Chapter 2: IT Risk Assessment Flashcards
Which of the following BEST ensures effective prioritization and treatment of risk?
A.An updated risk register
B.A completed risk assessment report
C.Exception processes for low-impact risk
D.An updated risk map profile
A is the correct answer.
Justification
The risk register enables prioritization and treatment of risk as it gives a central view of all the enterprise’s risk.
Completing the risk assessment does not give visibility into all the enterprise’s risk.
The exception process does not give visibility into the all the enterprise’s risk.
A risk map is a graphic tool for ranking and displaying risk by defined ranges of frequency and magnitude; it does not necessarily give visibility into all the enterprise’s risk.
Which of the following information in the risk register BEST helps in developing proper risk scenarios? A list of:
A.potential threats to assets.
B.residual risk on individual assets.
C.accepted risk.
D.security incidents.
A is the correct answer.
Justification
Identifying potential threats to business assets will help isolate vulnerabilities and associated risk, all of which contribute to developing proper risk scenarios.
Identifying residual risk on individual assets does not help develop a proper risk scenario.
Accepted risk generally reflects a small subset of entries in the risk register. Accepted risk should be included in the risk register to ensure that events continue to be monitored in case an actual incident alters current acceptance of the risk.
Previous security incidents at the enterprise itself or at entities with a similar profile may inspire the inclusion of similar risk scenarios in the risk register. However, the best approach to create a meaningful risk register is to capture potential threats on tangible and intangible assets.
Which of the following statements BEST describes the value of a risk register?
A.It captures the risk inventory.
B.It drives the risk response plan.
C.It is a risk reporting tool.
D.It lists internal risk and external risk.
B is the correct answer.
Justification
A risk register provides detailed information on each identified risk including risk owner, details of the risk scenario, assumptions, affected stakeholders, causes/indicators, detailed scores (i.e., risk ratings) on the risk analysis, and detailed information on the risk response (e.g., action owner and risk response status, time frame for action, related projects, and risk tolerance level). These components can also be defined as the risk universe.
Risk registers serve as the main reference for all risk-related information, supporting risk-related decisions such as risk response activities and their prioritization.
Risk register data are used to generate management reports, but a risk register is not in itself a risk reporting tool.
The risk register tracks all internal and external risk, the quality and quantity of the controls, and the likelihood and impact of the risk.
What is the BEST tool for documenting the status of risk mitigation and risk ownership at the enterprise level?
A.Risk action plans
B.Risk scenarios
C.Business impact analysis documents
D.Risk register
D is the correct answer.
Justification
Risk action plans define risk activities for a defined scope, not for an entire entity.
Risk scenarios help develop a thorough understanding of an enterprise’s risk profile; however, they are not suitable for capturing risk mitigation, contingency plans and ownership for an enterprise.
The business impact analysis documents show ownership and describe processes and assets that are critical to the business; they do not describe risk mitigation strategies or specifically lay out the technical details of the contingency plan.
A risk register is designed to document all risk identified for the enterprise. For each risk it records, at a minimum, the likelihood, potential impact, priority, status of mitigation and owner.
The preparation of a risk register begins in which risk management process?
A.Risk response planning
B.Risk monitoring and control
C.Risk management planning
D.Risk identification
D is the correct answer.
Justification
In the risk response planning process, appropriate responses are determined by consensus and included in the risk register.
Risk monitoring and control often require identification of new risk and reassessment of known risk. Outcomes of risk reassessments, risk audits and periodic risk reviews trigger updates to the risk register.
Risk management planning describes how risk management will be structured and performed.
The risk register details all identified risk, including description, category, cause, probability of occurring, impact on objectives, proposed responses, owners and current status. The primary outputs of risk identification are the initial entries into the risk register.
To help establish the annual strategic direction of the enterprise, management needs to understand the existing IT challenges and assessment of risk. Where will management find this information?
A.The risk profile
B.A business case
C.The risk action plan
D.The risk register
D is the correct answer.
Justification
A risk profile is the overall portfolio of (identified) risk to which the enterprise is exposed.
A business case rationalizes a given investment to inform the decision-making on whether to proceed with the investment. It also functions as an operational tool to manage the investment through its full economic life cycle.
The risk action plan documents the priority for implementation of individual risk actions and how they should be implemented.
The results from the risk assessment are contained in the risk register. The risk register documents key attributes of potential and known IT risk issues. Attributes may include name, description, owner, expected/actual frequency, potential/actual magnitude, potential/actual business impact and disposition.
Where is the MOST useful place for enterprise management to store data related to a potential information breach?
A.Incident log
B.Problem management log
C.Risk register
D.Change management log
C is the correct answer.
Justification
The incident register captures incidents and not potential information-breach findings.
The problem register captures problems and not potential information-breach findings.
The risk register captures all information related to exposure, including action plans, residual risk rating and relevant stakeholders.
The change register captures changes and not potential information-breach findings.
If risk has been identified, but not yet mitigated, the enterprise would:
A.record and mitigate serious risk and disregard low-level risk.
B.obtain management commitment to mitigate all identified risk within a reasonable time frame.
C.document identified risk in the risk register and maintain the remediation status.
D.conduct an annual risk assessment, but disregard previous assessments to prevent risk bias.
C is the correct answer.
Justification
All levels of risk identified should be documented in the risk register. It is important to be able to identify where low-level risk can be aggregated within the register.
Not all identified risk will necessarily be mitigated. The enterprise will conduct a cost-benefit analysis before determining the appropriate risk response.
All identified risk should be included in the risk register. The register should capture the proposed remediation plan, the risk owner, and the anticipated date of completion.
Annual risk assessments should consider previous risk assessments.
The risk register is PRIMARILY a document communicating risk to:
A.the public.
B.the employees.
C.regulatory bodies and compliance.
D.relevant stakeholders.
D is the correct answer.
Justification
As it contains security risk and weaknesses information, the risk register is not made public.
The risk register is not typically communicated to all employees since it may not contain information relevant to all employees in the job functions.
The risk register is not intended for use by regulatory bodies and compliance teams.
As it contains information regarding risk and weaknesses relevant to the enterprise, the risk register is shared only with relevant stakeholders.
Which of the following presents the GREATEST risk when updating the risk register? Updates are:
A.carried out jointly with other functions.
B.carried out following incidents.
C.carried out annually.
D.subject to approval by the chief information security officer.
C is the correct answer.
Justification
In some cases, the risk-related aspects may be managed by multiple functions and hence updated jointly.
While updating the risk register only following incidents presents a risk, it is not the greatest risk when compared to carrying out updates to risk only once a year.
Updating the risk register only annually means the risk register does not reflect the true status of IT risk in the enterprise.
Updating the risk register only with the approval of the chief information security officer is problematic, but it is not as great a risk compared to only annual updates.
The GREATEST benefit of using an IT risk register is that it is:
A.a list of potential events that have been identified to understand their impact.
B.a document used to track risk that has been identified, analyzed and prioritized.
C.a list of risk that can be shared with all stakeholders in an easy-to-read format.
D.the basis for choosing a commercial, off-the-shelf risk management tool.
B is the correct answer.
Justification
The IT risk register includes a list of potential events, along with the likelihood and impact of the potential risk, but that is not its greatest benefit.
The greatest benefit of a risk register is that it provides information about the likelihood, impact and prioritization of all identified IT risk.
The IT risk register is a standardized format that can be easily shared, but that is not its greatest benefit. The greatest benefit of an IT risk register is the prioritization of the analyzed risk.
The IT register can provide inputs into what commercial software solutions need to provide in terms of functionality, but that is not the greatest benefit of a risk register.
Risk tolerance levels, risk ratings, related projects, affected stakeholders, assessment details and risk owners are all captured in which of the following items?
A.Risk register
B.Risk subject
C.Risk factors
D.Risk treatment plan
A is the correct answer.
Justification
A risk register includes risk tolerance levels, risk ratings, related projects, affected stakeholders, assessment details and risk owners.
A risk subject refers to the risk owner and affected business unit but does not address projects.
Risk factors reference internal and external context, risk management and IT-related capabilities.
A risk treatment plan includes risk scenarios requiring mitigation, root cause analysis, risk response evaluation criteria, accountability and responsibility, proposed actions, required resources, performance measurements and constraints, cost-benefit analysis, reporting and monitoring requirements, and timing and scheduling.
The PRIMARY advantage of creating and maintaining a risk register is to:
A.ensure that an inventory of identified risk is maintained.
B.record all risk scenarios considered during the risk identification process.
C.collect similar data on all risk identified within the enterprise.
D.run reports based on various risk scenarios.
A is the correct answer.
Justification
Once assets and risk are identified, the risk register is used as an inventory of that risk. The risk register can accelerate risk decision-making and establish accountability for specific risk.
Recording all considered scenarios in the register and reassessing them annually are good practices; however, maintaining the inventory is the primary advantage.
Similar data elements can be collected in a spreadsheet or governance, risk and compliance tool in a single format, but ensuring the inventory is still the primary advantage.
Running reports is a benefit of the risk registry, but not its primary purpose.
An emerging risk should be added to the risk register by the risk practitioner when:
A.the impact of the risk can be quantified
B.the probability of occurrence is high.
C.a competitor has added the risk to its register.
D.the activity that triggers the risk initiates.
D is the correct answer.
Justification
While impact quantification is important, it is not the factor that decides when emerging risk will be added to the risk register.
A high impact need not be the only criterion deciding when risk gets added to the risk register.
An industry benchmark should not be used as a criterion to add risk to the register because risk relevant to one enterprise may not be relevant to another due to each enterprise’s unique operating environment.
Risk identification usually starts when planning an activity, and risk identified at planning needs to be added to the risk register to ensure effective risk management.
Which of the following BEST improves decision-making related to risk?
A.Maintaining a documented risk register of all possible risk
B.Risk awareness training in line with the risk culture
C.Maintaining updated security policies and procedures
D.Allocating accountability of risk to the department as a whole
A is the correct answer.
Justification
Maintaining a documented risk register improves decision-making related to risk response because a risk register captures the population of relevant risk scenarios and provides a basis for prioritization of risk responses.
Offering risk awareness training to stakeholders and customizing its content according to the enterprise’s risk culture will sensitize stakeholders and users to their risk responsibilities. Training helps enhance accountability to make decisions on acceptance of residual risk but is less useful with respect to emerging threats.
Maintaining policies and procedures will not necessarily improve decisions related to residual risk.
Allocating accountability to the department as a whole dilutes ownership because there will be no individual owner for risk.
71.4% complete
Question
Which of the following BEST describes the information needed for each risk in a risk register?
A.Risk scenario including date, description, impact, probability, risk score, mitigation action and owner
B.Risk scenario including date, description, risk score, cost to remediate, communication plan and owner
C.Risk scenario including date, description, impact, cost to remediate and owner
D.Various activities leading to risk management planning
A is the correct answer.
Justification
Information required for each risk in a risk register includes date, description, impact, probability, risk score, mitigation action and owner.
Some of these elements are necessary to facilitate informed decisions, but others are needed as well (impact, probability, mitigation action). A communication plan is not required for each risk in a risk register.
In addition to these elements, probability, risk score and mitigation action are needed for each risk in a risk register to make informed decisions.
A risk register results from risk management planning, not the other way around.
Which of the following is the BEST way to ensure that an accurate risk register is maintained over time?
A.Monitor key risk indicators and record the findings in the risk register.
B.Publish the risk register centrally with workflow features that periodically poll risk assessors.
C.Distribute the risk register to business process owners for review and updating.
D.Use audit personnel to perform regular audits and to maintain the risk register.
B is the correct answer.
Justification
Monitoring key risk indicators will only provide insights to known and identified risk and will not account for risk that has yet to be identified.
Centrally publishing the risk register and enabling periodic polling of risk assessors through workflow features will ensure accuracy of content. A knowledge management platform with workflow and polling features will automate the process of maintaining the risk register.
Business process owners typically cannot effectively identify risk to their business processes. They may not have the ability to be unbiased in their review and may not have the appropriate skills or tools to effectively evaluate risk.
Audit personnel may not have the appropriate business knowledge or training in risk assessment to appropriately identify risk. Regular audits of business processes can also be a hindrance to business activities and most likely will not be allowed by business leadership.
The risk register for a project should be PRIMARILY maintained until:
A.the project plan is approved.
B.management accepts the risk.
C.the project is closed.
D.the business case is approved.
C is the correct answer.
Justification
Risk continues to be relevant even after the project plan is approved, so it is important to continue maintaining the risk register.
Even after management accepts the risk, risk continues to remain relevant and should be in the risk register. Mere acceptance of the risk does not mean the risk is gone or will not occur.
Project risk will be relevant until the project is closed; therefore, the risk register should be maintained until that time.
Project management begins once the business case is approved. The project risk register should be maintained through the life cycle of the project.
Risk may be removed from the risk register when the risk:
A.has been eliminated.
B.is transferred to the vendor.
C.threshold is exceeded.
D.is no longer relevant.
D is the correct answer.
Justification
Risk cannot be eliminated. Therefore if the risk is relevant, it will remain in the risk register.
Although risk is transferred to vendor, the enterprise is still accountable for the risk and it will remain in the risk register.
If the risk threshold is exceeded, it means the risk continues to be relevant and remains in the risk register.
If a risk is relevant, it will be listed in the risk register. Once the risk is no longer relevant, it may be removed.
The PRIMARY advantage of creating and updating a risk register is to:
A.ensure that an inventory of identified risk is maintained.
B.record all risk scenarios considered during the risk identification process.
C.collect similar data on all risk identified within the enterprise.
D.run reports based on various risk scenarios.
A is the correct answer.
Justification
Once assets and risk are identified, the risk register is used as an inventory of that risk. The risk register can accelerate risk decision-making and establish accountability for specific risk.
Recording all considered scenarios in the register and reassessing them annually are good practices; however, maintaining the inventory is the primary advantage.
Similar data elements can be collected in a spreadsheet or governance, risk and compliance (GRC) tool in a single format, but ensuring the inventory is still the primary advantage.
Running reports is a benefit of the risk registry but not its primary purpose.
The MAIN reason an enterprise maintains a risk register is that it:
A.acts as a repository of identified risk for decision-making.
B.helps in benchmarking against the risk impacting industry peers.
C.improves the risk culture by communicating risk to all employees.
D.establishes the risk indicators that an enterprise can focus upon.
A is the correct answer.
Justification
The risk register has the identified risk and is a repository that helps in decision-making.
The risk registers from industry peers are never published, so benchmarking is not possible.
Risk culture can be improved through awareness, but the risk register itself is not a means of communicating risk awareness.
The risk register may include information that the risk owner could use to establish risk indicators, but that is not its main purpose.
Which is the FIRST step in identifying IT risk scenarios?
A.Estimate IT risk.
B.Estimate remediation costs.
C.Identify risk factors.
D.Identify the enterprise’s risk appetite.
C is the correct answer.
Justification
IT risk scenarios are determined prior to estimating IT risk.
IT risk scenarios are determined prior to estimating remediation costs.
Identifying risk factors involves data collection necessary in creating risk scenarios. It is the first step in identifying such scenarios.
Identifying the enterprise’s risk appetite is a separate process from developing IT risk scenarios.
Which of the following MOST affects a risk scenario?
A.A threat type
B.An event
C.An asset
D.An actor
D is the correct answer.
Justification
There is no scenario without an actor.
There is no scenario without an actor.
There is no scenario without an actor.
Someone needs to exploit the vulnerability.
Which of the following uses risk scenarios when estimating the likelihood and impact of significant risk to the enterprise?
A.An IT audit
B.A security gap analysis
C.A threat and vulnerability assessment
D.An IT security assessment
C is the correct answer.
Justification
An IT audit typically uses technical evaluation tools or assessment methodologies to enumerate risk.
A security gap analysis typically uses technical evaluation tools or assessment methodologies to enumerate risk or areas of noncompliance but does not use risk scenarios.
A threat and vulnerability assessment typically evaluates all elements of a business process for threats and vulnerabilities and identifies the likelihood of occurrence and the business impact if the threats were realized.
An IT security assessment typically uses technical evaluation tools or assessment methodologies to enumerate risk or areas of noncompliance but does not use risk scenarios.
Risk scenarios should be created PRIMARILY based on which of the following?
A.Input from senior management
B.Previous security incidents
C.Threats that the enterprise faces
D.Results of the risk analysis
C is the correct answer.
Justification
Input from senior management is not as critical as enterprise threats in developing risk scenarios.
Previous incidents are not as critical as enterprise threats in developing risk scenarios.
When creating risk scenarios, the most important factor to consider is the likelihood of threats or threat actions occurring due to the risk.
Risk scenarios should be an input to the risk analysis, not vice versa.
The organizational structure, policies, standards, technology, architecture and controls criteria are PRIMARILY used to:
A.develop risk reporting.
B.analyze risk scenarios.
C.perform risk analysis.
D.determine risk appetite.
B is the correct answer.
Justification
A risk report contains the result of the risk analysis and evaluation based on the criteria.
The organizational structure, policies, standards, technology, architecture and controls are the criteria used when analyzing risk scenarios.
Risk analysis is based on the risk scenarios that have already considered organizational criteria.
The determination of risk appetite has an influence on how management develops risk scenarios and evaluates risk criteria.
Which of the following BEST estimates the likelihood of significant events affecting an enterprise?
A.Threat analysis
B.Cost-benefit analysis
C.Scenario analysis
D.Countermeasure analysis
C is the correct answer.
Justification
Threat analysis does not provide sufficient information to estimate likelihood. While there may be a threat, many other factors, including existing controls, must be considered to determine the likelihood of a threat.
Cost-benefit analysis is used in selecting controls and does not help estimate the likelihood of significant events.
Scenario analysis, along with vulnerability analysis, best determines whether a particular risk is relevant to the enterprise, and helps estimate the likelihood that significant events will affect the enterprise.
Countermeasure analysis is used to assess controls that address specific attacks, sometimes while an attack is occurring. Countermeasure analysis does not help estimate the likelihood of significant events.
An enterprise assessed risk by identifying the potential methods of attack, vulnerabilities, motivations and skill of the attacker, and possible damage. What approach to risk scenario development was used?
A.Vulnerability-based
B.Asset/impact
C.Business impact analysis
D.Threat-based
D is the correct answer.
Justification
A vulnerability-based approach to risk assessment identifies the enterprise’s known vulnerabilities and attempts to determine the threats that could exploit them.
The asset/impact approach to risk assessment identifies critical and sensitive assets and the ways they could be damaged.
The business impact analysis approach to risk assessment determines the impact of the risk on target assets over time.
A threat-based approach to risk assessment identifies potential methods of attack, vulnerabilities that could be exploited, intent and skill of the attacker, and potential damage.
When developing risk scenarios for an enterprise, which of the following is the BEST approach?
A.The top-down approach to consider overall business impact
B.The top-down approach because it has the support of senior management
C.The bottom-up approach to understand the impact of system outages more accurately
D.The top-down and the bottom-up approach because they have different perspectives
D is the correct answer.
Justification
Business impact is important, and IT risk must be measured relative to associated business practices. However, an exclusive assessment from business objectives will lack detail grounded in daily processes.
Management buy-in is essential, but risk scenarios should also consider the impact of individual system outages.
A bottom-up approach is too narrow; risk cannot be separated from business objectives.
Top-down and bottom-up risk scenario development integrates both perspectives. In a top-down approach, one starts from the overall business objectives and performs an analysis of the most relevant and probable risk scenarios affecting business objectives. The bottom-up approach builds on generic risk scenarios to create more concrete and customized scenarios, applied to the individual enterprise’s situation. A combined approach affords the best of both.
Which of the following approaches results in risk scenarios applicable to an enterprise’s identified risk?
A.A bottom-up approach based on generic scenarios
B.A bottom-up approach emphasizing threat events
C.A top-down approach based on magnitude of loss
D.A top-down approach driven by business objectives
D is the correct answer.
Justification
Generic risk scenarios help ensure that no risk is overlooked; they encourage the enterprise to avoid blind spots outside its normal frame of reference. However, the bottom-up approach is not tailored to specific identified risk. Most enterprises will combine the bottom-up and top-down approaches to ensure business relevance.
Threat events represent only one component of a risk scenario.
Magnitude of loss does not entail probability. If risk scenarios are developed primarily on the basis of potential impact, they may become highly theoretical and appear unrealistic to business owners.
A top-down approach ensures that an enterprise’s unique perspectives and business objectives are prioritized in risk scenarios.
Which of the following BEST addresses the potential for bias in developing risk scenarios?
A.Using representative and significant historical data
B.Securing participation of a large team of functional experts
C.Establishing a clearly defined escalation process
D.Integrating quantitative risk analysis techniques
A is the correct answer.
Justification
Using representative and significantly broad historical data helps to avoid bias that may otherwise characterize the selection of data by individual functional experts.
Securing participation of a large team of functional experts can help reduce subjectivity to some extent. However, it will not preclude bias because each expert may provide data based on individual experience and knowledge.
Establishing a clearly defined escalation process will provide opportunities to challenge risk values but in itself will not address potential bias.
Integrating quantitative risk analysis techniques will not reduce bias unless factual internal and external data are available in the first place.
When developing IT-related risk scenarios with a top-down approach, it is MOST important to identify the:
A.information system environment.
B.business objectives.
C.hypothetical risk scenarios.
D.internal and external risk scenarios.
B is the correct answer.
Justification
Top-down risk scenario development identifies the enterprise’s business objectives and builds risk scenarios based on risk that may jeopardize those objectives. The information system environment would be a risk factor.
Typically, top-down risk scenario development is performed by identifying business objectives and recognizing risk scenarios with the greatest potential to jeopardize business objectives.
The identification of generic risk scenarios is usually related to a bottom-up risk identification method.
It is important to identify both external and internal risk scenarios.
Risk scenarios enable the risk assessment process because they:
A.cover a wide range of potential risk.
B.minimize the need for quantitative risk analysis techniques.
C.segregate IT risk from business risk for easier risk analysis.
D.help estimate the frequency and impact of risk.
D is the correct answer.
Justification
When used correctly, risk scenarios can address a wide range of risk, but this is not always the result. However, risk scenarios always help to address the frequency and impact of risk—two key elements in the risk assessment process.
Risk scenarios do not necessarily minimize the need for quantitative risk analysis.
Risk scenarios can be applied to both IT risk and business risk and there is no question of segregating the risk.
While risk scenarios may address a wide range of risk, risk scenarios help to estimate the frequency and impact of risk—two key elements of the risk assessment process. These elements aid subsequent steps in risk management by making risk relevant to business process owners.
Which of the following is MOST effective in assessing business risk?
A.A use case analysis
B.A business case analysis
C.Risk scenarios
D.A risk plan
C is the correct answer.
Justification
A use case analysis identifies business requirements for a system or process.
Business cases are generally part of a project charter and help define the project’s purpose.
Risk scenarios are the most effective technique in assessing business risk. Scenarios help determine the likelihood and impact of an identified risk.
A risk plan is the output of the risk assessment.
Which of the following factors should be assessed after the likelihood of a loss event has been determined?
A.Risk tolerance
B.Magnitude of impact
C.Residual risk
D.Compensating controls
B is the correct answer.
Justification
Risk tolerance reflects acceptable deviation from acceptable risk. Risk tolerance requires quantification of risk, which in turn requires determining the magnitude of impact.
Once likelihood has been determined, the next step is to determine magnitude of impact.
Residual risk is the risk that remains after management implements a risk response. It cannot be calculated until controls are selected.
Compensating controls are internal controls that reduce the risk of an existing or potential control weakness that can result in errors and omissions. They would not be assessed directly in conjunction with assessing the likelihood of a loss event.
Which of the following statements is a risk scenario?
A.The password for the configuration of the tape backup system is set to the vendor default.
B.A program that processes records does not include data input validation.
C.Dedicated capacity for processing on an enterprise system exceeds projected maximum usage, resulting in wasted infrastructure resources.
D.Attackers develop a new piece of malware based on a known, but patched, vulnerability.
C is the correct answer.
Justification
If the password to configure a tape backup system is set to its vendor default, the password reflects the state of a technology control. Its state is not an event that could result in a loss.
A program that processes records without data input validation presents a vulnerability. It is not an event that could result in a loss.
Dedicated processing capacity that exceeds projected maximum usage and therefore results in wasted infrastructure resources constitutes potential loss.
If attackers develop a new piece of malware based on a known, but patched, vulnerability, their actions constitute a threat, but not a valid risk, because the vulnerability has already been patched.
Which of the following risk management activities initially identifies critical business functions and key business risk?
A.Risk monitoring
B.Risk analysis
C.Risk assessment
D.Risk evaluation
C is the correct answer.
Justification
Risk monitoring provides timely information on the actual status of risk in the enterprise.
Risk analysis estimates the frequency and magnitude of IT risk scenarios.
Risk assessment identifies and evaluates risk and its potential effects. It includes recognizing and assessing critical functions and processes necessary for an enterprise to continue operating, defines the controls in place to reduce exposure, and evaluates the cost of such controls.
Risk evaluation compares estimated risk against given risk criteria to determine the significance of the risk.
The MOST important of the following external factors that should be considered in risk assessment is:
A.the discovery of new vulnerabilities.
B.the number of viruses and other malware being developed.
C.international crime statistics and political unrest.
D.the connectivity of many unsecured devices on the Internet.
D is the correct answer.
Justification
Discovery of new vulnerabilities is relevant only if they affect the assets in use by an enterprise.
The number of new malware types being developed is something worth watching, but it is not a factor that the risk professional can use directly to calculate risk for a risk assessment report.
International crime statistics and political unrest may raise concerns, but compared to unsecured devices they are not an immediate threat.
The proliferation of unsecured devices (i.e., the Internet of Things) creates a serious external threat that must be considered.
Which risk assessment technique would the practitioner use to analyze system exposure to personnel?
A.Hazard and operability studies
B.Markov analysis
C.Human reliability analysis
D.Scenario analysis
C is the correct answer.
Justification
The hazard and operability studies analysis technique does not focus exclusively on human error.
The Markov analysis technique does not exclusively focus on human error.
Human reliability analysis exclusively focuses on the effects of human error in enterprise systems.
The scenario analysis technique does not exclusively focus on human error.
Once a risk assessment has been completed, the documented test results should be:
A.destroyed.
B.retained.
C.summarized.
D.published.
B is the correct answer.
Justification
Test results should be stored in a secure manner for future reference and comparison and not destroyed.
Test results should be retained in order to ensure that future tests can be compared with past results and ensure reporting consistency.
Test results are summarized as part of the risk assessment process.
Assessment results are not usually published due to vulnerability disclosure.
Risk assessment techniques should be used by a risk practitioner to:
A.maximize the return on investment.
B.provide documentation for auditors and regulators.
C.justify the selection of risk mitigation strategies.
D.quantify the risk that would otherwise be subjective.
C is the correct answer.
Justification
Maximizing the return on investment may be a key objective of implementing risk responses, but it is not part of the risk assessment process.
A risk assessment does not focus on auditors or regulators as primary recipients of the risk assessment documentation. However, risk assessment results may provide input into the audit process.
A risk practitioner should use risk assessment techniques to justify and implement a risk mitigation strategy as efficiently as possible.
Risk assessment is generally high-level, whereas risk analysis can be either quantitative or qualitative, based on the needs of the enterprise.
The PRIMARY reason to have the risk management process reviewed by an independent risk management professional is to:
A.validate cost-effective solutions for mitigating risk.
B.validate control weaknesses detected by the internal team.
C.assess the validity of the end-to-end process.
D.assess whether the risk profile and risk factors are properly defined.
C is the correct answer.
Justification
Cost-effective solutions can be provided by the internal teams.
The internal team can find weaknesses. It is not necessary to involve an external risk professional to validate the weaknesses detected by the internal team.
The independent risk professional will be unbiased to review the risk management process end to end. The independent reviewer will not have any involvement in any stage of the risk management process and will be unaffected by all internal factors.
The risk profile and risk factors are properly defined when the risk assessment process is performed correctly. An independent assessment may result in further improvements.
At the end of which phase of risk management would information about newly discovered risk be communicated to decision makers and relevant stakeholders?
A.Risk identification
B.Risk response and mitigation
C.Risk assessment
D.Risk and control monitoring and reporting
C is the correct answer.
Justification
The risk identification phase determines what could happen to cause a potential loss and to gain insight into how, where and why the loss might happen. Until the risk has been analyzed, the likelihood and impact are unknown. Risk analysis occurs after risk identification and prior to risk communication.
In the risk response and mitigation phase, controls to reduce, retain, avoid or transfer risk should be selected, and a risk treatment plan should be defined. The risk analysis must be communicated to the risk owners for them to select the proper risk response.
During the risk assessment phase, identified risk is being analyzed and evaluated for likelihood and impact. Risk-based decision-making is enabled through communication of the results of the risk assessment.
In the risk and control monitoring and reporting phase, risk should be monitored and reviewed to identify any changes in the context of the enterprise at an early stage and to maintain an overview of the complete risk picture.
IT risk is measured by its:
A.level of damage to IT systems.
B.impact on business operations.
C.cost of countermeasures.
D.annual loss expectancy.
B is the correct answer.
Justification
Measurement by IT damage alone is not comprehensive; business risk must also be considered.
IT risk includes information and communication technology risk but is primarily measured by its impact on the business. IT risk is the business risk associated with the use, ownership, operation, involvement, influence and adoption of IT within an enterprise.
The cost and benefit of countermeasures is concerned with risk response, not with risk assessment.
Annual loss expectancy is a quantitative measure and must be used in conjunction with qualitative measures, such as loss of reputation.
The PRIMARY benefit of using a maturity model to assess the enterprise’s data management process is that it:
A.can be used for benchmarking.
B.helps identify gaps.
C.provides goals and objectives.
D.enforces continuous improvement.
B is the correct answer.
Justification
While maturity models can be used for benchmarking, the benchmarking is not a primary benefit.
Maturity models can be used to help identify gaps between the current and the desired state to help enterprises determine necessary remediation efforts.
While maturity models help determine goals and objectives, their primary value is to identify current and desired states. Understanding gaps between the two states can help define remedial action.
Continuous improvement may not always be an objective of an enterprise, particularly when the current maturity level meets its needs.
The PRIMARY result of a risk assessment process is:
A.a defined business plan.
B.input for risk-aware decisions.
C.data classification.
D.minimized residual risk.
B is the correct answer.
Justification
Risk assessment deliverables are not the primary input into the business plan as a business plan defines how a business goal will be achieved.
Risk assessment identifies and prioritizes risk and relates the aggregated risk to the enterprise’s risk appetite and risk tolerance levels to enable risk-aware decision-making.
Establishing data classification can be one outcome of a risk assessment but it is not the primary result of risk assessment.
Risk assessment itself does not minimize any risk. Residual risk is an outcome after controls are implemented. It is an outcome of risk assessment and risk treatment.
Which data analysis method will be MOST effective in a comprehensive review of both hardware and human failures to identify the source of an incident?
A.Cause and effect analysis
B.Fault tree analysis
C.Sensitivity analysis
D.Bayesian analysis
B is the correct answer.
Justification
Cause and effect analysis identifies why processes and controls do not operate as intended.
Fault tree analysis can identify potential causes of failures before the failures occur, not afterward. It combines assessment of potential hardware and human failures to identify the source of an incident.
Sensitivity analysis (also known as what-if or simulation analysis) can predict the outcome of a decision under a given set of assumptions but not the root cause of an event or incident.
Bayesian analysis is a technique of risk analysis, not a method of data analysis. It revises the assessment of probability for a given hypothesis as more evidence or information becomes available.
What is a PRIMARY advantage of performing a risk assessment on a consistent basis?
A.It lowers the costs of assessing risk.
B.It provides evidence of threats.
C.It indicates trends in the risk profile.
D.It eliminates the need for periodic audits.
C is the correct answer.
Justification
There may be some minor cost benefits to performing risk assessments on a consistent basis, but that is not a primary benefit.
A risk assessment provides evidence of risk; however, it is not intended to provide evidence of threats.
Tracking trends in evolving risk is of significant benefit to managing risk and ensuring that appropriate controls are in place.
The performance of risk assessment on a consistent basis does not preclude the requirement to perform periodic independent audits.
A risk practitioner has become aware of a potential merger with another enterprise. What action should the risk practitioner take?
A.Evaluate how the changes in business operations and culture could affect the risk assessment.
B.Monitor the situation to see if any new risk emerges due to the proposed changes.
C.Continue to monitor and enforce the current risk program because it is already tailored appropriately for the enterprise.
D.Implement changes to the risk program to prepare for the transition.
A is the correct answer.
Justification
Changes to the business may impact risk calculations, and the risk practitioner should be proactive and be prepared to deal with any changes as they happen.
The risk practitioner should continue to evaluate the risk levels, but should also evaluate how new risk may emerge as a result of changes to the business.
Risk assessment is a continuous process and should be revisited whenever a significant change is pending.
Because this is a potential change, the risk practitioner should prepare for, but not immediately make, changes to the risk program.
Which of the following is MOST important during the quantitative risk analysis process?
A.Statistical analysis
B.Decision trees
C.Expected monetary value
D.Net present value
C is the correct answer.
Justification
Statistical analysis may be used because it helps risk managers make better decisions under conditions of uncertainty. However, it is not the most important.
Decision trees help determine the optimal course of action in complex situations with uncertain outcomes.
Expected monetary value reflects the weighted average of probable outcomes. It represents the expected average payoff if you make a given decision, using the same payoffs and probabilities, an infinite number of times.
Net present value is calculated by using an after-tax discount rate of an investment and a series of expected incremental cash outflows (the initial investment and operational costs) and cash inflows (cost savings or revenues) that occur at regular periods during the life cycle of the investment.