Weekend Special Sale Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: buysanta

Exact2Pass Menu

Question # 4

Which of the following is important to ensure when validating the results of a frequency analysis?

A.

Estimates used during the analysis were based on reliable and historical data.

B.

The analysis was conducted by an independent third party.

C.

The analysis method has been fully documented and explained.

Full Access
Question # 5

Which of the following is the BEST way to interpret enterprise standards?

A.

A means of implementing policy

B.

An approved code of practice

Q Documented high-level principles

Full Access
Question # 6

Potential losses resulting from employee errors and system failures are examples of:

A.

operational risk.

B.

market risk.

C.

strategic risk.

Full Access
Question # 7

Which of the following is the BEST control to prevent unauthorized user access in a remote work environment?

A.

Read-only user privileges

B.

Multi-factor authentication

C.

Monthly user access recertification

Full Access
Question # 8

The MOST important reason for developing and monitoring key risk indicators (KRIs) is that they provide:

A.

measurable metrics for acceptable risk levels.

B.

information about control compliance.

C.

an early warning of possible risk materialization.

Full Access
Question # 9

An enterprise is currently experiencing an unacceptable 8% processing error rate and desires to manage risk by establishing a policy that error rates cannot exceed 5%. In addition, management wants to be alerted when error rates meet or exceed 4%. The enterprise should set a key performance indicator (KPI) metric at which of the following levels?

A.

5%

B.

4%

C.

8%

Full Access
Question # 10

One of the PRIMARY purposes of threat intelligence is to understand:

A.

zero-day threats.

B.

breach likelihood.

C.

asset vulnerabilities.

Full Access
Question # 11

If the residual risk associated with a particular control is within the enterprise risk appetite, the residual risk should be:

A.

accepted and updated in the risk register.

B.

mitigated through additional controls.

C.

transferred and managed by a third party.

Full Access
Question # 12

Which of the following is the BEST reason for an enterprise to avoid an absolute prohibition on risk?

A.

It may not be understood by executive management.

B.

It may lead to ineffective use of resources.

C.

It may not provide adequate support for budget increases.

Full Access
Question # 13

Which of the following is MOST important to ensure when developing key risk indicators (KRIs)?

A.

The KRIs can be added to the risk dashboard report.

B.

KRIs can be applied to multiple risk events.

C.

Each KRI is linked to a specific risk event.

Full Access
Question # 14

Which of the following is the MAIN advantage of a risk taxonomy?

A.

It enables risk quantification.

B.

It provides a scheme for classifying categories of risk.

C.

It promotes alignment with industry best practices for risk management.

Full Access
Question # 15

Which of the following includes potential risk events and the associated impact?

A.

Risk scenario

B.

Risk policy

C.

Risk profile

Full Access
Question # 16

The PRIMARY reason for the implementation of additional security controls is to:

A.

avoid the risk of regulatory noncompliance.

B.

adhere to local data protection laws.

C.

manage risk to acceptable tolerance levels.

Full Access
Question # 17

Which of the following is the MOST important information for determining the critical path of a project?

A.

Regulatory requirements

B.

Cost-benefit analysis

C.

Specified end dates

Full Access
Question # 18

Incomplete or inaccurate data may result in:

A.

availability risk.

B.

relevance risk.

C.

integrity risk.

Full Access
Question # 19

Which of the following is the MOST useful information to include in a risk report to indicate control effectiveness?

A.

Whether the controls are functioning properly to reduce risk to acceptable levels

B.

Whether metrics to monitor control performance align with risk management standards

C.

Whether external audits confirm the same control deficiencies as reported by internal audit

Full Access
Question # 20

Which of the following risk analysis methods gathers different types of potential risk ideas to be validated and ranked by an individual or small groups during interviews?

A.

Brainstorming model

B.

Delphi technique

C.

Monte Cado analysis

Full Access
Question # 21

Which of the following would have the MOST impact on the accuracy and appropriateness of plans associated with business continuity and disaster recovery?

A.

Material updates to the incident response plan

B.

Data backups being moved to the cloud

C.

Changes to the business impact assessment (BIA)

Full Access
Question # 22

Which of the following is an example of an inductive method to gather information?

A.

Vulnerability analysis

B.

Controls gap analysis

C.

Penetration testing

Full Access
Question # 23

When evaluating the current state of controls, which of the following will provide the MOST comprehensive analysis of enterprise processes, incidents, logs, and the threat environment?

A.

Enterprise architecture (EA) assessment

B.

IT operations and management evaluation

C.

Third-party assurance review

Full Access
Question # 24

To be effective, risk reporting and communication should provide:

A.

risk reports to each business unit and groups of employees.

B.

the same risk information for each decision-making stakeholder.

C.

stakeholders with concise information focused on key points.

Full Access
Question # 25

Which of the following would be considered a cyber-risk?

A.

A system that does not meet the needs of users

B.

A change in security technology

C.

Unauthorized use of information

Full Access
Question # 26

Risk impact criteria are PRIMARILY used to:

A.

help establish the enterprise risk appetite.

B.

determine loss associated with specific IT assets.

C.

prioritize the enterprise's risk responses.

Full Access
Question # 27

Which of the following provides the MOST important input for analyzing I&T-related risk?

A.

Information about market trends and technology evolution

B.

Information about past incidents, frequency, and loss to the organization

C.

Information about threats and vulnerabilities

Full Access
Question # 28

Which of the following risk response strategies involves the implementation of new controls?

A.

Mitigation

B.

Avoidance

C.

Acceptance

Full Access
Question # 29

Which of the following is the MOST important factor to consider when developing effective risk scenarios?

A.

Risk events that affect both financial and strategic objectives

B.

Previously materialized risk events impacting competitors

C.

Real and relevant potential risk events

Full Access
Question # 30

Which of the following is the MOST likely reason that a list of control deficiencies identified in a recent security assessment would be excluded from an IT risk register?

A.

The deficiencies have no business relevance.

B.

The deficiencies are actual misconfigurations.

C.

The deficiencies have already been resolved.

Full Access
Question # 31

Which of the following is the PRIMARY objective of vulnerability assessments?

A.

To determine the best course of action based on the threat and potential impact

B.

To improve the knowledge of deficient control conditions within IT systems

C.

To reduce the amount of effort to identify and catalog new vulnerabilities

Full Access
Question # 32

Which of the following BEST supports a risk-aware culture within an enterprise?

A.

Risk issues and negative outcomes are only shared within a department.

B.

The enterprise risk management (ERM) function manages all risk-related activities.

C.

Risk is identified, documented, and discussed to make business decisions.

Full Access
Question # 33

For risk reporting to adequately reflect current risk management capabilities, the risk report should be based on the enterprise:

A.

risk management framework.

B.

risk profile.

C.

risk appetite.

Full Access
Question # 34

A business impact analysis (BIA) generates the MOST benefit when:

A.

keeping impact criteria and cost data as generic as possible.

B.

measuring existing impact criteria exclusively in financial terms.

C.

using standardized frequency and impact metrics.

Full Access