An organization's control environment is MOST effective when:

Options:

A.  

controls perform as intended.

B.  

controls operate efficiently.

C.  

controls are implemented consistent

D.  

control designs are reviewed periodically

Discussion 0
Questions 33

Which of the following BEST enables effective IT control implementation?

Options:

A.  

Key risk indicators (KRIs)

B.  

Documented procedures

C.  

Information security policies

D.  

Information security standards

Discussion 0
Questions 34

Which of the following is MOST helpful in providing a high-level overview of current IT risk severity*?

Options:

A.  

Risk mitigation plans

B.  

heat map

C.  

Risk appetite statement

D.  

Key risk indicators (KRls)

Discussion 0
Questions 35

Which of the following sources is MOST relevant to reference when updating security awareness training materials?

Options:

A.  

Risk management framework

B.  

Risk register

C.  

Global security standards

D.  

Recent security incidents reported by competitors

Discussion 0
Questions 36

An organization is planning to move its application infrastructure from on-premises to the cloud. Which of the following is the BEST course of the actin to address the risk associated with data transfer if the relationship is terminated with the vendor?

Options:

A.  

Meet with the business leaders to ensure the classification of their transferred data is in place

B.  

Ensure the language in the contract explicitly states who is accountable for each step of the data transfer process

C.  

Collect requirements for the environment to ensure the infrastructure as a service (IaaS) is configured appropriately.

D.  

Work closely with the information security officer to ensure the company has the proper security controls in place.

Discussion 0
Questions 37

An organization is considering the adoption of an aggressive business strategy to achieve desired growth From a risk management perspective what should the risk practitioner do NEXT?

Options:

A.  

Identify new threats resorting from the new business strategy

B.  

Update risk awareness training to reflect current levels of risk appetite and tolerance

C.  

Inform the board of potential risk scenarios associated with aggressive business strategies

D.  

Increase the scale for measuring impact due to threat materialization

Discussion 0
Questions 38

Which of the following is the PRIMARY reason to engage business unit managers in risk management processes'?

Options:

A.  

Improved alignment will technical risk

B.  

Better-informed business decisions

C.  

Enhanced understanding of enterprise architecture (EA)

D.  

Improved business operations efficiency

Discussion 0
Questions 39

A poster has been displayed in a data center that reads. "Anyone caught taking photographs in the data center may be subject to disciplinary action." Which of the following control types has been implemented?

Options:

A.  

Corrective

B.  

Detective

C.  

Deterrent

D.  

Preventative

Discussion 0
Questions 40

When confirming whether implemented controls are operating effectively, which of the following is MOST important to review?

Options:

A.  

Results of benchmarking studies

B.  

Results of risk assessments

C.  

Number of emergency change requests

D.  

Maturity model

Discussion 0
Questions 41

Senior management is deciding whether to share confidential data with the organization's business partners. The BEST course of action for a risk practitioner would be to submit a report to senior management containing the:

Options:

A.  

possible risk and suggested mitigation plans.

B.  

design of controls to encrypt the data to be shared.

C.  

project plan for classification of the data.

D.  

summary of data protection and privacy legislation.

Discussion 0
Questions 42

Which of the following issues found during the review of a newly created disaster recovery plan (DRP) should be of MOST concern?

Options:

A.  

Some critical business applications are not included in the plan

B.  

Several recovery activities will be outsourced

C.  

The plan is not based on an internationally recognized framework

D.  

The chief information security officer (CISO) has not approved the plan

Discussion 0
Questions 43

Which of the following is PRIMARILY a risk management responsibly of the first line of defense?

Options:

A.  

Implementing risk treatment plans

B.  

Validating the status of risk mitigation efforts

C.  

Establishing risk policies and standards

D.  

Conducting independent reviews of risk assessment results

Discussion 0
Questions 44

Which of the following key performance indicators (KPis) would BEST measure me risk of a service outage when using a Software as a Service (SaaS) vendors

Options:

A.  

Frequency of business continuity plan (BCP) lasting

B.  

Frequency and number of new software releases

C.  

Frequency and duration of unplanned downtime

D.  

Number of IT support staff available after business hours

Discussion 0
Questions 45

When classifying and prioritizing risk responses, the areas to address FIRST are those with:

Options:

A.  

low cost effectiveness ratios and high risk levels

B.  

high cost effectiveness ratios and low risk levels.

C.  

high cost effectiveness ratios and high risk levels

D.  

low cost effectiveness ratios and low risk levels.

Discussion 0
Questions 46

it was determined that replication of a critical database used by two business units failed. Which of the following should be of GREATEST concern1?

Options:

A.  

The underutilization of the replicated Iink

B.  

The cost of recovering the data

C.  

The lack of integrity of data

D.  

The loss of data confidentiality

Discussion 0
Questions 47

An organization has made a decision to purchase a new IT system. During when phase of the system development life cycle (SDLC) will identified risk MOST likely lead to architecture and design trade-offs?

Options:

A.  

Acquisition

B.  

Implementation

C.  

Initiation

D.  

Operation and maintenance

Discussion 0
Questions 48

Which of the following should be a risk practitioner's NEXT step after learning of an incident that has affected a competitor?

Options:

A.  

Activate the incident response plan.

B.  

Implement compensating controls.

C.  

Update the risk register.

D.  

Develop risk scenarios.

Discussion 0
Questions 49

Who is the BEST person to the employee personal data?

Options:

A.  

Human resources (HR) manager

B.  

System administrator

C.  

Data privacy manager

D.  

Compliance manager

Discussion 0
Questions 50

Which of the following is the BEST control to minimize the risk associated with scope creep in software development?

Options:

A.  

An established process for project change management

B.  

Retention of test data and results for review purposes

C.  

Business managements review of functional requirements

D.  

Segregation between development, test, and production

Discussion 0
Questions 51

An organization has completed a risk assessment of one of its service providers. Who should be accountable for ensuring that risk responses are implemented?

Options:

A.  

IT risk practitioner

B.  

Third -partf3ecurity team

C.  

The relationship owner

D.  

Legal representation of the business

Discussion 0
Questions 52

Which of the following would be of MOST concern to a risk practitioner reviewing risk action plans for documented IT risk scenarios?

Options:

A.  

Individuals outside IT are managing action plans for the risk scenarios.

B.  

Target dates for completion are missing from some action plans.

C.  

Senior management approved multiple changes to several action plans.

D.  

Many action plans were discontinued after senior management accepted the risk.

Discussion 0
Questions 53

Which of the following is MOST important to promoting a risk-aware culture?

Options:

A.  

Regular testing of risk controls

B.  

Communication of audit findings

C.  

Procedures for security monitoring

D.  

Open communication of risk reporting

Discussion 0
Questions 54

Which of the following is the MOST important reason to validate that risk responses have been executed as outlined in the risk response plan''

Options:

A.  

To ensure completion of the risk assessment cycle

B.  

To ensure controls arc operating effectively

C.  

To ensure residual risk Is at an acceptable level

D.  

To ensure control costs do not exceed benefits

Discussion 0
Questions 55

When performing a risk assessment of a new service to support a core business process, which of the following should be done FIRST to ensure continuity of operations?

Options:

A.  

Define metrics for restoring availability.

B.  

Identify conditions that may cause disruptions.

C.  

Review incident response procedures.

D.  

Evaluate the probability of risk events.

Discussion 0
Questions 56

An organization has been experiencing an increasing number of spear phishing attacks Which of the following would be the MOST effective way to mitigate the risk associated with these attacks?

Options:

A.  

Update firewall configuration

B.  

Require strong password complexity

C.  

implement a security awareness program

D.  

Implement two-factor authentication

Discussion 0
Questions 57

Which of the following management action will MOST likely change the likelihood rating of a risk scenario related to remote network access?

Options:

A.  

Updating the organizational policy for remote access

B.  

Creating metrics to track remote connections

C.  

Implementing multi-factor authentication

D.  

Updating remote desktop software

Discussion 0
Questions 58

Which of the following will BEST ensure that controls adequately support business goals and objectives?

Options:

A.  

Using the risk management process

B.  

Enforcing strict disciplinary procedures in case of noncompliance

C.  

Reviewing results of the annual company external audit

D.  

Adopting internationally accepted controls

Discussion 0
Questions 59

When a risk practitioner is determining a system's criticality. it is MOST helpful to review the associated:

Options:

A.  

process flow.

B.  

business impact analysis (BIA).

C.  

service level agreement (SLA).

D.  

system architecture.

Discussion 0
Questions 60

Which of the following is MOST useful for measuring the existing risk management process against a desired state?

Options:

A.  

Balanced scorecard

B.  

Risk management framework

C.  

Capability maturity model

D.  

Risk scenario analysis

Discussion 0
Questions 61

Following an acquisition, the acquiring company's risk practitioner has been asked to update the organization's IT risk profile What is the MOST important information to review from the acquired company to facilitate this task?

Options:

A.  

Internal and external audit reports

B.  

Risk disclosures in financial statements

C.  

Risk assessment and risk register

D.  

Business objectives and strategies

Discussion 0
Questions 62

Which of the following s MOST likely to deter an employee from engaging in inappropriate use of company owned IT systems?

Options:

A.  

A centralized computer security response team

B.  

Regular performance reviews and management check-ins

C.  

Code of ethics training for all employees

D.  

Communication of employee activity monitoring

Discussion 0
Questions 63

An organization has provided legal text explaining the rights and expected behavior of users accessing a system from geographic locations that have strong privacy regulations. Which of the following control types has been applied?

Options:

A.  

Detective

B.  

Directive

C.  

Preventive

D.  

Compensating

Discussion 0
Questions 64

Which of the following statements describes the relationship between key risk indicators (KRIs) and key control indicators (KCIs)?

Options:

A.  

KRI design must precede definition of KCIs.

B.  

KCIs and KRIs are independent indicators and do not impact each other.

C.  

A decreasing trend of KRI readings will lead to changes to KCIs.

D.  

Both KRIs and KCIs provide insight to potential changes in the level of risk.

Discussion 0
Questions 65

Which of the following is the MOST important responsibility of a risk owner?

Options:

A.  

Testing control design

B.  

Accepting residual risk

C.  

Establishing business information criteria

D.  

Establishing the risk register

Discussion 0
Questions 66

Which of the following statements BEST illustrates the relationship between key performance indicators (KPIs) and key control indicators (KCIs)?

Options:

A.  

KPIs measure manual controls, while KCIs measure automated controls.

B.  

KPIs and KCIs both contribute to understanding of control effectiveness.

C.  

A robust KCI program will replace the need to measure KPIs.

D.  

KCIs are applied at the operational level while KPIs are at the strategic level.

Discussion 0
Questions 67

The MAIN reason for creating and maintaining a risk register is to:

Options:

A.  

assess effectiveness of different projects.

B.  

define the risk assessment methodology.

C.  

ensure assets have low residual risk.

D.  

account for identified key risk factors.

Discussion 0
Questions 68

Which of The following should be of GREATEST concern for an organization considering the adoption of a bring your own device (BYOD) initiative?

Options:

A.  

Device corruption

B.  

Data loss

C.  

Malicious users

D.  

User support

Discussion 0
Questions 69

Which of the following represents a vulnerability?

Options:

A.  

An identity thief seeking to acquire personal financial data from an organization

B.  

Media recognition of an organization's market leadership in its industry

C.  

A standard procedure for applying software patches two weeks after release

D.  

An employee recently fired for insubordination

Discussion 0
Questions 70

Which of me following is MOST helpful to mitigate the risk associated with an application under development not meeting business objectives?

Options:

A.  

Identifying tweets that may compromise enterprise architecture (EA)

B.  

Including diverse Business scenarios in user acceptance testing (UAT)

C.  

Performing risk assessments during the business case development stage

D.  

Including key stakeholders in review of user requirements

Discussion 0
Questions 71

From a risk management perspective, the PRIMARY objective of using maturity models is to enable:

Options:

A.  

solution delivery.

B.  

resource utilization.

C.  

strategic alignment.

D.  

performance evaluation.

Discussion 0
Questions 72

While reviewing the risk register, a risk practitioner notices that different business units have significant variances in inherent risk for the same risk scenario. Which of the following is the BEST course of action?

Options:

A.  

Update the risk register with the average of residual risk for both business units.

B.  

Review the assumptions of both risk scenarios to determine whether the variance is reasonable.

C.  

Update the risk register to ensure both risk scenarios have the highest residual risk.

D.  

Request that both business units conduct another review of the risk.

Discussion 0
Questions 73

An information system for a key business operation is being moved from an in-house application to a Software as a Service (SaaS) vendor. Which of the following will have the GREATEST impact on the ability to monitor risk?

Options:

A.  

Reduced ability to evaluate key risk indicators (KRIs)

B.  

Reduced access to internal audit reports

C.  

Dependency on the vendor's key performance indicators (KPIs)

D.  

Dependency on service level agreements (SLAs)

Discussion 0
Questions 74

The MAIN purpose of reviewing a control after implementation is to validate that the control:

Options:

A.  

operates as intended.

B.  

is being monitored.

C.  

meets regulatory requirements.

D.  

operates efficiently.

Discussion 0
Questions 75

Which of the following is the MOST important reason to link an effective key control indicator (KCI) to relevant key risk indicators (KRIs)?

Options:

A.  

To monitor changes in the risk environment

B.  

To provide input to management for the adjustment of risk appetite

C.  

To monitor the accuracy of threshold levels in metrics

D.  

To obtain business buy-in for investment in risk mitigation measures

Discussion 0
Questions 76

Which of the following is MOST helpful in aligning IT risk with business objectives?

Options:

A.  

Introducing an approved IT governance framework

B.  

Integrating the results of top-down risk scenario analyses

C.  

Performing a business impact analysis (BlA)

D.  

Implementing a risk classification system

Discussion 0
Questions 77

Which of the following provides the BEST evidence that a selected risk treatment plan is effective?

Options:

A.  

Identifying key risk indicators (KRIs)

B.  

Evaluating the return on investment (ROI)

C.  

Evaluating the residual risk level

D.  

Performing a cost-benefit analysis

Discussion 0
Questions 78

Prudent business practice requires that risk appetite not exceed:

Options:

A.  

inherent risk.

B.  

risk tolerance.

C.  

risk capacity.

D.  

residual risk.

Discussion 0
Questions 79

An organization must make a choice among multiple options to respond to a risk. The stakeholders cannot agree and decide to postpone the decision. Which of the following risk responses has the organization adopted?

Options:

A.  

Transfer

B.  

Mitigation

C.  

Avoidance

D.  

Acceptance

Discussion 0
Questions 80

When reporting on the performance of an organization's control environment including which of the following would BEST inform stakeholders risk decision-making?

Options:

A.  

The audit plan for the upcoming period

B.  

Spend to date on mitigating control implementation

C.  

A report of deficiencies noted during controls testing

D.  

A status report of control deployment

Discussion 0
Questions 81

While evaluating control costs, management discovers that the annual cost exceeds the annual loss expectancy (ALE) of the risk. This indicates the:

Options:

A.  

control is ineffective and should be strengthened

B.  

risk is inefficiently controlled.

C.  

risk is efficiently controlled.

D.  

control is weak and should be removed.

Discussion 0
Questions 82

While conducting an organization-wide risk assessment, it is noted that many of the information security policies have not changed in the past three years. The BEST course of action is to:

Options:

A.  

review and update the policies to align with industry standards.

B.  

determine that the policies should be updated annually.

C.  

report that the policies are adequate and do not need to be updated frequently.

D.  

review the policies against current needs to determine adequacy.

Discussion 0
Questions 83

Which of the following is the MOST effective control to ensure user access is maintained on a least-privilege basis?

Options:

A.  

User authorization

B.  

User recertification

C.  

Change log review

D.  

Access log monitoring

Discussion 0
Questions 84

A global organization is planning to collect customer behavior data through social media advertising. Which of the following is the MOST important business risk to be considered?

Options:

A.  

Regulatory requirements may differ in each country.

B.  

Data sampling may be impacted by various industry restrictions.

C.  

Business advertising will need to be tailored by country.

D.  

The data analysis may be ineffective in achieving objectives.

Discussion 0
Questions 85

Which of the following practices MOST effectively safeguards the processing of personal data?

Options:

A.  

Personal data attributed to a specific data subject is tokenized.

B.  

Data protection impact assessments are performed on a regular basis.

C.  

Personal data certifications are performed to prevent excessive data collection.

D.  

Data retention guidelines are documented, established, and enforced.

Discussion 0
Questions 86

Which of the following is the BEST course of action to help reduce the probability of an incident recurring?

Options:

A.  

Perform a risk assessment.

B.  

Perform root cause analysis.

C.  

Initiate disciplinary action.

D.  

Update the incident response plan.

Discussion 0
Questions 87

Which of the following MUST be updated to maintain an IT risk register?

Options:

A.  

Expected frequency and potential impact

B.  

Risk tolerance

C.  

Enterprise-wide IT risk assessment

D.  

Risk appetite

Discussion 0
Questions 88

Which of the following is the PRIMARY risk management responsibility of the second line of defense?

Options:

A.  

Monitoring risk responses

B.  

Applying risk treatments

C.  

Providing assurance of control effectiveness

D.  

Implementing internal controls

Discussion 0
Questions 89

In an organization that allows employee use of social media accounts for work purposes, which of the following is the BEST way to protect company sensitive information from being exposed?

Options:

A.  

Educating employees on what needs to be kept confidential

B.  

Implementing a data loss prevention (DLP) solution

C.  

Taking punitive action against employees who expose confidential data

D.  

Requiring employees to sign nondisclosure agreements

Discussion 0
Questions 90

Which of the following is MOST important to communicate to senior management during the initial implementation of a risk management program?

Options:

A.  

Regulatory compliance

B.  

Risk ownership

C.  

Best practices

D.  

Desired risk level

Discussion 0
Questions 91

Which of the following should be the MOST important consideration when performing a vendor risk assessment?

Options:

A.  

Results of the last risk assessment of the vendor

B.  

Inherent risk of the business process supported by the vendor

C.  

Risk tolerance of the vendor

D.  

Length of time since the last risk assessment of the vendor

Discussion 0
Questions 92

A financial institution has identified high risk of fraud in several business applications. Which of the following controls will BEST help reduce the risk of fraudulent internal transactions?

Options:

A.  

Periodic user privileges review

B.  

Log monitoring

C.  

Periodic internal audits

D.  

Segregation of duties

Discussion 0
Questions 93

The BEST metric to monitor the risk associated with changes deployed to production is the percentage of:

Options:

A.  

changes due to emergencies.

B.  

changes that cause incidents.

C.  

changes not requiring user acceptance testing.

D.  

personnel that have rights to make changes in production.

Discussion 0
Questions 94

Which of the following is the MOST appropriate key risk indicator (KRI) for backup media that is recycled monthly?

Options:

A.  

Time required for backup restoration testing

B.  

Change in size of data backed up

C.  

Successful completion of backup operations

D.  

Percentage of failed restore tests

Discussion 0
Questions 95

Key risk indicators (KRIs) are MOST useful during which of the following risk management phases?

Options:

A.  

Monitoring

B.  

Analysis

C.  

Identification

D.  

Response selection

Discussion 0
Questions 96

A risk practitioner has been asked to advise management on developing a log collection and correlation strategy. Which of the following should be the MOST important consideration when developing this strategy?

Options:

A.  

Ensuring time synchronization of log sources.

B.  

Ensuring the inclusion of external threat intelligence log sources.

C.  

Ensuring the inclusion of all computing resources as log sources.

D.  

Ensuring read-write access to all log sources

Discussion 0
Questions 97

What are the MOST essential attributes of an effective Key control indicator (KCI)?

Options:

A.  

Flexibility and adaptability

B.  

Measurability and consistency

C.  

Robustness and resilience

D.  

Optimal cost and benefit

Discussion 0
Questions 98

What should be the PRIMARY driver for periodically reviewing and adjusting key risk indicators (KRIs)?

Options:

A.  

Risk impact

B.  

Risk likelihood

C.  

Risk appropriate

D.  

Control self-assessments (CSAs)

Discussion 0
Questions 99

Which of the following facilitates a completely independent review of test results for evaluating control effectiveness?

Options:

A.  

Segregation of duties

B.  

Three lines of defense

C.  

Compliance review

D.  

Quality assurance review

Discussion 0
Questions 100

Which of the following is the PRIMARY reason to use key control indicators (KCIs) to evaluate control operating effectiveness?

Options:

A.  

To measure business exposure to risk

B.  

To identify control vulnerabilities

C.  

To monitor the achievement of set objectives

D.  

To raise awareness of operational issues

Discussion 0
Questions 101

After a high-profile systems breach at an organization s key vendor, the vendor has implemented additional mitigating controls. The vendor has voluntarily shared the following set of assessments:

Which of the assessments provides the MOST reliable input to evaluate residual risk in the vendor's control environment?

Options:

A.  

External audit

B.  

Internal audit

C.  

Vendor performance scorecard

D.  

Regulatory examination

Discussion 0
Questions 102

A maturity model is MOST useful to an organization when it:

Options:

A.  

benchmarks against other organizations

B.  

defines a qualitative measure of risk

C.  

provides a reference for progress

D.  

provides risk metrics.

Discussion 0
Questions 103

Which of the following should be a risk practitioner's PRIMARY focus when tasked with ensuring organization records are being retained for a sufficient period of time to meet legal obligations?

Options:

A.  

Data duplication processes

B.  

Data archival processes

C.  

Data anonymization processes

D.  

Data protection processes

Discussion 0
Questions 104

Management has required information security awareness training to reduce the risk associated with credential compromise. What is the BEST way to assess the effectiveness of the training?

Options:

A.  

Conduct social engineering testing.

B.  

Audit security awareness training materials.

C.  

Administer an end-of-training quiz.

D.  

Perform a vulnerability assessment.

Discussion 0
Questions 105

Which of the following is the BEST indicator of the effectiveness of IT risk management processes?

Options:

A.  

Percentage of business users completing risk training

B.  

Percentage of high-risk scenarios for which risk action plans have been developed

C.  

Number of key risk indicators (KRIs) defined

D.  

Time between when IT risk scenarios are identified and the enterprise's response

Discussion 0
Questions 106

Which of the following is MOST important for an organization to update following a change in legislation requiring notification to individuals impacted by data breaches?

Options:

A.  

Insurance coverage

B.  

Security awareness training

C.  

Policies and standards

D.  

Risk appetite and tolerance

Discussion 0
Questions 107

A newly hired risk practitioner finds that the risk register has not been updated in the past year. What is the risk practitioner's BEST course of action?

Options:

A.  

Identify changes in risk factors and initiate risk reviews.

B.  

Engage an external consultant to redesign the risk management process.

C.  

Outsource the process for updating the risk register.

D.  

Implement a process improvement and replace the old risk register.

Discussion 0
Questions 108

Which of the following BEST reduces the probability of laptop theft?

Options:

A.  

Cable lock

B.  

Acceptable use policy

C.  

Data encryption

D.  

Asset tag with GPS

Discussion 0
Questions 109

Which of the following is the BEST key performance indicator (KPI) for determining how well an IT policy is aligned to business requirements?

Options:

A.  

Total cost to support the policy

B.  

Number of exceptions to the policy

C.  

Total cost of policy breaches

D.  

Number of inquiries regarding the policy

Discussion 0
Questions 110

Which of the following BEST promotes commitment to controls?

Options:

A.  

Assigning control ownership

B.  

Assigning appropriate resources

C.  

Assigning a quality control review

D.  

Performing regular independent control reviews

Discussion 0
Questions 111

A key risk indicator (KRI) indicates a reduction in the percentage of appropriately patched servers. Which of the following is the risk practitioner's BEST course of action?

Options:

A.  

Determine changes in the risk level.

B.  

Outsource the vulnerability management process.

C.  

Review the patch management process.

D.  

Add agenda item to the next risk committee meeting.

Discussion 0
Questions 112

An organization is planning to outsource its payroll function to an external service provider Which of the following should be the MOST important consideration when selecting the provider?

Options:

A.  

Disaster recovery plan (DRP) of the system

B.  

Right to audit the provider

C.  

Internal controls to ensure data privacy

D.  

Transparency of key performance indicators (KPIs)

Discussion 0
Questions 113

An internally developed payroll application leverages Platform as a Service (PaaS) infrastructure from the cloud. Who owns the related data confidentiality risk?

Options:

A.  

IT infrastructure head

B.  

Human resources head

C.  

Supplier management head

D.  

Application development head

Discussion 0
Questions 114

The annualized loss expectancy (ALE) method of risk analysis:

Options:

A.  

helps in calculating the expected cost of controls

B.  

uses qualitative risk rankings such as low. medium and high.

C.  

can be used m a cost-benefit analysts

D.  

can be used to determine the indirect business impact.

Discussion 0
Questions 115

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of an anti-virus program?

Options:

A.  

Frequency of anti-virus software updates

B.  

Number of alerts generated by the anti-virus software

C.  

Number of false positives detected over a period of time

D.  

Percentage of IT assets with current malware definitions

Discussion 0
Questions 116

Which of the following is MOST helpful in developing key risk indicator (KRl) thresholds?

Options:

A.  

Loss expectancy information

B.  

Control performance predictions

C.  

IT service level agreements (SLAs)

D.  

Remediation activity progress

Discussion 0
Questions 117

An organization is planning to acquire a new financial system. Which of the following stakeholders would provide the MOST relevant information for analyzing the risk associated with the new IT solution?

Options:

A.  

Project sponsor

B.  

Process owner

C.  

Risk manager

D.  

Internal auditor

Discussion 0
Questions 118

Which of the following BEST confirms the existence and operating effectiveness of information systems controls?

Options:

A.  

Self-assessment questionnaires completed by management

B.  

Review of internal audit and third-party reports

C.  

Management review and sign-off on system documentation

D.  

First-hand direct observation of the controls in operation

Discussion 0
Questions 119

Which of the following is MOST important when developing risk scenarios?

Options:

A.  

The scenarios are based on industry best practice.

B.  

The scenarios focus on current vulnerabilities.

C.  

The scenarios are relevant to the organization.

D.  

The scenarios include technical consequences.

Discussion 0
Questions 120

Which of the following is MOST important to review when determining whether a potential IT service provider’s control environment is effective?

Options:

A.  

Independent audit report

B.  

Control self-assessment

C.  

MOST important to update when an

D.  

Service level agreements (SLAs)

Discussion 0
Questions 121

An organization has raised the risk appetite for technology risk. The MOST likely result would be:

Options:

A.  

increased inherent risk.

B.  

higher risk management cost

C.  

decreased residual risk.

D.  

lower risk management cost.

Discussion 0
Questions 122

Which of the following provides The MOST useful information when determining a risk management program's maturity level?

Options:

A.  

Risk assessment results

B.  

A recently reviewed risk register

C.  

Key performance indicators (KPIs)

D.  

The organization's risk framework

Discussion 0
Questions 123

Which of the following is the BEST way for a risk practitioner to verify that management has addressed control issues identified during a previous external audit?

Options:

A.  

Interview control owners.

B.  

Observe the control enhancements in operation.

C.  

Inspect external audit documentation.

D.  

Review management's detailed action plans.

Discussion 0
Questions 124

Which of the following provides the BEST evidence that risk responses have been executed according to their risk action plans?

Options:

A.  

Risk policy review

B.  

Business impact analysis (B1A)

C.  

Control catalog

D.  

Risk register

Discussion 0
Questions 125

Read" rights to application files in a controlled server environment should be approved by the:

Options:

A.  

business process owner.

B.  

database administrator.

C.  

chief information officer.

D.  

systems administrator.

Discussion 0
Questions 126

A risk practitioner observes that the fraud detection controls in an online payment system do not perform as expected. Which of the following will MOST likely change as a result?

Options:

A.  

Impact

B.  

Residual risk

C.  

Inherent risk

D.  

Risk appetite

Discussion 0
Questions 127

Which of the following would provide the MOST objective assessment of the effectiveness of an organization's security controls?

Options:

A.  

An internal audit

B.  

Security operations center review

C.  

Internal penetration testing

D.  

A third-party audit

Discussion 0
Questions 128

Which of the following will BEST help an organization select a recovery strategy for critical systems?

Options:

A.  

Review the business impact analysis.

B.  

Create a business continuity plan.

C.  

Analyze previous disaster recovery reports.

D.  

Conduct a root cause analysis.

Discussion 0
Questions 129

What is the MOST important consideration when aligning IT risk management with the enterprise risk management (ERM) framework?

Options:

A.  

Risk and control ownership

B.  

Senior management participation

C.  

Business unit support

D.  

Risk nomenclature and taxonomy

Discussion 0
Questions 130

Which of the following is MOST helpful in verifying that the implementation of a risk mitigation control has been completed as intended?

Options:

A.  

An updated risk register

B.  

Risk assessment results

C.  

Technical control validation

D.  

Control testing results

Discussion 0
Questions 131

After migrating a key financial system to a new provider, it was discovered that a developer could gain access to the production environment. Which of the following is the BEST way to mitigate the risk in this situation?

Options:

A.  

Escalate the issue to the service provider.

B.  

Re-certify the application access controls.

C.  

Remove the developer's access.

D.  

Review the results of pre-migration testing.

Discussion 0
Questions 132

Who is responsible for IT security controls that are outsourced to an external service provider?

Options:

A.  

Organization's information security manager

B.  

Organization's risk function

C.  

Service provider's IT management

D.  

Service provider's information security manager

Discussion 0
Questions 133

An organization is unable to implement a multi-factor authentication requirement until the next fiscal year due to budget constraints. Consequently, a policy exception must be submitted. Which of the following is MOST important to include in the analysis of the exception?

Options:

A.  

Sections of the policy that may justify not implementing the requirement

B.  

Risk associated with the inability to implement the requirement

C.  

Budget justification to implement the new requirement during the current year

D.  

Industry best practices with respect to implementation of the proposed control

Discussion 0
Questions 134

Which of the following is the MOST important data attribute of key risk indicators (KRIs)?

Options:

A.  

The data is measurable.

B.  

The data is calculated continuously.

C.  

The data is relevant.

D.  

The data is automatically produced.

Discussion 0
Questions 135

A risk practitioner has just learned about new done FIRST?

Options:

A.  

Notify executive management.

B.  

Analyze the impact to the organization.

C.  

Update the IT risk register.

D.  

Design IT risk mitigation plans.

Discussion 0
Questions 136

Which of the following can be interpreted from a single data point on a risk heat map?

Options:

A.  

Risk tolerance

B.  

Risk magnitude

C.  

Risk response

D.  

Risk appetite

Discussion 0
Questions 137

An organization's internal audit department is considering the implementation of robotics process automation (RPA) to automate certain continuous auditing tasks. Who would own the risk associated with ineffective design of the software bots?

Options:

A.  

Lead auditor

B.  

Project manager

C.  

Chief audit executive (CAE)

D.  

Chief information officer (CIO)

Discussion 0
Questions 138

A risk assessment indicates the residual risk associated with a new bring your own device (BYOD) program is within organizational risk tolerance. Which of the following should the risk practitioner

recommend be done NEXT?

Options:

A.  

Implement targeted awareness training for new BYOD users.

B.  

Implement monitoring to detect control deterioration.

C.  

Identify log sources to monitor BYOD usage and risk impact.

D.  

Reduce the risk tolerance level.

Discussion 0
Questions 139

Which of the following would BEST enable mitigation of newly identified risk factors related to internet of Things (loT)?

Options:

A.  

Introducing control procedures early in the life cycle

B.  

Implementing loT device software monitoring

C.  

Performing periodic risk assessments of loT

D.  

Performing secure code reviews

Discussion 0
Questions 140

Which of the following statements BEST describes risk appetite?

Options:

A.  

The amount of risk an organization is willing to accept

B.  

The effective management of risk and internal control environments

C.  

Acceptable variation between risk thresholds and business objectives

D.  

The acceptable variation relative to the achievement of objectives

Discussion 0
Questions 141

Implementing which of the following will BEST help ensure that systems comply with an established baseline before deployment?

Options:

A.  

Vulnerability scanning

B.  

Continuous monitoring and alerting

C.  

Configuration management

D.  

Access controls and active logging

Discussion 0
Questions 142

Which of the following will MOST improve stakeholders' understanding of the effect of a potential threat?

Options:

A.  

Establishing a risk management committee

B.  

Updating the organization's risk register to reflect the new threat

C.  

Communicating the results of the threat impact analysis

D.  

Establishing metrics to assess the effectiveness of the responses

Discussion 0
Questions 143

A risk practitioner has learned that an effort to implement a risk mitigation action plan has stalled due to lack of funding. The risk practitioner should report that the associated risk has been:

Options:

A.  

mitigated

B.  

accepted

C.  

avoided

D.  

deferred

Discussion 0
Questions 144

The PRIMARY purpose of using control metrics is to evaluate the:

Options:

A.  

amount of risk reduced by compensating controls.

B.  

amount of risk present in the organization.

C.  

variance against objectives.

D.  

number of incidents.

Discussion 0
Questions 145

When prioritizing risk response, management should FIRST:

Options:

A.  

evaluate the organization s ability and expertise to implement the solution.

B.  

evaluate the risk response of similar organizations.

C.  

address high risk factors that have efficient and effective solutions.

D.  

determine which risk factors have high remediation costs

Discussion 0
Questions 146

Prior to selecting key performance indicators (KPIs), itis MOST important to ensure:

Options:

A.  

trending data is available.

B.  

process flowcharts are current.

C.  

measurement objectives are defined.

D.  

data collection technology is available.

Discussion 0
Questions 147

A risk assessment has identified increased losses associated with an IT risk scenario. It is MOST important for the risk practitioner to:

Options:

A.  

update the risk rating.

B.  

reevaluate inherent risk.

C.  

develop new risk scenarios.

D.  

implement additional controls.

Discussion 0
Questions 148

Which of the following can be used to assign a monetary value to risk?

Options:

A.  

Annual loss expectancy (ALE)

B.  

Business impact analysis

C.  

Cost-benefit analysis

D.  

Inherent vulnerabilities

Discussion 0
Questions 149

An identified high probability risk scenario involving a critical, proprietary business function has an annualized cost of control higher than the annual loss expectancy. Which of the following is the BEST risk response?

Options:

A.  

Mitigate

B.  

Accept

C.  

Transfer

D.  

Avoid

Discussion 0
Questions 150

What is MOST important for the risk practitioner to understand when creating an initial IT risk register?

Options:

A.  

Enterprise architecture (EA)

B.  

Control environment

C.  

IT objectives

D.  

Organizational objectives

Discussion 0
Questions 151

Which of the following would present the GREATEST challenge when assigning accountability for control ownership?

Options:

A.  

Weak governance structures

B.  

Senior management scrutiny

C.  

Complex regulatory environment

D.  

Unclear reporting relationships

Discussion 0
Questions 152

An organization has outsourced its backup and recovery procedures to a third-party cloud provider. Which of the following is the risk practitioner s BEST course of action?

Options:

A.  

Accept the risk and document contingency plans for data disruption.

B.  

Remove the associated risk scenario from the risk register due to avoidance.

C.  

Mitigate the risk with compensating controls enforced by the third-party cloud provider.

D.  

Validate the transfer of risk and update the register to reflect the change.

Discussion 0
Questions 153

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a disaster recovery plan (DRP)?

Options:

A.  

Number of users that participated in the DRP testing

B.  

Number of issues identified during DRP testing

C.  

Percentage of applications that met the RTO during DRP testing

D.  

Percentage of issues resolved as a result of DRP testing

Discussion 0
Questions 154

What is the BEST information to present to business control owners when justifying costs related to controls?

Options:

A.  

Loss event frequency and magnitude

B.  

The previous year's budget and actuals

C.  

Industry benchmarks and standards

D.  

Return on IT security-related investments

Discussion 0
Questions 155

A risk heat map is MOST commonly used as part of an IT risk analysis to facilitate risk:

Options:

A.  

communication

B.  

identification.

C.  

treatment.

D.  

assessment.

Discussion 0
Questions 156

Which of the following techniques would be used during a risk assessment to demonstrate to stakeholders that all known alternatives were evaluated?

Options:

A.  

Control chart

B.  

Sensitivity analysis

C.  

Trend analysis

D.  

Decision tree

Discussion 0
Questions 157

The PRIMARY reason a risk practitioner would be interested in an internal audit report is to:

Options:

A.  

plan awareness programs for business managers.

B.  

evaluate maturity of the risk management process.

C.  

assist in the development of a risk profile.

D.  

maintain a risk register based on noncompliances.

Discussion 0
Questions 158

Risk management strategies are PRIMARILY adopted to:

Options:

A.  

take necessary precautions for claims and losses.

B.  

achieve acceptable residual risk levels.

C.  

avoid risk for business and IT assets.

D.  

achieve compliance with legal requirements.

Discussion 0
Questions 159

A risk practitioner is assisting with the preparation of a report on the organization s disaster recovery (DR) capabilities. Which information would have the MOST impact on the overall recovery profile?

Options:

A.  

The percentage of systems meeting recovery target times has increased.

B.  

The number of systems tested in the last year has increased.

C.  

The number of systems requiring a recovery plan has increased.

D.  

The percentage of systems with long recovery target times has decreased.

Discussion 0
Questions 160

Which of the following is the MOST important requirement for monitoring key risk indicators (KRls) using log analysis?

Options:

A.  

Obtaining logs m an easily readable format

B.  

Providing accurate logs m a timely manner

C.  

Collecting logs from the entire set of IT systems

D.  

implementing an automated log analysis tool

Discussion 0
Questions 161

Which of the following is the MOST important factor affecting risk management in an organization?

Options:

A.  

The risk manager's expertise

B.  

Regulatory requirements

C.  

Board of directors' expertise

D.  

The organization's culture

Discussion 0
Questions 162

Which of the following would be- MOST helpful to understand the impact of a new technology system on an organization's current risk profile?

Options:

A.  

Hire consultants specializing m the new technology.

B.  

Review existing risk mitigation controls.

C.  

Conduct a gap analysis.

D.  

Perform a risk assessment.

Discussion 0
Questions 163

An organization is planning to engage a cloud-based service provider for some of its data-intensive business processes. Which of the following is MOST important to help define the IT risk associated with this outsourcing activity?

Options:

A.  

Service level agreement

B.  

Customer service reviews

C.  

Scope of services provided

D.  

Right to audit the provider

Discussion 0
Questions 164

A review of an organization s controls has determined its data loss prevention {DLP) system is currently failing to detect outgoing emails containing credit card data. Which of the following would be MOST impacted?

Options:

A.  

Key risk indicators (KRls)

B.  

Inherent risk

C.  

Residual risk

D.  

Risk appetite

Discussion 0
Questions 165

Which of the following controls will BEST detect unauthorized modification of data by a database administrator?

Options:

A.  

Reviewing database access rights

B.  

Reviewing database activity logs

C.  

Comparing data to input records

D.  

Reviewing changes to edit checks

Discussion 0
Questions 166

Which of the following is MOST important when developing key performance indicators (KPIs)?

Options:

A.  

Alignment to risk responses

B.  

Alignment to management reports

C.  

Alerts when risk thresholds are reached

D.  

Identification of trends

Discussion 0
Questions 167

The analysis of which of the following will BEST help validate whether suspicious network activity is malicious?

Options:

A.  

Logs and system events

B.  

Intrusion detection system (IDS) rules

C.  

Vulnerability assessment reports

D.  

Penetration test reports

Discussion 0
Questions 168

Which of the following helps ensure compliance with a nonrepudiation policy requirement for electronic transactions?

Options:

A.  

Digital signatures

B.  

Encrypted passwords

C.  

One-time passwords

D.  

Digital certificates

Discussion 0
Questions 169

Which of the following is the MOST important consideration when multiple risk practitioners capture risk scenarios in a single risk register?

Options:

A.  

Aligning risk ownership and control ownership

B.  

Developing risk escalation and reporting procedures

C.  

Maintaining up-to-date risk treatment plans

D.  

Using a consistent method for risk assessment

Discussion 0
Questions 170

Which of the following is the MOST important key performance indicator (KPI) to establish in the service level agreement (SLA) for an outsourced data center?

Options:

A.  

Percentage of systems included in recovery processes

B.  

Number of key systems hosted

C.  

Average response time to resolve system incidents

D.  

Percentage of system availability

Discussion 0
Questions 171

Which of the following is the MOST important benefit of key risk indicators (KRIs)'

Options:

A.  

Assisting in continually optimizing risk governance

B.  

Enabling the documentation and analysis of trends

C.  

Ensuring compliance with regulatory requirements

D.  

Providing an early warning to take proactive actions

Discussion 0
Questions 172

Which of the following IT controls is MOST useful in mitigating the risk associated with inaccurate data?

Options:

A.  

Encrypted storage of data

B.  

Links to source data

C.  

Audit trails for updates and deletions

D.  

Check totals on data records and data fields

Discussion 0
Questions 173

Which of the following would be considered a vulnerability?

Options:

A.  

Delayed removal of employee access

B.  

Authorized administrative access to HR files

C.  

Corruption of files due to malware

D.  

Server downtime due to a denial of service (DoS) attack

Discussion 0
Questions 174

Which of the following would be the BEST recommendation if the level of risk in the IT risk profile has decreased and is now below management's risk appetite?

Options:

A.  

Optimize the control environment.

B.  

Realign risk appetite to the current risk level.

C.  

Decrease the number of related risk scenarios.

D.  

Reduce the risk management budget.

Discussion 0
Questions 175

IT management has asked for a consolidated view into the organization's risk profile to enable project prioritization and resource allocation. Which of the following materials would

be MOST helpful?

Options:

A.  

IT risk register

B.  

List of key risk indicators

C.  

Internal audit reports

D.  

List of approved projects

Discussion 0
Questions 176

Which of the following is the BEST way to identify changes to the risk landscape?

Options:

A.  

Internal audit reports

B.  

Access reviews

C.  

Threat modeling

D.  

Root cause analysis

Discussion 0
Questions 177

Which of the following would MOST effectively enable a business operations manager to identify events exceeding risk thresholds?

Options:

A.  

Continuous monitoring

B.  

A control self-assessment

C.  

Transaction logging

D.  

Benchmarking against peers

Discussion 0
Questions 178

Which of the following is the BEST way to validate the results of a vulnerability assessment?

Options:

A.  

Perform a penetration test.

B.  

Review security logs.

C.  

Conduct a threat analysis.

D.  

Perform a root cause analysis.

Discussion 0
Questions 179

IT risk assessments can BEST be used by management:

Options:

A.  

for compliance with laws and regulations

B.  

as a basis for cost-benefit analysis.

C.  

as input foe decision-making

D.  

to measure organizational success.

Discussion 0