Halloween Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which of the following best describes an optimized state of operational processes, as related to the Operational Risk Management solution?

A.

Compliance efforts are reactive and just-in-time

B.

Resilient strategies adapt quickly to threats and disruptions

C.

Each control deficiency identified in loss event analyses and self-assessments is addressed

D.

Risk assessments and reporting are limited and inconsistent

Full Access
Question # 5

Which of the following areas of capability are covered by IT Security Risk Management?

A.

Establishing security policies and standards, testing Business Continuity Plans

B.

Establishing business context for security, detecting and responding to attacks

C.

Developing Plans of Action & Milestones, managing Crisis Events

D.

Identifying and meeting regulatory obligations, defining and implementing policies and standards

Full Access
Question # 6

Why is it important to configure Audit Management according to a specific organization's priorities?

A.

The organization's priorities help drive meaningful action based on the criticality and value to the organization

B.

The organization's priorities should not be folded into the product so they can better evaluate Market drivers

C.

Audit Management should not be configured at all - it must be used exactly as installed

D.

The organization's priorities are determined by the Audit Staff, resulting in an effective bottom-up approach to audit

Full Access
Question # 7

When viewing the records returned from an advanced search, what does clicking the "New" icon do?

A.

Creates a new record in the application

B.

Creates a copy of the first record listed in the search results

C.

Opens a new advanced search page and removes any previously applied filters

D.

Opens a new advanced search page and returns the search criteria to the default display fields

Full Access
Question # 8

For which of the following field types is Trending an available option?

A.

IP Address

B.

Values List

C.

Text Date

Full Access
Question # 9

When an administrator selects to cascade private field permissions for a group, which of the following would be a valid result?

A.

Only members of BOTH the selected group and all child groups would have access to the field

B.

Only members of the selected group would have access to the field, members of any child groups would NOT have access to the field

C.

Members of the selected group would NOT have access to the field members of child groups would have access to the field

D.

Members of the selected group and members of any child groups would have access to the field

Full Access
Question # 10

Which Data-Driven Event could be used to conditionally require a field?

A.

Apply conditional layout

B.

Filter values list

C.

Set values list

D.

Set conditional requirement

Full Access