Chapter 3: Risk Response and Reporting Flashcards

1
Q

What is the MOST important control that should be in place to safeguard against the misuse of the corporate social media account?

A.Social media account monitoring
B.Two-factor authentication
C.Awareness training
D.Strong passwords

A

B is the correct answer.

Justification
Social media account monitoring is a detective control that identifies violations after the fact, as opposed to a proactive measure, such as two-factor authentication.
Use of two-factor authentication will proactively protect the account from unauthorized access.
Awareness training may be effective with legitimate users; however, two-factor authentication is a preventive control as opposed to a deterrent control.
Using strong passwords will help prevent unauthorized access; however, two-factor authentication provides a proactive control in case the password is compromised.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the FIRST step for a risk practitioner when an enterprise has decided to outsource all IT services and support to a third party?

A.Validate that the internal systems of the service provider are secure.
B.Enforce the regulations and standards associated with outsourcing data management for restrictions on transborder data flow.
C.Ensure that security requirements are addressed in all contracts and agreements.
D.Build a business case to perform an on-site audit of the third-party vendor.

A

C is the correct answer.

Justification
A risk practitioner will rarely have access to validate the security of a third party, and must seek other assurances from an external audit or other standards.
A risk practitioner can advise on risk associated with outsourcing and regulations but cannot enforce such rules.
A contract only covers the topics listed in the contract. If security is not explicitly included in the contract terms, the enterprise may not be properly protected.
Even though IT management has been outsourced, the enterprise that outsourced the service function remains responsible for protecting its data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is the MOST effective means of ensuring that third-party providers comply with the enterprise’s information security policy?

A.Security awareness training
B.Penetration testing
C.Service level monitoring
D.Periodic auditing

A

D is the correct answer.

Justification
Training can increase user awareness of the information security policy but is not more effective than auditing.
Penetration testing can identify security vulnerability but cannot ensure information compliance.
Service level monitoring can only pinpoint operational issues in the enterprise’s operational environment.
A regular audit exercise can spot any gaps in information security compliance.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A critical business function has been outsourced to an external supplier. Management has assigned a project team to oversee the transition and successful handoff to the new supplier and has requested regular status reports of project progress and challenges. The risk practitioner would be responsible for which of the following tasks?

A.Design and implement action plans to address risk associated with the project.
B.Select controls to reduce risk associated with the project.
C.Review and maintain the supplier’s risk register and risk profile.
D.Consult with and support the project team to implement action plans.

A

D is the correct answer.

Justification
Risk practitioners do not design and implement action plans to address risk. Rather, they provide guidance to risk owners on the selection of controls to reduce risk to an acceptable level.
Risk practitioners do not select the controls but provide guidance to risk owners on their selection.
This is a task for the external supplier, not the client.
The risk practitioner’s role is to consult with or assist risk owners in the development of risk action plans that include key elements (e.g., risk response/mitigation, cost, target date).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following choices is the MOST important part of any outsourcing contract?

A.The right to audit the outsourcing provider
B.Provisions to assess the compliance of the provider
C.Procedures for dealing with incident notification
D.Requirements to encrypt hosted data

A

B is the correct answer.

Justification
The service provider may not allow the outsourcing company the ability to conduct an audit directly, but may provide proof of compliance conducted by an independent auditor.
If a contract contains no provision to monitor and hold a supplier accountable for security, then the outsourcing enterprise cannot ensure compliance or proper handling of its data.
The outsourcing contract usually will not contain details on the procedures to follow when dealing with incidents.
Encryption may not be required for all data; it may be required only for sensitive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

An enterprise has outsourced several business functions to a firm in another country, including IT development, data hosting and support. What is the MOST important question the risk professional will ask in relation to the outsourcing arrangements?

A.Are policies and procedures in place to handle security exceptions?
B.Is the outsourcing supplier meeting the terms of the service level agreements?
C.Is the security program of the outsourcing provider based on an international standard?
D.Are specific security controls mandated in the outsourcing contract/agreement?

A

D is the correct answer.

Justification
There should be policies and procedures to handle incidents or exceptional circumstances; however, this is not the most important consideration.
Whether the provider meets the service level agreements (SLAs) is of concern to the outsourcing enterprise and the auditors; however, this is not the most important consideration.
The contract should stipulate the required levels of security and risk management. Basing the security program on a recognized international standard may be an excellent foundation for the security program but is not the most important consideration.
Without enumerating security requirements directly in the outsourcing contract, the outsourcing company has no assurance that the provider will comply with specific security requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which of the following is the MOST important consideration for an enterprise structuring a contract with a third party? The inclusion of a:

A.right-to-audit clause.
B.confidentiality clause.
C.limitation of liability.
D.service level agreement.

A

B is the correct answer.

Justification
A right-to-audit clause is important, but alternatives exist. For example, the enterprise could review third-party audit reports.
The contract should have a confidentiality clause because the third-party vendor must have proper controls over the enterprise’s data, and inclusion in the contract provides contractual protections.
Limitation of liability is not necessary. It typically limits the third party’s liability.
A service level agreement is necessary, but confidentiality is a more important consideration.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which of the following threats associated with third-party management is BEST addressed through the establishment of a service level agreement?

A.Service interruption at the client home office
B.Undetected degradations in service performance
C.Financial losses resulting from service interruption
D.Bankruptcy of the third-party organization

A

C is the correct answer.

Justification
Third-party service level agreements (SLAs) do not guarantee against system failure at the client home office.
The third party’s reporting related to SLAs may not be comprehensive enough to notify parties when there is a degradation in service.
An SLA addresses immediate and measurable financial losses due to service levels not being met.
Many SLAs will provide monetary payments should levels not be maintained, but such guarantees are based on the solvency of the enterprise making them. In cases of bankruptcy, a customer entity that has an SLA claim will be only one of many creditors competing for access to the provider’s assets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What should an enterprise use to assess the security controls of a third party hosting its server infrastructure?

A.Enterprise security requirements
B.Internal audit recommendations
C.Applicable laws and regulations
D.Security good practices

A

A is the correct answer.

Justification
The enterprise should develop its own security requirements considering many factors such as audit recommendations and good practices. Third-party security controls should be evaluated in the context of the enterprise’s security requirements, which may inform the terms of any agreement with a third party regarding hosting.
Internal audit recommendations help management improve the security control environment but do not constitute specific requirements.
Compliance with applicable laws and regulations reflects a subset of the enterprise’s own security requirements.
Security good practices should be considered in developing the enterprise’s own security requirements.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which of the following is the BEST way to ensure that contract programmers comply with organizational security policies?

A.Have the contractors acknowledge the security policies in writing.
B.Perform periodic security reviews of the contractors.
C.Explicitly refer to contractors in the security standards.
D.Create penalties for noncompliance in the contracting agreement.

A

B is the correct answer.

Justification
Written acknowledgments of security policies do not help detect the failure of contract programmers to comply.
Periodic reviews are the most effective way of obtaining compliance because they provide insight into which contractors are following organizational policies and which are not.
Referring to the contract programs within security standards does not help detect the failure of contract programmers to comply with organizational security policies. It may establish responsibility for a control implementation and maintenance, but the control ownership and accountability remains within the enterprise itself.
Penalties do not help detect failure of contract programmers to comply with organizational security policies and can only be enforced once they are detected either by an audit or an incident.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following MOST effectively ensures that service provider controls are within the guidelines set forth in the enterprise’s information security policy?

A.Service level monitoring
B.Penetration testing
C.Security awareness training
D.Periodic auditing

A

D is the correct answer.

Justification
Service level monitoring helps pinpoint the service provider’s operational issues but is not designed to ensure compliance.
Penetration testing helps identify system vulnerabilities but is not designed to ensure compliance.
Security awareness training is a preventive measure to increase user awareness of the information security policy but is not designed to ensure compliance.
Periodic audits help ensure compliance with the enterprise’s information security policy.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following outcomes of outsourcing noncore processes is of GREATEST concern to the management of an enterprise?

A.Total cost of ownership exceeds projections.
B.Internal information systems experience is lost.
C.Employees of the vendor are disloyal to the client enterprise.
D.Processing of sensitive data is subcontracted by the vendor.

A

D is the correct answer.

Justification
Total cost of ownership (TCO) exceeding projections is significant but not uncommon. Because TCO is based on modeling, some variation can be expected.
Loss of internal information systems experience can be problematic when core processes or subprocesses are outsourced. However, for noncore processes, the loss of such experience would not be a concern.
Lack of vendor loyalty to the client enterprise is generally managed via service level agreements.
The greatest risk in third-party relationships is the fact that the enterprise is ceding direct control of its IS processes. Subcontracting will increase this risk; therefore, the subcontracting process must be reviewed because sensitive data are involved.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following is an effective monitoring process to ensure a third party is performing in accordance with contract requirements?

A.Review independent audit reports
B.Review the third party’s service level agreements
C.Review the number of third party security-related incidents
D.Ongoing third-party oversight

A

D is the correct answer.

Justification
Reviewing audit reports is only one aspect of the process. Third-party management encompasses more than audit reports.
The service level agreement is one of many ways to measure contractual compliance.
Reviewing the number of incidents is only one aspect of the ongoing monitoring process.
Third-party management should be an ongoing process that monitors for compliance with agreements, adequate insurance coverage, business continuity tests, results of independent audits, and policy reviews.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following poses the GREATEST risk to an enterprise that recently engaged the services of a cloud provider?

A.The cloud provider’s primary facility is in the same vicinity as the subscriber.
B.The service level agreement is ambiguous.
C.References from other customers were not obtained.
D.Auditing the vendor requires dependence on a third-party audit firm.

A

B is the correct answer.

Justification
There is no direct impact if the subscriber and the cloud provider reside in the same geographic region, provided the latter has a continuity plan that is unlikely to be affected by the same local event.
If the service level agreement is ambiguous, it will be difficult to determine whether the provider complies.
References are important, but they cannot provide reasonable assurance that the vendor will deliver.
Inability to audit a third-party provider is less than desirable; however, it is allowed in reporting under Statement on Standards for Attestation Engagements No. 18 (SSAE 18).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following practices BEST mitigates the risk associated with outsourcing a business function?

A.Performing audits to verify compliance with contract requirements
B.Requiring all vendor staff to complete annual awareness training sessions
C.Retaining copies of all sensitive data on internal systems
D.Reviewing the financial records of the vendor to verify financial soundness

A

A is the correct answer.

Justification
When an outsourcing relationship is established, the risk of noncompliance with the agreement must be met through review, monitoring and enforcement of the contract terms. Therefore, conducting regular audits to verify that the vendor is compliant with contract requirements is an important practice to mitigate the outsourcing risk.
Requiring the vendor’s staff to complete annual awareness training sessions would not provide the same level of mitigation as the verification of adherence to contract requirements.
Keeping copies of all sensitive data is an unnecessary expenditure and may result in errors or inconsistencies with data stored at the vendor site. In addition, duplicating sensitive data makes the enterprise liable for protecting data in two or more locations and increases the possibility of inappropriate access or data leakage.
Although it is common practice to review financial solvency before selecting a vendor to ensure that the vendor can function without the threat of liquidation for the foreseeable future, reviewing solvency is not the best practice to address risk related to outsourcing an IT or business function.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A risk treatment plan should PRIMARILY specify the:

A.responsibility for implementing the chosen risk treatment.
B.approach to integrate risk treatment into day-to-day operations.
C.risk acceptance decisions made by the risk owners.
D.best approach to implement all the identified risk treatment options.

A

A is the correct answer.

Justification
A risk treatment plan will provide the details needed to implement the risk treatment options and the selected controls, including the responsibility for implementing the chosen risk treatment.
Integrating risk treatment into day-today operations is not a part of the risk treatment plan, but a part of the risk strategy.
If the risk is already accepted by risk owners, a risk treatment plan is not required.
It may not be necessary or feasible to implement all identified risk treatment options.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

An enterprise has just completed an information systems audit and numerous findings have been generated. This list of findings is BEST addressed by:

A.a risk treatment plan.
B.a business impact analysis.
C.an incident management plan.
D.revisions to information security procedures.

A

A is the correct answer.

Justification
A risk treatment plan is the proper tool to address the identified risk. This will put forward a schedule and strategy for addressing the audit findings.
A business impact analysis is a process to determine the impact of losing the support of any resource.
An incident management plan is used to prepare for, detect, respond to, and mitigate the effects of incidents.
Revisions to information security procedures would likely address only a portion of the audit findings.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Risk treatment plans are necessary to describe how the:

A.identified risk is further analyzed.
B.chosen treatment options will be implemented.
C.accepted risk is treated.
D.risk indicators will monitor the risk.

A

B is the correct answer.

Justification
Risk treatment plans describe the plan of action for the chosen treatment and would not further analyze identified risk.
A risk treatment plan includes the plan of action for the chosen treatment, how it will be implemented, who will implement it, key dates and resource requirements.
Once the risk is accepted, a risk treatment plan is not needed.
Risk indicators are used to identify emerging risk and are not part of a risk treatment plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The risk treatment plan PRIMARILY provides treatment for:

A.high risk areas reported to senior management.
B.identified risk that exceeds risk tolerance.
C.every risk identified on the risk register.
D.risk that has already materialized.

A

B is the correct answer.

Justification
The risk treatment plan addresses all risk that exceeds risk tolerance, not just high-risk items.
Risk treatment plans would cover all the risk identified in the risk register that exceeds the enterprise risk tolerance level and, therefore, needs to be further treated.
Not every identified risk requires a risk treatment plan.
Risk treatment plans treat all risk, not just materialized risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

In the event that available resources for risk treatment are not sufficient, the risk treatment plan should:

A.define the priorities across all treatments to assist in resource allocation.
B.recommend postponing the treatment until resources are available.
C.recommend reassessing the risk treatment options.
D.suggest increasing the priority of the treatment to ensure resource availability.

A

A is the correct answer.

Justification
When the available resources for treating the risk are not sufficient, the risk treatment plan should include prioritization of the risk so resources can be properly allocated.
Postponing the risk treatment activities until resources are available may not be the most appropriate option as the prioritization should drive resource allocation.
Prioritization of risk treatment options has already been determined through a defined process. Without assigning any priorities to the risk, the reassessment of options would not be the most appropriate recommendation.
Suggesting a higher priority to the treatment would not consider the priorities of other efforts in the risk treatment plan.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following would BEST help finalize the risk treatment plan?

A.Vulnerability analysis
B.Impact analysis
C.Cost-benefit analysis
D.SWOT analysis

A

C is the correct answer.

Justification
A vulnerability analysis provides insight into which risk to treat but is not useful when evaluating risk treatment options.
Impact analysis is a part of the risk assessment but on its own would not help finalize a risk treatment plan.
A cost-benefit analysis helps determine if the benefit of a control outweighs the cost of implementing the control.
A SWOT (strengths, weaknesses, opportunities and threats) analysis can be helpful, but the results must be translated in terms of risk, including costs and benefits, to be useful.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A risk response report includes recommendations for:

A.acceptance.
B.assessment.
C.evaluation.
D.quantification.

A

A is the correct answer.

Justification
Acceptance of a risk is an alternative to be considered in the risk response process.
The risk assessment process is completed prior to determining appropriate risk responses.
Risk evaluation is part of the risk assessment process that is completed prior to determining appropriate risk responses.
Risk quantification is achieved during risk analysis; it is an input into the risk response process and occurs prior to determining appropriate risk responses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The GREATEST benefit of implementing a risk treatment plan is:

A.to reduce the impact and likelihood of risk occurrence.
B.to identify the unmitigated risk that can be transferred.
C.to exploit the risk to test organizational preparedness.
D.to enhance the overall risk appetite of the enterprise.

A

A is the correct answer.

Justification
Implementing the risk treatment plan reduces the negative impact and likelihood of a risk occurrence.
Transferring is not the only response option for unmitigated risk.
Exploiting the risk is not the aim of the risk treatment plan and can create more risk.
Risk appetite is established to identify the level of acceptable risk in an enterprise. Implementing a risk treatment plan will not influence the risk appetite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

While monitoring the risk treatment plans for different risk, senior management is MOST concerned if a high percentage of:

A.incidents are not in the scope of the risk treatment plan.
B.risk issues are within the risk appetite of the enterprise.
C.risk treatment plans have been developed for all identified risk.
D.risk treatment action plans have been approved.

A

A is the correct answer.

Justification
Unexpected incidents identify risk that were not formally part of the current risk treatment plan. This is a chief concern because it indicates the incompleteness of the risk register and risk management process.
Risk issues that fall within the risk appetite of an enterprise would not necessarily be a major concern for management. They are already in scope of the current risk treatment plan.
The development of risk treatment plans is important; however, management should have concern over realized risk (in scope) that was not previously part of a risk treatment plan.
Approved risk treatment plans are not a concern because the actions are taking place to implement or adopt responses to risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which of the following is the MOST important information to include in a risk treatment plan that already has an appropriate resolution and a date for completion?

A.responsible personnel.
B.mitigating factors.
C.likelihood of occurrence.
D.cost of completion.

A

A is the correct answer.

Justification
Risk response activities must be assigned to a responsible person or group; if this assignment is not included, it will be unclear who will implement the countermeasure.
Mitigating factors can be included but are not as important as responsible personnel.
Compensating controls can be included but are not as important as responsible personnel.
Cost for completion is an optional field and is not necessary.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following is the MOST desirable strategy when developing risk mitigation options associated with the unavailability of IT services due to a natural disaster?

A.Assume the worst-case incident scenarios.
B.Target low-cost locations for alternate sites.
C.Develop awareness focused on natural disasters.
D.Enact multiple tiers of authority delegation.

A

A is the correct answer.

Justification
To be prepared for a natural disaster, it is appropriate to assume the worst-case scenario; otherwise, the resulting impact may exceed the enterprise’s ability to recover.
Setting up a low-cost location for an alternate site may not always be a good strategy against natural disasters. Adequate investment should be made based on an impact analysis and the enterprise’s acceptable level of risk .
An awareness training program is a key factor for business continuity. However, its effectiveness may be limited.
Delegation of authority will work somewhat in case of emergency. However, it may be a situational decision in the event of natural disaster.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following leads to the BEST optimal return on security investment?

A.Deploying maximum security protection across all the information assets
B.Focusing on the most important information assets and then determining their protection
C.Deploying minimum protection across all the information assets
D.Investing only after a major security incident is reported to justify investment

A

B is the correct answer.

Justification
Deploying maximum controls across all information assets will overprotect some less critical information assets; therefore, investment will not be optimized.
To optimize return on security investment, the primary focus should be identifying the important information assets and protecting them appropriately to optimize investment (i.e., important information assets get more protection than less important or critical assets).
Deploying minimum protection across all the information assets will compromise the security of the more critical information assets; therefore, investment will not be optimized.
Investing only after a major security event is a reactive approach that may severely compromise business operations—in some cases, to the extent that the business does not survive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

When a risk cannot be sufficiently mitigated through manual or automatic controls, which of the following options will BEST protect the enterprise from the potential financial impact of the risk?

A.Insuring against the risk
B.Updating the IT risk registry
C.Improving staff training in the risk area
D.Outsourcing the related process to a third party

A

A is the correct answer.

Justification
An insurance policy can compensate the enterprise monetarily for the impact of the risk by transferring the risk to the insurance company.
Updating the risk registry (with lower values for impact and probability) will not change the risk; it will only change management’s perception of it.
Staff capacity to detect or mitigate the risk may potentially reduce the financial impact, but insurance allows for the risk to be completely mitigated.
Outsourcing the process containing the risk does not necessarily remove or change the risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following risk response options is MOST likely to increase the liability of the enterprise?

A.Risk acceptance
B.Risk reduction
C.Risk transfer
D.Risk avoidance

A

A is the correct answer.

Justification
An enterprise may choose to accept risk without knowing the correct level of risk that is being accepted; this may result in accusations of negligence.
Risk reduction indicates an attempt to reduce the risk level. It may not be as effective as intended, but is not likely to increase the level of risk.
Risk transfer allocates a portion of risk to another party (e.g., insurance).
Risk avoidance will terminate a process that is considered to have an unacceptable level of risk that cannot be mitigated economically.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which of the following would BEST help an enterprise select an appropriate risk response?

A.An analysis of change in the risk environment
B.An analysis of risk that can be transferred were it not eliminated
C.An analysis of the likelihood and impact of various risk scenarios
D.An analysis of control costs and benefits

A

D is the correct answer.

Justification
The degree of change in the risk environment will not provide sufficient information on actual controls and benefits to make the decision.
Risk can never be eliminated and an analysis of what risk can be transferred will be inadequate for a complete risk response.
Likelihood and impact help establish the amount or level of risk but are inadequate for selecting an appropriate risk response.
An analysis of costs and benefits for controls helps an enterprise understand if it can mitigate the risk to an acceptable level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following is BEST addressed by transferring risk?

A.An antiquated fire suppression system in the computer room
B.The threat of disgruntled employee sabotage
C.The threat of disgruntled employee theft
D.A building located in a 100-year flood plain

A

D is the correct answer.

Justification
Although an enterprise may hold insurance policies for physical assets such as computer equipment, the most appropriate risk remediation strategy is to update the fire suppression system.
This risk is not readily transferable. Full risk response planning should be performed for all risk that could happen at any time during routine business activities.
This risk is not readily transferable. Removable media policies and procedures should proactively be in place to mitigate the risk of lost or stolen media.
Purchasing an insurance policy transfers the risk of a flood. Risk transfer is the process of assigning risk to another entity, usually through the purchase of an insurance policy or through outsourcing the service.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of the following is the BEST reason for an enterprise to decide not to reduce an identified risk?

A.There is no regulatory requirement to reduce the risk.
B.There are mitigating controls in place.
C.The cost of mitigation exceeds the risk.
D.The budget for risk mitigation is limited.

A

C is the correct answer.

Justification
Regulatory requirements are not the only risk factors affecting an enterprise’s decision to reduce risk; other factors may include reputational damage, financial repercussions and other costs.
The residual risk after existing mitigating controls may still be above acceptable levels. In this case, further risk reduction would be needed.
Enterprises will accept the risk when the cost of mitigation exceeds the risk.
Enterprises may choose to reduce a risk even when the budget is exceeded, such as when the cost of reducing the risk is lower than the risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

When proposing the implementation of a specific risk treatment, a risk practitioner PRIMARILY uses a:

A.technical evaluation report.
B.business case.
C.vulnerability assessment report.
D.budgetary requirements.

A

B is the correct answer.

Justification
A technical evaluation report supplements the business case.
A manager should base any proposed risk response on a risk assessment in the context of business objectives and requirements (e.g., launching a new product, implementing changes in routine processes, compliance with regulations). The manager must document costs of controls and compare them against benefits of the risk response. The manager should understand business case development in order to illustrate the costs and benefits of risk response.
A vulnerability assessment report supplements the business case.
Budgetary requirements represent one input into the business case.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Previously accepted risk should be:

A.reassessed periodically because the risk can be escalated to an unacceptable level due to revised conditions.
B.removed from the risk log once it is accepted.
C.accepted permanently because management has already spent resources (time and labor) to conclude that the risk level is acceptable.
D.avoided next time because risk avoidance provides the best protection to the enterprise.

A

A is the correct answer.

Justification
Accepted risk should be reviewed regularly to ensure that the initial risk acceptance rationale is still valid within the current business context.
Even risk that has been accepted should be monitored for changing conditions that could alter the original decision.
The rationale for the initial risk acceptance may no longer be valid due to changes, and therefore, the risk cannot be accepted permanently.
Risk is an inherent part of business, and it is impractical and costly to eliminate all risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

The cost of mitigating a risk should not exceed the:

A.expected benefit to be derived.
B.annual loss expectancy.
C.value of the physical asset.
D.cost to exploit the weakness.

A

A is the correct answer.

Justification
The cost of mitigating a risk should never exceed the value that is expected to result from its implementation. It is illogical to spend US$1,000 to protect against a risk that would create a loss of less than US$100 in a worst-case scenario.
Remoteness of likelihood may cause the ALE to be quite low. However, it may be worthwhile to spend an amount in excess of the ALE to protect against a loss that, if it occurred, would be significantly higher.
It may be worthwhile to spend more than the value of a physical asset when that asset contains something of even higher value. The value of a backup tape is not so much the cost of the tape as what is stored on that tape.
The cost to exploit a weakness may be very low compared to its impact. For example, a freely available exploit from the Internet can be used to execute a denial-of-service attack on an e-commerce site. The amount that an enterprise spends on risk mitigation must be directly related to the likelihood and impact of a specific risk and how the control mitigates that risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

After the completion of a risk assessment, it is determined that the cost to mitigate the risk is much greater than the benefit to be derived. The BEST risk response is that the risk be:

A.treated.
B.terminated.
C.accepted.
D.transferred.

A

C is the correct answer.

Justification
Treating the risk in the described scenario incurs a cost that is greater than the benefit to be derived; this is not the best option.
Risk termination is not a risk management term; while risk can be avoided, it can generally not be terminated.
When the cost of control is more than the cost of the potential impact, the risk should be accepted.
Transferring risk is of limited benefit if the cost of the risk response is more than the cost of the potential impact and likelihood of the risk itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

It is MOST important for risk mitigation to:

A.eliminate threats and vulnerabilities.
B.reduce the likelihood of risk occurrence.
C.reduce risk within acceptable cost.
D.reduce inherent risk to zero.

A

C is the correct answer.

Justification
Threats are often outside the reach of the enterprise’s influence and cannot be affected. Vulnerabilities can be reduced but cannot be eliminated.
The likelihood of risk occurrence depends on many factors, many of which cannot be influenced internally.
Risk should be reduced or mitigated to an acceptable level within an acceptable cost.
Inherent risk of any activity cannot be affected. It is the risk level or the exposure without taking into account the actions that management has taken or might take (e.g., implementing controls). Inherent risk will also never be completely eliminated.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

In a situation in which the cost of anti-malware exceeds the loss expectancy of malware threats, what is the MOST viable risk response?

A.Risk elimination
B.Risk acceptance
C.Risk transfer
D.Risk mitigation

A

B is the correct answer.

Justification
Risk elimination is not a risk response because it is not possible to reduce risk to zero.
When the cost of a risk response (i.e., the implementation of anti-malware) exceeds the loss expectancy, the most viable risk response is risk acceptance.
Transferring risk to a third party is most viable in situations in which the potential likelihood is low and the potential impact is high. Transfer of risk—like any risk response—must be based on a cost-benefit analysis. If the cost of transferring the risk exceeds the cost of the expected loss, the most viable risk response is to accept the risk.
Risk mitigation is a method to reduce the likelihood or impact of risk to an acceptable level. Risk mitigation—like any risk response—must be based on a cost-benefit analysis. If the cost of risk mitigation exceeds the cost of the expected loss, the most viable risk response is to accept the risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

A chief information security officer (CISO) has recommended several controls, such as anti-malware, to protect the enterprise’s information systems. Which approach to handling risk is the CISO recommending?

A.Risk transference
B.Risk mitigation
C.Risk acceptance
D.Risk avoidance

A

B is the correct answer.

Justification
Risk transfer involves transferring the risk to another entity, such as an insurance company.
By implementing controls, the company is trying to reduce the risk to an acceptable level, thereby mitigating risk.
Risk acceptance involves making an educated decision to accept the risk and taking no action.
Risk avoidance involves stopping any activity causing the risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

An enterprise decides to address risk associated with an IT project by outsourcing part of the IT activities to a third party with a specialized skill set. In relation to the project itself, this is an example of:

A.risk transfer.
B.risk avoidance.
C.risk acceptance.
D.risk mitigation.

A

D is the correct answer.

Justification
Outsourcing part of an activity in itself does not transfer risk; the risk remains with the enterprise. Risk transfer assigns risk to another enterprise, usually through the purchase of an insurance policy or by outsourcing the service.
Outsourcing part of an activity is not risk avoidance. Risk avoidance is the process for systematically steering away from a specific risk, generally by not engaging in a specific activity, such as e-commerce or cloud computing. Risk avoidance generally also affects the potential opportunity offered by engaging in the activity.
Outsourcing part of an activity is not risk acceptance. Risk acceptance means that the enterprise makes an educated decision not to take action relative to a particular risk and accepts loss if it occurs.
When specific activities are outsourced to an entity with a specialized skill set, the inherent risk of the activity is reduced. The outsourcing process works as a control in this case.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which of the following activities is MOST important in determining the risk mitigation strategy?

A.Review vulnerability assessment results.
B.Perform a cost-benefit analysis related to risk acceptance.
C.Conduct a business impact analysis of affected areas.
D.Align the strategy with the security controls framework.

A

B is the correct answer.

Justification
Results from a vulnerability assessment are used in a risk assessment to determine the level of risk but are not used in the selection of a mitigation strategy.
Risk mitigation ensures that residual risk is maintained at an acceptable level. Cost-benefit analysis ensures that the cost of mitigating risk does not exceed the cost to the enterprise if an incident should occur.
Business impact analysis facilitates development of mitigation and recovery strategy because it documents processes, key deliverables and recovery time objectives. However, the cost of mitigation is the key criterion for the enterprise.
Understanding the enterprise’s security controls framework assists with design and implementation of controls once the mitigation strategy is determined for a given risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

Which of the following is MOST likely to be reduced to achieve acceptable risk?

A.Risk appetite
B.Control risk
C.Residual risk
D.Inherent risk

A

C is the correct answer.

Justification
Risk appetite is the amount of risk that an entity is willing to accept. It does not change with risk mitigation activities.
Control risk is incurred whenever controls can fall short of their objectives and is not necessarily related to residual risk.
Residual risk is the remaining risk after management has implemented a risk response. Acceptable risk is achieved when the residual risk is reduced to the levels within the enterprise’s risk appetite.
Inherent risk is a risk that is part of an activity; it cannot be minimized, only avoided by not engaging in the activity itself.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

A risk practitioner receives a message late at night that critical IT equipment will be delivered several days late due to flooding. Fortunately, a reciprocal agreement exists with another company for a replacement until the equipment arrives. This is an example of risk:

A.transfer.
B.avoidance.
C.acceptance.
D.mitigation.

A

D is the correct answer.

Justification
Risk transfer is not the correct answer because the described risk is not transferred using insurance or another risk transfer strategy.
Arranging for a standby is a risk mitigation strategy, not a risk avoidance strategy.
The risk is not accepted; if it were accepted, the enterprise would, for example, continue operating without the expected IT equipment until it was delivered.
Risk mitigation attempts to reduce the impact when a risk event occurs. Making plans such as a reciprocal arrangement with another company reduces the consequence of the risk event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

Which of the following is the BEST example of risk avoidance behavior?

A.Taking no action against the risk.
B.Outsourcing the related process.
C.Insuring against a specific event.
D.Exiting the process that gives rise to risk.

A

D is the correct answer.

Justification
Taking no action is an example of risk acceptance. No action is taken relative to a particular risk, and loss is accepted if it occurs. This is different from being ignorant of risk; accepting risk assumes that the risk is known (i.e., an informed decision has been made by management).
Outsourcing a process is an example of risk transfer/sharing. It reduces risk frequency or impact by transferring or otherwise sharing a portion of the risk. In both a physical and legal sense this risk transfer does not relieve an enterprise of a risk but can involve the skills of another party in managing the risk and thus reduce the financial consequence if an adverse event occurs.
Insuring against a specific event is an example of risk transfer/sharing. It reduces risk frequency or impact by transferring or otherwise sharing a portion of the risk. In both a physical and legal sense risk transfer does not relieve an enterprise of a risk but can involve the skills of another party in managing the risk and thus reduce the financial consequence if an adverse event occurs.
Avoidance means exiting the activities or conditions that give rise to risk. Risk avoidance applies when no other risk response is adequate. Some IT-related examples of risk avoidance include relocating a data center away from a region with significant natural hazards or declining to engage in a very large project when the business case shows a notable risk of failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

A global financial institution has decided not to take any further action on a denial-of-service vulnerability found by the risk assessment team. The MOST likely reason for making this decision is that:

A.the needed countermeasure is too complicated to deploy.
B.there are sufficient safeguards in place to prevent this risk from happening.
C.the likelihood of the risk occurring is unknown.
D.the cost of countermeasure outweighs the value of the asset and potential loss.

A

D is the correct answer.

Justification
While countermeasures can be too complicated to deploy, this does not necessarily mean that they are cost prohibitive.
Any safeguards placed to prevent the risk need to match the risk impact.
It is likely that a global financial institution may be exposed to such denial-of-service attacks, but the frequency cannot be predicted. This would not be the reason for risk acceptance.
An enterprise may decide to accept a specific risk because the protection would cost more than the potential loss.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Senior management at a data center provider is reviewing feedback from its annual client satisfaction survey. Some major clients expressed dissatisfaction with the frequency of service disruptions resulting from systems and infrastructure component failures. Management chooses to address the concern and sets up a project team to improve continuity of operations and minimize service disruptions. Which of the following risk management activities will MOST benefit this initiative?

A.Develop key risk indicators.
B.Determine risk and control ownership.
C.Update the risk register.
D.Develop IT risk scenarios.

A

D is the correct answer.

Justification
Key risk indicators assist management in understanding potential changes in the control environment. A risk scenario more directly identifies circumstances that can adversely affect the enterprise’s business or assets.
Although risk and control ownership with clear lines of responsibility plays an important role in managing risk, the identification of risk scenarios is more important to determine who within the enterprise should have ownership responsibility based on business objectives.
Risk items within the risk register, including risk scenarios, will benefit continuity and disaster recovery management planning because they provide valuable insight into past events and future probability. Constructed narrowly, however, the risk scenarios specifically correlate potential adverse events to business outcomes.
The relationship between IT risk scenarios and business impact must be established to understand the effects of possible adverse events on enterprise objectives.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Budget has been approved for patching vulnerabilities detected through regularly scanning web-facing applications. This is an example of:

A.risk mitigation.
B.risk acceptance.
C.risk transfer.
D.risk avoidance.

A

A is the correct answer.

Justification
In order to mitigate the risk, the enterprise has decided to patch vulnerabilities.
Risk acceptance occurs when no further action is taken to prevent a risk.
Risk transfer occurs when some amount of the risk is transferred, or shared, with another party, such as with an insurance policy.
Risk avoidance would mean to cease performing the action that puts the enterprise at risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which of the following would PRIMARILY help an enterprise select and prioritize risk responses?

A.A cost-benefit analysis of available risk mitigation options
B.The level of acceptable risk per risk appetite
C.The potential to transfer or eliminate the risk
D.The number of controls necessary to reduce the risk

A

A is the correct answer.

Justification
The selection and priorities of a risk response will consider the cost-benefit of the various risk mitigation options in order to get the highest return on investment and reduce the risk to an acceptable level.
The level of acceptable risk will not prioritize the risk response but will indicate whether the risk response is adequate.
Risk can be reduced, accepted or transferred. Risk can be transferred (insurance policy), which is an acceptable risk response, but this factor in itself would not help in prioritizing risk responses.
The priority for risk mitigation will not be based on the number of controls necessary to reduce the risk, but rather on the implementation of the controls with the greatest cost benefit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

Which of the following BEST helps ensure that the cost is justifiable when selecting an IT control?

A.The investment cost is within budget.
B.The risk likelihood and impact are reflected.
C.The net present value of the IT control cost is high.
D.Low cost open source technology is used.

A

B is the correct answer.

Justification
The fact that the cost of a control is within budget does not necessarily justify the cost of a control. The cost of a control should be less than the projected benefit of the control.
While other factors may be relevant, the total cost of ownership of a control should not exceed the projected likelihood times the impact of the risk it is intended to mitigate.
The net present value is calculated by using an after-tax discount rate of an investment and a series of expected incremental cash outflows (the initial investment and operational costs) and cash inflows (cost savings or revenues) that occur at regular periods during the life cycle of the investment. It does not justify the cost of the control because it does not relate the cost to the expected benefit.
While open source technology is generally a low-cost option, the low cost itself does not justify the cost of the control.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

Which of the following would ensure that critical dependencies are addressed in the risk treatment plan?

A.Implement the risk treatment strategy for all possible risk.
B.Verify the accomplishment of business objectives through a top-down process review.
C.Treat each risk independently
D.Verify the accomplishment of business objectives through a bottom-up process review.

A

B is the correct answer.

Justification
It may not be economically feasible to implement risk treatment plans for all possible risk.
Development of an overall risk treatment strategy should be a top-down process, driven jointly by the need to achieve business objectives and to apply economically feasible constraints while controlling uncertainty within the enterprise risk appetite.
If each risk is treated independently, efforts would be wasted in overall risk management because gaps could exist within interdependencies.
A bottom-up approach does not ensure that critical dependencies are addressed in the risk treatment plan as it takes the opposite approach as a top-down process.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Purchasing insurance is a form of:

A.risk avoidance.
B.risk mitigation.
C.risk acceptance.
D.risk transfer.

A

D is the correct answer.

Justification
Risk avoidance means that activities or conditions that give rise to risk are discontinued.
Risk mitigation is the management of risk through the use of countermeasures and controls. Risk transfer is one form of risk mitigation.
Risk acceptance means that no action is taken relative to a particular risk; loss is accepted if it occurs.
Transferring risk typically involves insurance policies to share the financial risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Which of the following approaches BEST helps address significant system vulnerabilities that were discovered during a network scan?

A.All significant vulnerabilities must be mitigated in a timely fashion.
B.Treatment should be based on threat, impact and cost considerations.
C.Compensating controls must be implemented for major vulnerabilities.
D.Mitigation options should be proposed for management approval.

A

B is the correct answer.

Justification
Some vulnerabilities may not have significant impact and may not require mitigation. A threat assessment can affect the level of urgency, and the impact of mitigation on the business may determine when mitigation occurs.
The treatment should consider the degree of exposure and potential impact and the costs of various treatment options.
Compensating controls are considered only when there is a viable threat and impact, and only if the primary control is inadequate.
Management approval will depend on a mitigation plan based on threat, impact and cost considerations.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Which of the following choices is the BEST approach for organizational risk response?

A.Mitigating risk on the basis of frequency of occurrence
B.Performing a countermeasure analysis for deployed controls
C.Selecting controls based on ease of implementation
D.Mitigating risk in line with the risk priority sequence

A

D is the correct answer.

Justification
Responding to risk on the basis of frequency of occurrence will not be comprehensive; without risk prioritization, too much effort may be spent on risk treatment.
Performing countermeasure analysis for every control deployed will not be beneficial because there may not be a countermeasure for every control; even if there were, it would not help in risk response.
Ease of implementation is less of a priority when selecting controls. Without risk prioritization, addressing important risk, which may take more time and resources but will be more useful to the enterprise in the long run, may not take place.
If risk is prioritized and addressed in line with the risk treatment strategy, it balances the costs and benefits of managing IT risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Which of the following activities provides the BEST information to guide a decision on risk treatment? Evaluating the:

A.effectiveness of the current state of existing controls
B.effectiveness of key risk indicators
C.effectiveness of the control selection processes
D.accuracy of identified risk

A

A is the correct answer.

Justification
A comprehensive understanding of the existing state of controls is the best information to determine what additional risk treatment is necessary to bring the level of risk to an acceptable level.
Evaluating the effectiveness of key risk indicators (KRIs) will reveal whether the associated risk is effective. A KRI may suggest the necessity of a risk treatment but will not provide the best information.
Evaluating the effectiveness of control selection processes does not necessarily provide information to guide a risk treatment decision.
Evaluating the accuracy of an identified risk is important when evaluating the current state of existing controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

Which of the following risk responses relieves the enterprise of risk ownership?

A.Mitigation
B.Avoidance
C.Transference
D.Acceptance

A

B is the correct answer.

Justification
The mitigation of risk is accomplished through the application of controls that reduce the likelihood of an adverse event or the impact of risk should such an event occur. However, the reduced risk is thereby accepted by the enterprise, which explicitly acknowledges ownership of the reduced risk.
When an enterprise avoids a risk, it relieves itself of ownership of the risk by ceasing to engage in the activities with which the risk is associated.
Although the term “transference” often creates the impression that ownership of a risk is transferred, this response only creates conditions under which an adverse event can be addressed with the benefit of skills provided by a third party—for example, the financial resources of an insurance company or the expertise of a third-party software developer. As long as the enterprise continues to engage in the activities with which the risk is associated, it remains fundamentally responsible for the risk in both a physical and legal sense.
An enterprise that accepts a risk explicitly acknowledges ownership of the risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What should the risk treatment strategy be if the residual risk exposure level is deemed unacceptable by management?

A.Risk avoidance
B.Risk transfer
C.Risk acceptance
D.Risk mitigation

A

A is the correct answer.

Justification
Risk avoidance is the right strategy, as the risk is not acceptable to management.
There would still be a cost to transfer risk; furthermore, management does not accept the risk.
Management deems the risk unacceptable.
Residual risk is not acceptable to management.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Maintaining a set of decryption keys with an escrow service is MOST likely an example of:

A.transferring the risk of loss to the escrow service.
B.increasing the residual risk of keeping data private.
C.mitigating risk with the use of encryption keys.
D.accepting the risk of using encryption technology.

A

C is the correct answer.

Justification
Transferring risk, or risk sharing, means that the consequences of a risk event are shared between different parties. No risk has been transferred to the escrow services provider, but rather, the use of the escrow services provider has mitigated the risk of not having access to decryption keys.
The residual risk associated with using encryption is not being able to decrypt encrypted information when the decryption keys are no longer accessible. This residual risk is reduced by having the decryption keys stored with an escrow services provider.
Risk mitigation is action taken to reduce the likelihood of a risk event. In this case, the risk is the inability to access the decryption keys. By storing the decryption keys with an escrow service, the risk is mitigated, making access to the decryption keys possible.
Accepting risk implies that no action has been taken to mitigate the risk. The use of the escrow services provider, on the other hand, mitigates the risk of not being able to access the decryption keys when needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Which of the following risk responses is BEST for an enterprise whose products and services are highly regulated?

A.Risk mitigation
B.Risk acceptance
C.Risk transfer
D.Risk avoidance

A

A is the correct answer.

Justification
A regulatory risk that could lead to the withdrawal of an operating license is a risk that must be addressed by the enterprise because it can affect the enterprise’s ability to continue operations.
The risk should only be accepted if it is at a level that management is willing to accept.
The risk could be transferred, but management must realize that if the third party fails to meet the compliance requirements, it is the client enterprise that will suffer the consequences of the regulator’s actions.
The risk cannot be avoided without removing or ending the product line or service at risk, which could put the enterprise out of business.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

Which of the following actions is the BEST when a critical risk has been identified and the resources to mitigate are not immediately available?

A.Log the risk in the risk register and review it with senior management on a regular basis.
B.Capture the risk in the risk register once resources are available to address the risk.
C.Escalate the risk report to senior management to obtain the resources to mitigate the risk.
D.Review the risk level with senior management and determine whether the risk calculations are correct.

A

C is the correct answer.

Justification
Because this is a critical risk, logging and reviewing risk on a regular basis would not be a suitable option. It should be escalated to senior management immediately.
Because this is a critical risk, capturing the risk once resources are available would not be a suitable option. It should be escalated to senior management.
If resources are not available or priorities need to be adjusted, it is important to engage senior management to assist in escalating the remediation.
A review of the risk level should already have been performed. This will not resolve the problem with a risk that exceeds the risk acceptance level.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Which of the following activities is an example of risk sharing?

A.Moving a function to another department
B.Selling a product or service to another company
C.Deploying redundant firewalls
D.Contracting with a third party

A

D is the correct answer.

Justification
Moving a function to another department would not share the risk outside of the enterprise’s direct responsibility.
Selling a product or service with high risk to another company would be an example of risk avoidance, not of risk sharing, because the original enterprise no longer has any involvement.
Deploying redundant firewalls is risk mitigation, but not risk sharing or transfer.
Contracting with a third party to share the responsibility for supporting activities can provide a form of risk transference as long as it is documented in the outsourcing contract.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

Faced with numerous risk scenarios, the prioritization of treatment options will be MOST effective when based on:

A.the existence of identified threats and vulnerabilities.
B.the likelihood of compromise and subsequent impact.
C.the results of vulnerability scans and exposure.
D.the exposure of corporate assets and operational risk.

A

B is the correct answer.

Justification
The existence of threats and vulnerabilities affects risk likelihood, but without considering the potential impact, the prioritization of risk treatment will not be effective.
The probability of compromise and the likely impact will be the most important considerations for selecting treatment options.
Vulnerability scan results provide prioritized input into the decision-making process to remediate technical risk. Vulnerability scans provide only a subset of overall enterprise risk and do not consider the cost to remediate.
Exposure of assets and operational risk are factors in determination of prioritization of risk treatment options, but only when used in combination with the cost-benefit of the risk treatment options. Operational risk is a subset of overall risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What is the BEST risk response for risk scenarios where the likelihood is low and financial impact is high?

A.Transfer the risk to a third party.
B.Accept the high cost of protection.
C.Implement detective controls.
D.Implement compensating controls.

A

A is the correct answer.

Justification
High-impact, low-likelihood situations are typically most cost effectively covered by transferring the risk to a third party (e.g., insurance).
Even though financial impact is high, the cost of protection is not necessarily high.
A detective control alone does not limit the impact.
Implementing compensating controls may be cost prohibitive and is not feasible when the likelihood is already low. Moreover, compensating controls should be used only when the main control is not adequate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Which of the following risk response selection parameters results in a decrease in magnitude of an event?

A.Efficiency of response
B.Cost of response
C.Effectiveness of response
D.Capability to implement response

A

C is the correct answer.

Justification
Efficiency of response is the relative benefit promised by the response in comparison to:
Cost of response is the cost of the response to reduce risk to within tolerance levels.
Effectiveness of response is the extent to which the response reduces the likelihood and impact.
The capability to implement the response will not affect the magnitude of an event.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

When the cost of risk related to a specific business process is greater than the potential opportunity, the BEST risk response is:

A.transfer.
B.acceptance.
C.mitigation.
D.avoidance.

A

D is the correct answer.

Justification
Risk transfer is the process of assigning risk to another enterprise, usually through the purchase of an insurance policy or by outsourcing the service.
Risk acceptance means that no action is taken relative to a particular risk, and loss is accepted if it occurs.
Risk mitigation is the management of risk through the use of countermeasures and controls.
Risk avoidance is the process for systematically avoiding risk, constituting one approach to managing risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

Which indicator ensures that the enterprise’s risk is effectively treated?

A.An indicator that is used to define the control environment and measures toward tolerance
B.An indicator implemented to detect and signal the root cause of a risk event
C.An indicator used to define and monitor changes in the risk profile
D.An indicator used to define performance targets and measure progress toward goals

A

A is the correct answer.

Justification
Control indicators are used to determine the effectiveness of an enterprise’s controls designed to treat risk.
Leading indicators are used to detect the root cause of a risk event and to provide early warning if the achievement of a strategic goal would be in jeopardy.
Key risk indicators answer questions about the changes in the enterprise’s risk profile and if those changes are within the enterprise’s desired risk tolerance levels.
Key performance indicators enable the enterprise to define performance targets and monitor progress toward achieving those targets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

Which of the following can be expected when a key control is being maintained at an optimal level?

A.The shortest lead time until the control breach comes to the surface
B.Balance between control effectiveness and cost
C.An adequate maturity level of the risk management process
D.An accurate estimation of operational risk amounts

A

B is the correct answer.

Justification
Even though a key control is in place, it may take time until a breach surfaces if escalation procedures are not adequately set up. Thus, a key control alone does not ensure the shortest lead time for a breach to be communicated to management.
Maintaining controls at an optimal level translates into a balance between control cost and derived benefit.
Measurement of the maturity level in risk management may depend on the function of key controls. However, the key control is not the major driver to assess the maturity of risk management.
The key control does not directly contribute to the accurate estimation of operational risk amounts. Maintenance of an incident database and the application of statistical methods are essential for the estimation of operational risk.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

Which of the following would BEST measure the effectiveness of operational controls?

A.Control matrix
B.Key performance indicator
C.Statement of applicability
D.Key control indicator

A

D is the correct answer.

Justification
The control matrix is a tool used to analyze a systems flowchart (and related narrative) to determine the control plans appropriate to a process and to relate those plans to the control goals of the process.
Key performance indicators do not measure the effectiveness of operational risk controls
Statement of applicability is specific to the ISO 27001 standard, and although it has a list of controls, it will not help in measuring the effectiveness of particular operational risk controls.
Key control indicators, also referred to as control effectiveness indicators, are metrics that provide information on the degree to which a control is working.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Which of the following is the MAIN reason senior management monitors and analyzes trends in key control indicators?

A.It provides feedback on the overall control environment.
B.It helps in identifying redundant controls.
C.It proactively identifies impacts to the risk profile.
D.It helps determine if additional controls are required.

A

C is the correct answer.

Justification
The control environment is primarily the responsibility of the operations team, and not senior management. Tuning and related feedback is the responsibility of the operations team.
Redundancy is a design and operations responsibility, not senior management.
The primary objective of key control indicators (KCIs) is to ensure that controls actually mitigate risk at an effective level. Analysis of KCI trends provides information on the overall effectiveness of controls and provides management information on the status of risk management.
Determining the need for additional controls is the responsibility of operations, not senior management. KCIs would not necessarily identify the need for additional controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Which of the following is PRIMARILY defined before establishing key control indicators?

A.Desired capacity
B.Desired risk threshold
C.Desired tolerances
D.Desired risk appetite

A

C is the correct answer.

Justification
Desired capacity pertains to capacity management and is not aligned to control effectiveness.
Key control indicators (KCIs) are not related to risk thresholds.
The goal of KCIs is to track performance of control actions relative to tolerances, providing insight into the ongoing adequacy of a given control in keeping risk within acceptable levels; for this reason, KCIs are sometimes called control effectiveness indicators. Therefore, tolerances would need to be defined before a KCI could be established.
KCIs are not related to risk appetite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

What is the PRIMARY reason for reporting significant changes in information risk to senior management?

A.To revise the key risk indicators
B.To enable educated decision-making
C.To gain support for new countermeasures
D.To recalculate the value of existing information assets

A

B is the correct answer.

Justification
Revisions in key risk indicators have to be communicated to management; however, they are not the way to communicate significant new information risk.
The changes in information risk will impact critical business processes. The risk practitioner should report this to management so that management is able make informed risk response decisions.
Gaining support for new countermeasures is not a primary reason to report changes in information risk to senior management. Some significant changes may not require new countermeasures.
Recalculation of asset values is not a primary reason to report changes in information risk to senior management. Senior management generally understands the importance of critical assets and does not wait for significant risk to reconsider the asset value.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q

Which of the following BEST enables a peer review of an enterprise’s risk management process?

A.A balanced scorecard
B.An industry survey
C.A capability maturity model
D.A framework

A

C is the correct answer.

Justification
A balanced scorecard is a coherent set of performance measures organized into four categories that include traditional financial measures, customer processes, internal business processes and learning and growth perspectives.
An industry survey does provide a view of current practices; however, because survey results are generally presented in an aggregated manner, they do not enable a peer review of an enterprise’s risk management process.
A capability maturity model describes essential elements and criteria for effective processes for one or more disciplines. It also outlines an evolutionary improvement path from ad hoc, immature processes to disciplined, mature processes with improved quality and effectiveness.
A framework is a set of concepts, assumptions and practices that define how a given discipline or function can be approached or understood; relationships among its various components; roles of those involved; and conceptual and organizational boundaries.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Which of the following BEST ensures that appropriate mitigation occurs on identified information systems vulnerabilities?

A.Presenting root cause analysis to the management of the enterprise
B.Implementing software to input the action points
C.Incorporating the findings into the annual report to shareholders
D.Assigning action plans with deadlines to responsible personnel

A

D is the correct answer.

Justification
Presenting findings to management will increase management awareness; however, it does not ensure that action will be taken by the staff.
Software can help in monitoring the progress of mitigations, but it will not ensure that the mitigation will be completed.
Reporting to shareholders does not ensure that the mitigation will be completed.
Assigning mitigation to personnel establishes responsibility for its completion within the deadline.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Which of the following is MOST suitable for reporting IT-related business risk to senior management?

A.Balanced scorecards
B.Gantt charts
C.Technical vulnerability reports
D.Dashboards

A

D is the correct answer.

Justification
A balanced scorecard is a coherent set of performance measures organized into four categories: traditional financial measures, and customer, internal business process, and learning and growth perspectives.
Gantt charts show the critical path for a project but are not suitable for reporting IT-related business risk.
Technical vulnerability reports provide a detailed overview of system vulnerabilities and often include leading practices on how to mitigate vulnerabilities. Often, they are not tied to the business impact and are too granular to be used for reporting IT-related business risk to senior management.
Dashboards are most suitable for reporting risk to senior management because they provide a high-level overview of risk levels that can be easily understood.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

Which of the following BEST helps while presenting the current risk profile to executive management and the board of directors?

A.Risk response dashboard
B.Emerging risk report
C.Risk register dashboard
D.Key risk indicators report

A

C is the correct answer.

Justification
Risk response is a component of the risk register and would not present a complete picture to executive management.
An emerging risk report would not be included as part of a presentation to executive management and the board of directors.
A risk register dashboard would provide a comprehensive overview of the risk profile of the enterprise.
A key risk indicators report is only one component of the risk register dashboard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

The presentation of a risk report should be PRIMARILY tailored to the:

A.risk rating.
B.target audience.
C.scope of activities.
D.threat levels.

A

B is the correct answer.

Justification
The risk rating should be stated in the presentation. However, the risk report presentation should be tailored to the target audience.
The purpose of risk reporting is to allow informed decisions to be made and appropriate actions to be taken. Risk reporting can take a variety of forms, from structured email to integration governance, risk and compliance systems. In some cases, personal meetings with stakeholders are appropriate. Each audience is different, and the format of a risk report should be tailored to the target audience to ensure that the information is presented so that it can be understood and used.
The purpose of risk reporting is to allow informed decisions to be made and appropriate actions to be taken. Different audiences prefer or require different levels of detail. The format of a risk report should be tailored to the target audience.
The purpose of risk reporting is to allow informed decisions to be made and appropriate actions to be taken. Different audiences have varying degrees of concern regarding the threat levels that drive associated risk. The format of a risk report should be tailored to the target audience.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

The PRIMARY objective of risk reporting is to:

A.keep stakeholders informed and reduce the level of enterprise risk.
B.provide the risk owner with information to initiate risk response.
C.control the threat environment by limiting the potential consequences.
D.guarantee the open sharing of information related to enterprise risk.

A

B is the correct answer.

Justification
Keeping stakeholders informed is part of any reporting process. Risk reporting is completed to meet regulatory compliance and inform risk owners and senior leadership of the results of assessments and what actions may be required; emerging threats; and the status of existing indicators, controls and remediation efforts. Reporting does not directly reduce enterprise risk but is the basis for risk mitigation. The decision to mitigate a reported risk depends on the relationship of the risk to the enterprise’s risk appetite and tolerance.
The risk owner is accountable for properly managing any given risk to an acceptable level, which is based on the enterprise’s risk appetite and tolerance. Risk reporting provides the risk owner with a summary of the risk assessment results (in accordance with regulatory requirements) and highlights areas that require attention by the risk owner. In particular, reporting highlights areas where corrective action is necessary, such as controls out of line with control objectives, control thresholds that have been exceeded, or controls that are not adequate to meet current or emerging regulatory requirements.
Risk reporting does not directly control the threat environment by limiting the potential consequences. Risk reporting may be used as the basis for risk mitigation, but the two are distinct. Within the context of mitigation, threat and consequences are also distinct components. Neither can be used to influence the other, nor is either typically addressed as the primary focus of mitigation. The risk component that is most clearly under an enterprise’s control is vulnerability.
Risk reporting cannot guarantee the open sharing of information related to enterprise risk—quite the opposite. Risk information should be known and communicated only to those parties with a genuine need. A risk register with all documented risk is not public information and should be properly protected against internal and external parties with no need for it.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Which of the following controls protects the integrity of the event logs on a stand-alone logging system?

A.Users must be authenticated in order to gain read-access to the event logs.
B.The event logging system is configured to have a mirror system in a remote data center.
C.The event logging system changes are administered under dual control.
D.The event logs are written directly to a shared network drive.

A

C is the correct answer.

Justification
Users authenticating in order to gain read-access to the event logs improves confidentiality of the data; it does not protect integrity because it is only relevant read-access.
Configuring the event logging system to have a mirror system in a remote data center improves the availability of the data but not its integrity, because the event logging system would immediately copy unauthorized changes to the mirror system.
The event logging system changes administered under dual control protect data integrity by reducing the likelihood that a single actor would be able to perpetrate an unauthorized modification of system configurations or records.
The event logs written directly to a shared network drive do not improve integrity because log data would be publicly writable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

During which stage of the overall risk management process is the cost-benefit analysis PRIMARILY performed? During the:

A.initial risk assessment
B.information asset classification
C.definition of the risk profile
D.risk response selection

A

D is the correct answer.

Justification
The cost-benefit analysis is performed not only once, but every time controls need to be decided, which can happen many times over a risk management life cycle.
In information asset classification, levels are assigned based on the importance of the asset that needs protection, and not based on cost-benefit analysis.
The risk profile is defined based on threats and vulnerabilities and what risk needs to be addressed. At this point, no cost-benefit analysis is required, since it should be performed while selecting between different control options or when deciding to select a specific control.
During risk response selection, a range of controls that can mitigate the risk will be identified; the cost-benefit analysis in this process will help identify the right controls to address the risk at acceptable levels within the budget.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Which of the following categories of information security controls addresses a deficiency or weakness in the control structure of an enterprise?

A.Corrective
B.Preventive
C.Compensating
D.Directive

A

C is the correct answer.

Justification
Corrective controls, such as backups, allow recovery after a violation is detected.
Preventive controls, such as authentication, reduce or eliminate the probability of a violation occurring.
Compensating controls are deployed to mitigate risk to an acceptable level when a requirement cannot be met explicitly through remediation due to a legitimate technical or business constraint. An example of a compensating control is adding multiple challenge-response instances to compensate for an inability to implement multifactor authentication.
Directive controls, such as policies, specify what actions are and are not permitted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

A healthcare enterprise has implemented role-based access controls for its users on systems that manage patient data. Which of the following statements BEST describes how the control reduces risk to the enterprise?

A.The control reduces the probability and impact of an insider attack event.
B.The control reduces the impact of reputation damage in the event of a successful breach.
C.The control reduces the probability and impact of an outsider attack event.
D.The control reduces the probability that a sensitive report will be delivered to the wrong recipient.

A

A is the correct answer.

Justification
Role-based access controls address the amount of sensitive data available to users (thereby minimizing impact) and the number of attack vectors (thereby lowering probability).
The control is not designed to reduce risk after a breach.
The control is not designed to reduce risk events related to an outsider attack.
Although the control might reduce the impact of an accidental-disclosure event, it does not reduce the probability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

Which of the following costs MUST be balanced with the potential for loss to ensure effective risk management?

A.Regulatory fines and penalties
B.Total cost of ownership
C.Breach management cost
D.Business operation cost

A

B is the correct answer.

Justification
Regulatory fines and penalties will be considered as part of the potential loss.
Total cost of ownership considers implementation and operating costs for a control, which must be balanced with the potential for loss to ensure effective risk management.
Breach management cost will be considered as part of the potential loss.
Business operation cost is associated with the day-to-day cost of running the business, not with individual controls.

82
Q

What is the BEST approach to determine if existing security control management meets organizational needs?

A.Perform a process maturity assessment.
B.Perform a control self-assessment.
C.Review security logs for trends or issues.
D.Compare current and historical security test results.

A

A is the correct answer.

Justification
A process maturity assessment can be used to determine the presence of the control and the reliable operation and maintenance of the control; it can determine any gaps between the desired and current state of the control.
A control self-assessment is a valuable tool to monitor controls on an ongoing basis, but it will not indicate the maturity of the security control management process.
Logs record what happened, but they do not indicate whether the configurations used to create the logs were incorrect.
Running test data through the system and comparing results to previous test results will show whether the effectiveness of the controls has changed, but will not indicate whether the controls are being maintained properly or are effective to mitigate new risk.

83
Q

Which of the following is the PRIMARY reason for periodically monitoring key risk indicators (KRIs)?

A.The cost of risk response needs to be minimized.
B.Errors in the results of KRIs need to be minimized.
C.The risk profile may have changed.
D.Risk assessment needs to be continually improved.

A

C is the correct answer.

Justification
Minimizing the cost of risk response efforts can be one of the outcomes, but this is not the primary reason.
If there are errors in results of key risk indicators (KRIs), they can be minimized even without having periodic monitoring in place.
The risk impacting the enterprise can change over time and periodic monitoring of KRIs proactively identifies changes in the risk profile so that new risk can be addressed and changes in levels in existing risk can be better controlled.
Risk assessment process improvements are not the reason for monitoring KRIs on a periodic basis.

84
Q

Which of the following BEST facilitates cost-effective risk response?

A.Prioritizing and addressing risk according to the risk management strategy
B.Mitigating risk on the basis of risk likelihood and magnitude of impact
C.Performing countermeasure analysis for each of the controls deployed
D.Selecting controls that are at zero or near-zero costs

A

A is the correct answer.

Justification
Prioritizing and addressing risk in line with the risk treatment strategy balances the costs and benefits of managing the IT risk.
Mitigating risk on the basis of risk likelihood and magnitude of impact is difficult because there can be multiple occurrences of risk with very similar products of likelihood multiplied by impact. Without prioritization risk treatment will not be optimized.
Performing countermeasure analysis for each control deployed does not help because there may not be a countermeasure for every control. Even if there were, it would not help in the risk response.
Selecting controls that are at zero or near-zero costs may reduce the costs in general, but the controls themselves may not be effective.

85
Q

In a large enterprise, system administrators may release critical patches into production without testing. Which of the following would BEST mitigate the risk of interoperability issues?

A.Ensure that a reliable system rollback plan is in place.
B.Test the patch on the least critical systems first.
C.Only allow updates to occur after hours.
D.Ensure that patches are approved by the chief information security officer.

A

A is the correct answer.

Justification
A reliable system rollback plan will allow the administrators to roll back the patches from the system in case the patches affect the system negatively.
Testing the patches on the least critical systems first will not give insight into how the patch will affect all the applications; in addition, there may be a kind of dependency between less critical and highly critical systems.
Updating the patches after hours will not give insight into how the patch will affect all the applications, but it should be done to decrease the possibility of user downtime.
Ensuring that the patches are approved by the chief information security officer will not give insight into how the patch will affect all the applications.

86
Q

The use of a capability maturity model is based on:

A.the training of staff to ensure consistent knowledge transfer.
B.the development of new controls to replace aging or diminished controls.
C.the application of standard, repeatable processes that can be measured.
D.users developing new innovative solutions to problems.

A

C is the correct answer.

Justification
Training staff involves the transfer of knowledge. Capability maturity models address the consistent application of procedures, not training.
The use of a capability maturity model relies on consistently applied metrics, not the replacement of controls.
The use of maturity models requires development, implementation and measuring of consistent procedures and activities. A maturity model contains the essential elements of effective processes for one or more disciplines. It also describes an evolutionary improvement path from ad hoc, immature processes to disciplined, mature processes with improved quality and effectiveness.
Empowering users to develop new solutions applies to total quality management, while capability maturity models encourage the use of standard, repeatable procedures.

87
Q

To evaluate the effectiveness of a risk mitigation control during the risk assessment process, the team should:

A.identify recent changes related to the control.
B.identify the current state of existing controls.
C.identify the current policies related to the control.
D.identify recent incidents related to the control.

A

B is the correct answer.

Justification
The identification of recent changes related to the control is a subset of identifying the current state of existing controls.
The risk assessment process includes an evaluation to identify the effectiveness of the current state of existing controls.
The identification of the current policies related to the control is a subset of identifying the current state of existing controls.
The identification of recent incidents related to the control is a subset of identifying the current state of existing controls.

88
Q

A risk assessment indicates a risk to the enterprise that exceeds the risk acceptance level set by senior management. What is the BEST way to address this risk?

A.Ensure that the risk is quickly brought within acceptable limits, regardless of cost.
B.Recommend mitigating controls if the cost and benefit would justify the controls.
C.Recommend that senior management revise the risk acceptance level.
D.Ensure that risk calculations are performed to revalidate the controls.

A

B is the correct answer.

Justification
Cost needs to be a factor in determining the best way to mitigate a risk. If the cost of the control is higher than the anticipated loss, the risk response is not cost effective and should not be selected.
Risk mitigating controls should be implemented based on cost and benefit. Controls are not justified if the cost of the control exceeds the benefit obtained.
Revising the risk acceptance level may be desirable in some cases, but in this case is not the best option.
It is important that the value of the controls is correct, but that will not mitigate the outstanding risk.

89
Q

A PRIMARY reason for initiating a policy-exception process is:

A.the risk is justified by the benefit.
B.policy compliance is difficult to enforce.
C.operations are too busy to comply.
D.users may initially be inconvenienced.

A

A is the correct answer.

Justification
Exceptions to policies are warranted if the benefits outweigh the costs of policy compliance; however, the enterprise needs to assess both the tangible and intangible risk and evaluate both in the context of existing risk.
Difficulty in enforcement does not justify policy exceptions.
Lack of resources to achieve compliance does not justify policy exceptions.
User inconvenience does not warrant an automatic exception to a policy.

90
Q

Security technologies should be selected PRIMARILY on the basis of their:

A.evaluation in security publications.
B.compliance with industry standards.
C.ability to mitigate risk to organizational objectives.
D.cost compared to the enterprise’s IT budget.

A

C is the correct answer.

Justification
Evaluation in security publications is a valuable reference point when selecting a security technology; yet it is secondary to the technology’s ability to mitigate risk to the enterprise.
Compliance with industry standards may be an important aspect of selecting a security technology but it is secondary to the technology’s ability to mitigate risk to the enterprise.
The most fundamental criterion for selecting security technology is the capacity to reduce risk for organizational objectives.
While the cost of technology in the context of budget is an important consideration for the selection of a suitable technology, it is secondary to the technology’s ability to mitigate risk to the enterprise.

91
Q

Which of the following is MOST relevant to include in a cost-benefit analysis of a two-factor authentication system?

A.The approved budget of the project
B.The frequency of incidents
C.The annual loss expectancy of security incidents
D.The total cost of ownership

A

D is the correct answer.

Justification
The approved budget of the project may have no bearing on what the project may actually cost.
The frequency of security incidents can help measure the benefit but the relationship is indirect because not all security incidents may be mitigated by implementing a two-factor authentication system.
The ALE of incidents can help measure the benefit but the relationship is indirect because not all incidents may be mitigated by implementing a two-factor authentication system.
Total cost of ownership is the most relevant piece of information to be included in the cost-benefit analysis because it establishes a cost baseline that must be considered for the full life cycle of the control.

92
Q

Which of the following is the BEST action if an audit report recommends supplemental controls for uncritical functions?

A.Appoint a project lead to start the implementation.
B.Eliminate the risk by purchasing risk insurance.
C.Request that the IT department implement all supplemental controls.
D.Request a cost-benefit analysis to determine business need.

A

D is the correct answer.

Justification
The need for the control must be justified prior to selecting a project lead or champion to oversee the implementation.
The decision to purchase risk insurance is determined after a cost-benefit analysis is completed.
The need for the control must be justified prior to implementing new supplemental controls.
A cost-benefit analysis may help determine if supplemental controls are needed, making this the best action to take. This is to ensure the cost of the control does not exceed the impact from the risk being realized.

93
Q

When leveraging a third party for the procurement of IT equipment, which of the following control practices is MOST closely associated with delivering value over time?

A.Compare the cost and performance of current and alternate suppliers periodically.
B.Assign a relationship owner to the supplier to provide accountability.
C.Monitor and review delivery to verify that the quality of service is acceptable.
D.Establish service level agreements with clear financial penalties.

A

A is the correct answer.

Justification
Value is a function of cost and performance. Even if the current supplier is rigorously held to the standard established in an original contract and never raises prices, the value delivered by the contract over time will decline if competitors deliver better performance at lower prices within the same time frame. The only way to be sure that a current supplier continues to deliver value is to periodically compare its cost and performance to the cost and performance of alternate suppliers.
Having a relationship owner who is accountable for performance is an excellent practice for holding the quality of performance in line with the agreed-on contract, but it cannot guarantee that the terms of that contract will deliver value over time.
Monitoring and reviewing delivery to verify that the quality of service is acceptable is important to identify whether any penalties may be due under the terms of an established service level agreement and to push for immediate corrective action. However, it cannot guarantee that the terms of the contract will deliver value over time.
Service level agreements with clear financial penalties provide a mechanism for reimbursement of financial losses in the event that degraded performance has a financial cost, but they cannot guarantee that the terms of the contract will deliver value over time.

94
Q

Controls are most effective when they are designed to reduce:

A.threats.
B.likelihood.
C.uncertainty.
D.vulnerabilities.

A

D is the correct answer.

Justification
A threat is a potential cause of an unwanted incident. Often, threats cannot be reduced, such as in the case of natural disasters.
Designing controls to reduce likelihood (of a threat) addresses only one aspect of an event and does not consider a comprehensive approach, including detection and reduction of impact should an adverse event occur.
Controls generally do not reduce uncertainty.
Controls are most effective when they are designed to reduce vulnerabilities affecting the enterprise. Vulnerabilities can result from external relationships, such as sole-source suppliers.

95
Q

Which of the following can BEST be used as a basis for recommending a data leak prevention (DLP) device as a security control?

A.Benchmarking with peers on DLP deployment
B.A business case for DLP to protect data
C.Evaluation report of popular DLP solutions
D.Data leakage scenario in risk register

A

B is the correct answer.

Justification
Benchmarking with peers does not help because peers will have different risk environments and cultures that do not directly apply to one’s own enterprise.
A business case with costs versus benefits provides the business reasoning why the data leak prevention solution addresses the risk and explains how the risk losses could be reduced.
While a report evaluating popular solutions offers important information, the risk practitioner still needs to analyze the report in the context of the enterprise and recommend the appropriate solution.
Merely identifying data leakage in the risk register does not help in justifying the solution.

96
Q

Which of the following is the MOST important factor when designing information systems controls in a complex environment?

A.Development methodologies
B.Scalability of the solution
C.Technical platform interfaces
D.Stakeholder requirements

A

D is the correct answer.

Justification
Development methodologies are taken into consideration when designing information systems controls. However, they are not as important as the stakeholder requirements.
Scalability of the solution is taken into consideration when designing information systems controls. However, it is not as important as the stakeholder requirements.
Technical platform interfaces are taken into consideration when designing information systems controls. However, they are not as important as the stakeholder requirements.
The most important factor when designing information systems controls is their ability to advance the interests of the business by addressing stakeholder requirements.

97
Q

In the risk management process, a cost-benefit analysis is MAINLY performed:

A.as part of an initial risk assessment.
B.as part of risk-response planning.
C.during an information asset valuation.
D.when insurance is calculated for risk transfer.

A

B is the correct answer.

Justification
A cost-benefit analysis is performed not only once, but every time controls need to be selected to address new or changing risk.
In risk response, a range of controls that can mitigate risk will be identified; however, a cost-benefit analysis in this process will help identify the right controls to address the risk at acceptable levels within the budget.
In an information asset valuation, business owners determine the value based on business importance and there is no cost-benefit involved.
Calculating insurance for the purpose of transferring risk is not the stage at which a cost-benefit analysis is performed.

98
Q

Capability models are used PRIMARILY to assess risk management processes by:

A.benchmarking what other enterprises are doing to mitigate risk.
B.measuring the gap between actual and desired states.
C.demonstrating the presence of vulnerabilities in existing business processes.
D.quantifying the organizational changes needed to reach the highest maturity level.

A

B is the correct answer.

Justification
After the capability assessment is complete, enterprises may use benchmarking to compare themselves against others in the industry. Benchmarking is not a means of mitigating risk.
Capability models can help determine the current state of risk management process capability and whether it aligns with a given desired state. The model helps close the gap between actual and desired states and tracks process performance over time.
A process capability model is not designed to detect vulnerabilities in existing business processes. That would be accomplished through a vulnerability or risk assessment.
Capability models will assist in determining the current maturity level of a program; however, the model will not provide the ability to quantify the organizational changes needed to reach the highest maturity level. That should be determined by management at the beginning of the maturity assessment.

99
Q

Control objectives are useful to risk professionals because they provide the basis for understanding the:

A.techniques for securing information for a given risk.
B.information security policies, procedures and standards.
C.control good practices relevant to a specific entity.
D.desired outcome of implementing specific control procedures.

A

D is the correct answer.

Justification
IT control objectives will not provide the techniques for securing information for a given risk. The techniques for security information for a given risk will be determined by selecting controls and defining how the techniques will work in the control environment.
To understand security policies, procedures and standards, it is necessary to understand the business, the risk involved in various processes, and how the policies will manage risk. IT control objectives in themselves will not improve understanding of security policies, procedures and standards.
The IT control objectives do not mandate good practice; they help establish the need for and the desired outcome of a control.
IT control objectives define the main purpose or objective of an IT control and help implement specific control procedures.

100
Q

A substantive test to verify that tape library inventory records are accurate involves:

A.determining whether bar code readers are installed.
B.conducting a physical count of the tape inventory.
C.checking whether receipts and issues of tapes are accurately recorded.
D.determining whether the movement of tapes is authorized.

A

B is the correct answer.

Justification
Testing the existence of bar code readers is a compliance test, not a substantive test. A substantive test involves gathering evidence to evaluate the integrity of individual transactions, data or other information.
A substantive test involves gathering evidence to evaluate the integrity of individual transactions, data or other information. Conducting a physical count of the tape inventory is a substantive test.
Confirming that receipts and issues of tapes are accurately recorded is a compliance test, not a substantive test. A substantive test involves gathering evidence to evaluate the integrity of individual transactions, data or other information.
Testing the approval of tape movements is a compliance test, not a substantive test. A substantive test involves gathering evidence to evaluate the integrity of individual transactions, data or other information.

101
Q

Which of the following choices is the GREATEST risk related to the review of log files?

A.Logs are not backed up periodically.
B.Unauthorized system actions are not identified.
C.Routine events are recorded.
D.Procedures for reviewing logs are not documented.

A

B is the correct answer.

Justification
If logs are not backed up periodically, there is a greater possibility that critical data that may be needed in the future for forensic investigation could be lost.
The review of log files is to detect system-related activities. Failure to identify unauthorized system actions during the review of log files poses a risk to the business.
Logging of routine events may be required.
The procedures for reviewing logs should be documented. While documentation is important, the lack of documentation will not in itself impact the risk of unauthorized system actions being identified.

102
Q

How can an enterprise determine the aggregated risk from several sources? Through a:

A.security information and event management system
B.fault tree analysis
C.failure modes and effects analysis
D.business impact analysis

A

A is the correct answer.

Justification
A security information and event management system gathers incident activity from several locations and prepares reports on risk trends and correlated events.
A fault tree analysis examines all the factors that could lead to a risk but does not correlate or aggregate risk from several sources.
A failure modes and effects analysis examines the sequence of events and impacts of an incident but does not aggregate risk data.
A business impact analysis provides an understanding of a particular business unit; however, it is not a means of determining aggregated risk from several sources.

103
Q

Which of the following is MOST important to ensure meaningful reporting of key risk indicators? Data are extracted from:

A.a variety of control types.
B.a representative sample.
C.automated systems.
D.direct sources.

A

B is the correct answer.

Justification
Using a variety of control types may assist in providing meaningful indicators; however, having a representative sample of controls is more important to provide management with the best understanding of the current level of risk.
Data extracted from a representative sample will provide the most meaningful reporting because multiple controls will be taken into consideration to derive the current level of risk.
Data extracted from automated systems may not provide complete information because some information may not reside on automated systems.
Data extracted from direct sources may not provide complete information. Some indirect sources of information may provide better and meaningful reporting of key risk indicators.

104
Q

Investments in risk management technologies should be based on:

A.audit recommendations.
B.vulnerability assessments.
C.business climate.
D.value analysis.

A

D is the correct answer.

Justification
Basing decisions on audit recommendations is reactive in nature and may not comprehensively address the key business needs.
Vulnerability assessments are useful, but they do not determine whether the cost is justified.
Demonstrated value takes precedence over the current business climate because the climate is ever-changing.
Investments in risk management technologies should be based on a value analysis and a sound business case.

105
Q

Which of the following criteria is MOST essential for the effectiveness of operational metrics?

A.Relevance to the recipient
B.Timeliness of the reporting
C.Accuracy of the measurement
D.Cost of obtaining the metrics

A

A is the correct answer.

Justification
Unless the metric is relevant to the recipient and the recipient understands what the metric means and what action to take, if any, all other criteria are of little importance.
Timeliness of reporting is important, but it is secondary to relevance.
A high degree of accuracy is not essential if the metric is reliable and indications are within an acceptable range.
Cost is always a consideration, but it is secondary to relevance.

106
Q

Which of the following IS control practices provides the BEST key performance indicator of an enterprise’s disaster recovery readiness?

A.The approved disaster recovery plan
B.The presence of a hot site
C.The results of tests and drills
D.An updated call tree and escalation mechanism

A

C is the correct answer.

Justification
Having an approved disaster recovery plan is not enough from a disaster recovery readiness perspective because it is only documentation. This is not an example of a key performance indicator (KPI) because it is not measurable.
The presence of a hot site demonstrates organizational commitment. Data may be transferred to the hot site, but drills then must be performed to determine if the complete process works. This is not an example of a KPI because it is not measurable.
Results of tests and drills are the best evidence that the enterprise is prepared for disaster recovery because the enterprise can test what would occur in a simulated disaster scenario.
An updated call tree and escalation mechanism is important, but it addresses only one component: contacting people and the chain of command. This is not an example of a KPI because it is not measurable.

107
Q

Which of the following is an example of a key performance indicator?

A.Average network availability uptime
B.Average number of missed patches
C.Average number of data entry errors
D.Average number of virus and phishing attacks

A

A is the correct answer.

Justification
Average network availability is an example of a key performance indicator.
Average number of missed patches is an example of a key risk indicator.
Average number of data entry errors is an example of a key risk indicator.
Average number of virus and phishing attacks is an example of a key risk indicator.

108
Q

A company has set the unacceptable error level at 10 percent. Which of the following tools can be used to trigger a warning when the error level reaches eight percent?

A.A fault tree analysis
B.Statistical process control
C.A key performance indicator
D.A failure modes and effects analysis

A

C is the correct answer.

Justification
A fault tree analysis is used to identify the sources of a risk but not the measurement of risk.
Statistical process control is used for statistical process control, not performance management.
A key performance indicator (KPI) is a tool that will show a performance change indication. A KPI is a measure that determines how well the process is performing in enabling the goal to be reached.
A failure modes and effects analysis is a tool that is used for failure analysis, not performance management.

109
Q

Which characteristic of a key performance indicator demonstrates that it is realistic and based on important goals and values?

A.Specific
B.Relevant
C.Measurable
D.Attainable

A

D is the correct answer.

Justification
A specific key performance indicator (KPI) is based on a clearly understood goal and is clear and concise, but it may not be realistic or based on important goals and values.
A relevant KPI is directly related to a specific activity or goal, but it may not be realistic or based on important goals and values.
A measurable KPI is quantifiable (objective), but it may not be realistic or based on important goals and values.
An attainable KPI is one that is realistic and based on important goals and values.

110
Q

In an operational review of the processing environment, which indicator would be MOST beneficial?

A.User satisfaction
B.Audit findings
C.Regulatory changes
D.Management changes

A

A is the correct answer.

Justification
User satisfaction measures how the business process meets or surpasses expectation.
Audits are conducted on an ad hoc basis, and findings may not be an effective indicator of the processing controls.
Regulatory changes occur on an ad hoc basis and do not necessarily indicate a change in the process.
Management changes should not be a reflection of the effectiveness of an operation.

111
Q

The management of an enterprise’s physical access controls has been outsourced to an external supplier. Requirements for access approval and acceptance have been agreed on, documented and communicated between the enterprise and the supplier. During a quarterly status meeting, the enterprise decides to terminate the agreement with the supplier. Which of the following MUST have provided the information that triggered the business decision?

A.Review of key risk indicators and thresholds
B.An audit of the supplier’s information processing facilities
C.Review of the supplier’s risk register
D.Review of key performance indicators

A

D is the correct answer.

Justification
Key risk indicators are tools for predicting or indicating the probability of being subject to a future risk event. Although this can be a trigger for a business decision, it does not demonstrate the effectiveness of the current control environment.
An audit of the supplier’s information processing facilities may not result in a finding that impacts the client’s control environment.
A review of the supplier’s risk register may or may not result in a finding that impacts the client’s control environment.
Key performance indicators provide information on how well a control environment is reaching its goals/objectives; KPIs also indicate impact to the client’s control environment. The KPI review triggered the business decision to terminate the agreement.

112
Q

Which of the following activities is related to the use of key performance indicators for management of technology controls?

A.Conducting a threat modeling exercise for technology used by a business line
B.Measurement of control effectiveness to determine that business requirements are being met
C.Implementation of controls to meet control objectives
D.Monitoring the threat environment for changes in probability of key risk events

A

B is the correct answer.

Justification
Conducting a threat modeling exercise is not related to control performance monitoring; it is used to enumerate threats facing an asset.
Key performance indicators (KPIs) can be used to determine whether a control is operating within management-specified requirements.
The use of KPIs to monitor control performance goes beyond just implementing controls to meet control objectives.
A key risk indicator monitoring for threats is not related to management of control performance.

113
Q

A process associated with an established key performance indicator (KPI) requires attention when it shows values:

A.outside of a threshold.
B.higher than the average.
C.lower than the average.
D.fluctuating over time.

A

A is the correct answer.

Justification
Key performance indicators (KPIs) are leading indicators meant to provide insight into whether associated goals will be reached, with sufficient advance notice such that corrective action can be taken if there is a problem. Values that are higher or lower than the average or that fluctuate over time may be entirely normal. What reveals that a process requires attention is an associated KPI’s movement outside the process threshold, which may be established on the basis of upper or lower boundaries, degree of variance, or any other measurement appropriate to the nature of the process.
Values that are higher than the average may be entirely normal. What reveals that a process requires attention is an associated KPI’s movement outside the process threshold, which may be established on the basis of upper or lower boundaries, degree of variance, or any other measurement appropriate to the nature of the process.
Values that are lower than the average may be entirely normal. What reveals that a process requires attention is an associated KPI’s movement outside the process threshold, which may be established on the basis of upper or lower boundaries, degree of variance, or any other measurement appropriate to the nature of the process.
Values that fluctuate over time may be entirely normal. What reveals that a process requires attention is an associated KPI’s movement outside the process threshold, which may be established on the basis of upper or lower boundaries, degree of variance, or any other measurement appropriate to the nature of the process.

114
Q

What is the enterprise ensuring by using key performance indicators?

A.The internal controls are effective.
B.The risk profile is known, and impact to risk tolerance is assessed.
C.The business goals are being achieved.
D.The desired metrics are achieved.

A

D is the correct answer.

Justification
Key control indicators determine if internal controls are effective.
Key risk indicators can help to assess the impact to risk tolerance.
A key business indicator ensures business goals are being achieved.
Key performance indicators ensure desired performance levels and metrics are achieved.

115
Q

The BEST time to perform a penetration test is after:

A.a high turnover in systems staff.
B.an attempted penetration has occurred.
C.various infrastructure changes are made.
D.an audit has reported control weaknesses.

A

C is the correct answer.

Justification
Turnover in systems staff does not warrant a penetration test, although it may warrant a review of password change practices and configuration management.
Conducting a test after an attempted penetration is not as productive because an enterprise should not wait until it is attacked to test its defenses.
Changes in the systems infrastructure are most likely to inadvertently introduce new exposures.
Any exposure identified by an audit should be corrected before it would be appropriate to test.

116
Q

What is the BEST action to take once a new control has been implemented to mitigate a previously identified risk?

A.Update the risk register to show that the risk has been mitigated.
B.Schedule a new risk review to ensure that no new risk is present.
C.Test the control to ensure that the risk has been adequately mitigated.
D.Validate the tests conducted by the implementation team and close out the risk.

A

C is the correct answer.

Justification
The risk assessment team cannot accept assurance from another group without validating that the control did in fact adequately test and mitigate the risk.
There is no need to schedule a full, new risk review, but the remediated control should be tested.
The risk assessment team is responsible for the risk identification and cannot accept assurances from others that the risk has been adequately addressed. The team must test to ensure the risk has in fact been properly mitigated.
Line items within the risk register can be closed only after the risk assessment team is assured of the effectiveness of the controls. The risk assessment team must run its own tests, not just validate test results conducted by the implementation team.

117
Q

Which of the following is the MAIN challenge in calculating the benefits to be realized from the implementation of a control?

A.Benefits can be tangible and intangible.
B.Benefits can accrue over the control implementation life cycle.
C.Benefits are dependent on the cost of control implementation.
D.Benefits are realized over an undefined period of time.

A

A is the correct answer.

Justification
Benefits can be both tangible and intangible. Intangible benefits, such as reputation, service quality, etc., are difficult to measure accurately. Therefore, this is the main challenge in calculating benefits.
Benefits can be calculated over the life cycle of the control, but that is not as big a challenge as calculating intangible benefits.
Benefits realized are not dependent on the cost of control implementation. The cost of control implementation helps to determine whether the benefits outweigh the costs.
Benefits realization is defined at the start of the project and in the business case for control selection and implementation.

118
Q

The implementation of unjustified controls is MOST likely to result in:

A.an increase in residual risk related to the controls.
B.a decrease in residual risk related to the controls.
C.an ineffective monitoring of the related controls.
D.a smaller return on IT investment.

A

D is the correct answer.

Justification
Residual risk will not increase as a result of unjustified controls; however, if controls that do not support business objectives are implemented, the enterprise may place focus on less critical activities.
Residual risk will not decrease as a result of unjustified controls; however, if controls that do not support business objectives are implemented, the enterprise may place focus on less critical activities.
Monitoring will not be impacted by unjustified controls; rather, monitoring will be performed on controls that do not provide value toward achieving business objectives.
Enterprises that have a large suite of controls that do not relate to their critical objectives have a greater likelihood of decreasing their return on IT investment due to the cost of implementing those controls.

119
Q

Effective control implementation correlates PRIMARILY to the decrease of:

A.residual risk.
B.risk register entries.
C.risk reporting.
D.risk tolerance.

A

A is the correct answer.

Justification
Residual risk is defined (in nearly all risk-related standards and frameworks) as the remaining risk after management has implemented risk response. Therefore, it should be a fact and a consequence that an effective implemented risk response correlates with decreased residual risk.
A decrease of risk register entries is not a primary factor because register entries might be new, or they might be older entries that have been modified.
A decrease of risk reporting should not result from a mitigation activity because management should be aware of the changes being implemented.
Effective control implementation does not necessarily indicate a decrease of risk tolerance.

120
Q

A network vulnerability assessment is intended to identify:

A.security design flaws.
B.zero-day vulnerabilities.
C.misconfigurations and missing updates.
D.malicious software and spyware.

A

C is the correct answer.

Justification
Security design flaws require a deeper level of analysis.
Zero-day vulnerabilities, by definition, are not previously known and, therefore, are undetectable.
A network vulnerability assessment intends to identify known vulnerabilities that are based on common misconfigurations and missing updates.
Malicious software and spyware are normally addressed through antivirus and antispyware policies.

121
Q

After a risk assessment study, a bank with global operations decided to continue doing business in certain regions of the world where identity theft was widespread. To MOST effectively deal with the risk, the business should:

A.implement monitoring techniques to detect and react to potential fraud.
B.make the customer liable for losses if the customer fails to follow the bank’s advice.
C.increase its customer awareness efforts in those regions.
D.outsource credit card processing to a third party.

A

A is the correct answer.

Justification
Implementing monitoring techniques that will detect and deal with potential fraud cases is the most effective way to deal with this risk.
While making the customer liable for losses is a possible approach, the bank needs to be seen as proactive in managing its risk.
While customer awareness will help mitigate the risk, it is not sufficient on its own to control fraud risk.
If the bank outsources its processing, the bank still retains liability.

122
Q

Which of the following compensating controls should management implement when a segregation of duties conflict exists because an enterprise has a small IT department?

A.Independent analysis of IT incidents
B.Entitlement reviews
C.Independent review of audit logs
D.Tighter controls over user provisioning

A

C is the correct answer.

Justification
Independent analysis of IT incidents could point to segregation of duties violations. This is not a compensating control but a detective control.
Entitlement reviews are performed to review the access of individuals to ensure they have the proper access for their current role. This review is the responsibility of the data owner and usually occurs at regular intervals. This is not the best way to prevent or detect a segregation of duties conflict.
An independent review of the audit logs would be the best compensating control because someone outside the IT department can validate that no activity exploited segregation of duties.
User provisioning is the process of granting access to an application or system. While a normal part of the provisioning process is to make sure that no segregation of duties conflicts exist, this approach is not practical for the present case due to the small size of the IT department; therefore, tighter controls over user provisioning will be of limited value.

123
Q

Which of the following choices is the BEST criterion to select technology products for control implementation? The product:

A.is easy to use and supported by system manuals.
B.has a built-in audit trail feature.
C.addresses the business risk at acceptable costs.
D.has a large installation base worldwide.

A

C is the correct answer.

Justification
The product may be easy to use, but if product costs are high compared to budgets and expected benefit, the product is not fit for the purpose. If the product does not address the risk, then it is not useful to the enterprise.
A built-in audit trail feature is not the key criterion because the audit trail alone will not suffice in covering all risk that may be in the application.
The decision to implement a control is based on whether the cost to implement and maintain the control will exceed the cost savings associated with the risk that the control is meant to address. Controls should be selected based on their ability to reduce risk at acceptable costs.
Having a large installation base worldwide may not mean that a product is best for the enterprise or that it meets requirements and acceptable costs.

124
Q

Which of the following information security controls mandates behavior by specifying what is and is not permitted?

A.Managerial
B.Detective
C.Corrective
D.Preventive

A

A is the correct answer.

Justification
Managerial controls, such as policies, specify what actions are and are not permitted.
Detective controls, such as audit trails, warn of actual or attempted violations.
Corrective controls, such as backups, allow recovery after a violation is detected.
Preventive controls, such an authentication, reduce or eliminate the probability of a violation occurring.

125
Q

Which of the following controls within the user provision process BEST ensures revocation of system access for contractors and other temporary users when it is no longer required?

A.Log all account usage and send it to the users’ managers.
B.Establish predetermined, automatic expiration dates.
C.Ensure that each user signs a security acknowledgment.
D.Require managers to email security when the user leaves.

A

B is the correct answer.

Justification
Logging, when coupled with monitoring, may be a detective control but it would not be as effective as the preventive control of implementing user accounts with predetermined expiration dates.
Predetermined expiration dates are the most effective means of removing systems access for temporary users.
Requiring each individual to sign a security acknowledgment has little effect in this case.
Managers often do not promptly submit termination notices.

126
Q

The BEST reason to implement a maturity model for risk management is to:

A.establish alignment with business objectives.
B.help improve governance and compliance.
C.ensure that security controls are effective.
D.enable continuous improvement.

A

D is the correct answer.

Justification
Maturity models help benchmark processes and identify gaps between the current and the desired state of specific processes. They do not enable alignment with business objectives, which is more effectively achieved through a balanced scorecard or a goals cascade approach.
While maturity models help identify gaps between the current and the desired state of specific business processes, they do not explicitly improve governance and compliance efforts.
Maturity models help benchmark business processes and identify gaps between the current and the desired states. Maturity models to not explicitly ensure that security controls are effective.
Maturity models are designed to enable continuous improvement. This is achieved by first assessing the current maturity level of specific business processes and determining whether it is congruent with the desired maturity levels. Where gaps exist, maturity models implicitly provide steps to improve the process by defining requirements for each maturity level.

127
Q

Which of the following is an example of a directive control in relation to risk management?

A.Active user authentication
B.An enterprise policy
C.Inhibiting security policy violations
D.Regular remediation of errors

A

B is the correct answer.

Justification
User authentication is a preventive control.
An enterprise policy states the enterprise’s directive related to risk management; therefore, it is a directive control.
Inhibiting security policy violations is a preventive control.
Regular remediation of errors is a corrective control.

128
Q

System backup and restore procedures can BEST be classified as:

A.Technical controls
B.Detective controls
C.Corrective controls
D.Deterrent controls

A

C is the correct answer.

Justification
Technical controls are safeguards incorporated into computer hardware, software or firmware. Operational procedures are nontechnical controls.
Detective controls help identify and escalate violations or attempted violations of security policy; examples include audit trails, intrusion detection tools and checksums.
Corrective controls remediate the impact from negative events. If a system suffers harm so extensive that processing cannot continue, backup restore procedures enable that system to be recovered.
Deterrent controls provide warnings that can discourage potential compromise; examples include warning banners or login screens.

129
Q

Which of the following controls can reduce the potential impact of a malicious hacker who gains access to an administrator account?

A.Multifactor authentication
B.Audit logging
C.Least privilege
D.Password policy

A

C is the correct answer.

Justification
Multifactor authentication safeguards against an account being accessed without authorization. If a malicious hacker has gained access to the account, this control has already been bypassed.
Audit logging may help identify activities undertaken using an administrator account, but it is a lagging indicator; in the absence of other measures, it will not limit malicious activities already underway.
Hackers often target administrative accounts because they are understood to be exempt from controls and have the widest scope of permission. However, given that administrators in many large enterprises specialize in particular areas (e.g., specific servers, specific databases, firewalls, etc.), least privilege can reduce the impact of a compromised account within the scope of its intended use and limit impact to the enterprise as a whole, without restricting the performance of employees in administrative roles. Even in small enterprises (where one person holds multiple roles) least privilege can reduce losses that otherwise may result from compromised accounts.
A password policy requiring frequent changes can limit the reuse value of a compromised account, but will not limit its scope; password changes are likely not frequent enough to prevent malicious access absolutely.

130
Q

A supervisor’s review of an enterprise’s firewall logs is a:

A.physical control.
B.technical control.
C.administrative control.
D.legal control.

A

C is the correct answer.

Justification
Physical controls restrict access to a facility or hardware. The review does not physically restrict access.
While the firewall is a technical control, the control activity is the supervisor’s review, which is an administrative control.
While the firewall is a technical control, the review of the firewall logs is performed by a specific individual (the supervisor) operating a process, and therefore, it is an administrative control.
The firewall log review is not directly based on legislative, regulatory or contractual requirements and is not a legal control.

131
Q

A process by which someone logs onto a website, then receives a token via a short message service (SMS) message, is an example of what control type?

A.Deterrent
B.Directive
C.Compensating
D.Preventive

A

D is the correct answer.

Justification
A deterrent control will discourage improper behavior but will not prevent it.
A directive control guides behavior but will not prevent unauthorized access.
A compensating control addresses a weakness in other controls, but the use of a token-based system will provide adequate control.
The use of a token with a short message service (SMS) message will prevent unauthorized access to the system through two-factor authentication.

132
Q

When aligning controls with business objectives, what is MOST important?

A.Monitoring control activities periodically
B.Ensuring ownership of key control activities
C.Reviewing the risk management strategy
D.Prioritizing control activities based on residual risk

A

B is the correct answer.

Justification
Monitoring control activities should be done continuously, not periodically.
Ensuring ownership of key control activities is the most important factor in assigning control responsibility and control accountability.
Reviewing the risk management strategy can be useful, but without defined ownership, controls cannot be aligned with business objectives.
Prioritizing control activities based on residual risk is important, but it cannot be accomplished without defined ownership.

133
Q

When a significant vulnerability is discovered in the security of a critical web server, immediate notification should be made to the:

A.development team to remediate.
B.data owners to mitigate damage.
C.system owner to take corrective action.
D.incident response team to investigate.

A

C is the correct answer.

Justification
The development team may be called on by the system owner to resolve the vulnerability.
Data owners are notified only if the vulnerability could have compromised data.
To correct the vulnerabilities, the system owner needs to be notified quickly, before an incident can take place.
The incident response team should not be notified because the incident has not taken place and notification could delay implementation of the fix.

134
Q

As part of risk monitoring, the administrator of a two-factor authentication system identifies a trusted independent source indicating that the algorithm used for generating keys has been compromised. The vendor of the authentication system has not provided further information. Which of the following is the BEST initial course of action?

A.Wait for the vendor to formally confirm the breach and provide a solution.
B.Determine and implement suitable compensating controls.
C.Identify all systems requiring two-factor authentication and notify their business owners.
D.Disable the system and rely on single-factor authentication until further information is received.

A

C is the correct answer.

Justification
Waiting for the vendor to acknowledge the vulnerability may result in unacceptable exposure and may be considered negligent.
Determining suitable compensating controls is not appropriate without instructions from the responsible business owner.
Business owners should be notified, even when some information may not be available. Business owners are responsible for responding to new risk.
Disabling the system is not appropriate because there is no indication that the compromise will have an impact on the first-factor authentication.

135
Q

During the risk assessment process, it is MOST important to establish a clear line of accountability to:

A.ensure that the risk assessment is completed on time.
B.ensure that there is adequate participation and feedback.
C.ensure that risk ownership is assigned to the appropriate level.
D.ensure that risk identified in the process is mitigated.

A

C is the correct answer.

Justification
Completing the risk assessment on time better ensures that identified risk is responded to prior to an adverse event. However, time is not related to accountability.
Adequate participation and feedback are important to the risk assessment, but they do not establish accountability.
Applying risk ownership to the appropriate level is the most important element in establishing a clear line of accountability.
Ensuring that identified risk is mitigated is fundamental to an effective risk management program, but it requires accountability.

136
Q

Which of the following is critical to the risk practitioner for an effective risk management program?

A.Risk response strategy
B.Risk register content
C.Risk profile content
D.Risk owners and accountability

A

D is the correct answer.

Justification
The risk response strategy to mitigate identified risk provides risk owners with options for managing their owned risk.
The risk register identifies risk and available controls.
The risk profile describes current risk facing the enterprise and documents its compliance with risk appetite and tolerance.
The identification of risk owners is critical because risk owners must make informed and cost-effective business decisions regarding appropriate controls to mitigate their owned risk. Risk response strategy, risk registers and risk profiles are tools that require ownership by users who apply them proactively and with accountability.

137
Q

An enterprise is implementing controls to protect a list of employee details from being exposed to unauthorized individuals. The internal control requirements will come from:

A.the risk management team.
B.internal audit.
C.IT management.
D.process owners.

A

D is the correct answer.

Justification
The risk management team will be involved in the control risk review process.
Internal audit will measure the effectiveness of the implemented internal control.
IT management will be involved in the IT governance and policies and procedures but not with business-specific internal controls.
Process owners will provide the internal control requirements based on the business needs and objectives.

138
Q

Which of the following is a PRIMARY role of the system owner during the accreditation process? The system owner:

A.reviews and approves the security plan supporting the system.
B.selects and documents the security controls for the system.
C.assesses the security controls in accordance with the assessment procedures.
D.determines whether the risk to the business is acceptable.

A

B is the correct answer.

Justification
The review and approval of the security plan, including system and general IT controls, is the responsibility of senior management, or a delegated authorized individual, not the system owner.
The system owner specifies the information security controls for the system being deployed based on functional requirements from the information owner.
The system owner does not test the controls. Security control testing is the responsibility of the security control assessor or an otherwise independent party.
Senior management is accountable for determining whether the risk to the business is acceptable.

139
Q

Which of the following is MOST important for effective risk management?

A.Assignment of risk owners to identified risk
B.Ensuring compliance with regulatory requirements
C.Integration of risk management into operational processes
D.Implementation of a risk avoidance strategy

A

A is the correct answer.

Justification
It is of utmost importance to assign risk to individual owners and therein maximize accountability.
Regulatory compliance is a relatively small part of risk management.
Risk management should be integrated into strategic, tactical and operational processes of an enterprise.
Risk avoidance is not always feasible in a business environment.

140
Q

The MOST effective starting point to determine whether an IT system continues to meet the enterprise’s business objectives is to conduct interviews with:

A.executive management.
B.IT management.
C.business process owners.
D.external auditors.

A

C is the correct answer.

Justification
Executive management will be able to provide the overall picture of the enterprise’s business objectives.
IT management is important but should not be the starting point because it likely does not see a clear picture of all organizational objectives or how the business plans to use IT in the future.
Business process owners are an effective starting point for conducting interviews to ensure that IT systems are meeting their individual business process needs.
External auditors can be useful for an objective view on control performance of the IT systems, but they are not a starting point in determining if an IT system continues to meet organizational objectives.

141
Q

Which of the following activities provides the BEST basis for establishing risk ownership?

A.Documenting interdependencies between departments and business processes
B.Mapping identified risk to a specific business process
C.Referring to available RACI charts for business processes
D.Distributing risk among identified business process owners

A

B is the correct answer.

Justification
Documenting interdependencies between or among departments helps identify the workflow but does not identify risk ownership.
Mapping identified risk to a specific business process helps identify the process owner. Aggregation of related business processes results in identification of the prospective risk owner.
The review of a RACI chart identifies who is responsible, accountable, consulted and informed within an organizational framework, but a RACI chart is too general to establish ownership.
Ownership of risk cannot be a shared responsibility; rather, each risk must be allocated to specific individual owners.

142
Q

Which of the following is MOST important prior to conducting a penetration test?

A.Nondisclosure agreements signed by testers
B.Documented scope defined by business objectives
C.Use of proprietary rather than open source tools
D.Senior management approval of exercise parameters

A

D is the correct answer.

Justification
Nondisclosures and confidentiality agreements signed by testers are important but secondary to obtaining senior management approval of the test parameters.
Although the documented scope defined by business objectives is important, it does not provide the go/no-go decision to proceed with the test.
Proprietary tools generally are less susceptible to hackers than open source penetration tools. However, the tool chosen to conduct the test is not as important as having pre-established exercise parameters approved by senior management.
A penetration test has far-reaching consequences that can include denial of service, loss of confidentiality, and even a threat to the going concern of the enterprise. Thus, it is important that senior management review and approve the testing parameters before the penetration test is executed.

143
Q

What role does the risk professional have in regard to the IS control monitoring process? The risk professional:

A.maintains and operates IS controls.
B.approves the policies for IS control monitoring.
C.determines the frequency of control testing by internal audit.
D.assists in planning, reporting and scheduling tests of IS controls.

A

D is the correct answer.

Justification
The risk professional holds a consultative position and should ensure that tests are being conducted and reported on, and that mitigation efforts are conducted as necessary. The risk professional is not accountable for the maintenance and operation of the controls.
Policy approval is a governance function and not part of the risk professional’s role.
The risk professional does play a consultative role for audit and other executive functions but does not determine the frequency of control testing.
The risk professional plays a key role in scheduling, supervising and reporting on risk. This includes responsibility for working with the testing teams.

144
Q

Which of the following actions will BEST preserve availability of a service during a penetration test?

A.Schedule testing of critical systems during maintenance windows.
B.Automate the testing of critical applications and servers.
C.Exclude noncritical systems from tests.
D.Establish monitoring and help desk units to handle incidents.

A

A is the correct answer.

Justification
Conducting the penetration tests during maintenance windows will give ample time to correct any fallout before business resumption.
Test automation does not prevent downtime.
Fewer systems to test does not necessarily prevent downtime because unavailability of a critical application can be costly.
Establishing monitoring and help desk units to handle incidents is reactive, not preventive.

145
Q

Monitoring has flagged a security exception. What is the MOST appropriate action?

A.Escalate the exception.
B.Update the risk register.
C.Activate the risk response plan.
D.Validate the exception.

A

D is the correct answer.

Justification
The escalation to management should not occur until more is known about the situation, and even then only if it is outside the security manager’s scope to address the issue.
The risk register should be updated after the exception has been validated.
The risk response plan will not be activated until the exception has been validated and the response has been approved by management.
Before any other action is taken, the risk practitioner should ensure that the exception identified by monitoring is not a false positive.

146
Q

Which of the following choices is the INITIAL step for a risk practitioner implementing continuous risk monitoring systems?

A.Perform compliance testing on internal controls.
B.Establish a risk and controls monitoring steering committee.
C.Document the risk to existing internal controls.
D.Identify high-risk areas within the enterprise.

A

D is the correct answer.

Justification
Performing compliance testing on internal controls is not the first step in implementing continuous monitoring systems. The objective of continuous monitoring systems is to monitor high-risk areas.
Establishing a risk and controls monitoring steering committee is the role of senior management, not the risk practitioner.
Documenting the risk to existing internal controls is not the first step in implementing continuous monitoring systems. The objective of continuous monitoring systems is to monitor high-risk areas.
When implementing continuous monitoring systems, a risk practitioner’s first step is to identify high-risk areas within the enterprise.

147
Q

Which of the following assessments of an enterprise’s risk monitoring process will provide the BEST information about its alignment with industry-leading practices?

A.A capability assessment by an outside firm
B.A self-assessment of capabilities
C.An independent benchmark of capabilities
D.An internal audit review of capabilities

A

C is the correct answer.

Justification
A capability assessment by an outside firm does not assess the enterprise against industry peers or competitors and only provides the opinion of the examiner as to what are or are not industry-leading practices.
A process capability self-assessment does not assess the enterprise against industry peers or competitors. It provides the opinion of the examiner and in the case of a self-assessment is not independent of the process to be reviewed.
An independent benchmark of capabilities allows an enterprise to understand its level of capability compared to other enterprises within its industry. This allows the enterprise to identify industry-leading practices and its level of capability associated with those practices.
An internal audit review of capabilities does not assess the enterprise against industry peers or competitors. Audits generally measure capabilities against corporate standards, not necessarily against industry-leading practices.

148
Q

Implementing continuous monitoring controls is the BEST option when:

A.legislation requires strong information security controls.
B.incidents may have a high impact and frequency.
C.incidents may have a high impact, but low frequency.
D.e-commerce is a primary business driver.

A

B is the correct answer.

Justification
Regulations and legislation that require tight IT security measures focus on requiring enterprises to establish a governance structure that manages IT security with a risk-based approach, so each enterprise decides which kinds of controls are implemented. Continuous monitoring is not necessarily a requirement.
Because they are expensive, continuous monitoring control initiatives are used in areas where the risk is at its greatest level. These areas have a high impact and frequency of occurrence.
Measures such as contingency planning are commonly used when incidents rarely happen but have a high impact each time they happen. Continuous monitoring is unlikely to be necessary.
Continuous control monitoring initiatives are not needed in all e-commerce environments. There are some e-commerce environments where the impact of incidents is not high enough to support the implementation of this kind of initiative.

149
Q

The PRIMARY reason to report significant changes in IT risk to management is to:

A.update the information asset inventory on a periodic basis.
B.update the values of probability and impact for the related risk.
C.reconsider the degree of importance of existing information assets.
D.initiate a risk impact analysis to determine if additional response is required.

A

D is the correct answer.

Justification
An asset inventory may be updated even when there is no significant risk reported. This is less important than initiating an appropriate risk response for impacted information assets.
Updating new probability and impact values may be done when the risk assessment is performed or when significant risk is identified and analyzed.
Management staff of relevant functions understand the importance of their assets and do not wait for significant risk to reconsider it.
The changes in information risk will impact the business process of a department or multiple departments; the security manager should report this to department heads so that they are able to initiate a risk analysis to determine the impact and if there are changes needed.

150
Q

An enterprise is experiencing an increase in information compromise and cyberattacks on its network. Management is not pleased with the negative press and wants to address the underlying issue. Which of the following will provide management with the information needed to address and better understand the underlying issue?

A.Key performance indicators
B.Key risk indicators
C.External penetration test results
D.Gaps in the secure coding program

A

C is the correct answer.

Justification
Key performance indicators are measures used to provide information on how well a control or process is performing in achieving its stated objectives. This information would not identify deficiencies in the control or the appropriate action to take.
Key risk indicators are tools for predicting or indicating probability of being subject to a future event, but they would not identify deficiencies in the control or the appropriate action to take.
External penetration tests will reveal exploitable vulnerabilities on the enterprise’s network. Management can take appropriate action to resolve those issues.
Identification of gaps in the secure coding program will minimize the vulnerabilities in the enterprise’s network, but the penetration test will identify those vulnerabilities.

151
Q

Which of the following types of control assessment offers the system owner the GREATEST level of assurance regarding the effectiveness of implemented security controls?

A.Vulnerability assessment
B.Third-party assurance
C.Penetration test
D.Self-assessment

A

C is the correct answer.

Justification
Identification of vulnerabilities through a vulnerability assessment provides insight into what might be successfully attacked, but it does not indicate the extent to which the vulnerable system might be compromised or the realistic potential to exploit a vulnerability for broader system access.
A third-party assessment (such as a Statement on Standards for Attestation Engagements No. 18 [SSAE 18] reporting, SOC 1, SOC 2 or SOC 3) may be used by a system owner to gain an understanding of the control environment; however, it would not give the greatest level of assurance.
The intent of a penetration test is to simulate a real-world attack situation with the goal of identifying how far an attacker would be able to penetrate into an environment. Penetration testing typically includes a vulnerability assessment, but it goes beyond identification of vulnerabilities to explore the extent to which they can realistically be attacked and the potential to exploit them for broader system access.
Self-assessment is a useful tool for internal management awareness, but it is inherently limited by internal bias (e.g., not wanting to document findings, or favoring skill areas in which the team is already strong). A self-assessment is very unlikely to reveal vulnerabilities or areas of system risk that are entirely outside the perception of the people responsible for the system.

152
Q

Which of the following is the BEST way for a risk practitioner to ensure that controls are in place and effectively addressing the risk?

A.Key performance indicators
B.Control testing
C.Control monitoring
D.Key risk indicators

A

C is the correct answer.

Justification
Key performance indicators report on control performance. However, monitoring provides a better view of effectiveness.
Control testing is performed when the control is put in place and on an ad hoc basis. However, monitoring provides a better view of effectiveness.
Control monitoring confirms that the control is addressing the risk and operating effectively.
Key risk indicators report on control performance and could communicate a problem. However, they may not provide enough information to confirm that a problem exists.

153
Q

Which of the following practices is MOST closely associated with risk monitoring?

A.Assessment
B.Mitigation
C.Analysis
D.Reporting

A

D is the correct answer.

Justification
Risk assessment is associated with risk identification and evaluation but not with risk monitoring.
Risk mitigation is associated with risk response but not with risk monitoring.
Risk analysis is associated with risk identification and evaluation but not with risk monitoring.
Risk reporting is typically associated with risk monitoring.

154
Q

Which of the following metrics is the MOST useful in measuring the monitoring of violation logs?

A.Penetration attempts investigated
B.Violation log reports produced
C.Violation log entries
D.Frequency of corrective actions taken

A

A is the correct answer.

Justification
The most useful metric is one that measures the degree to which complete follow-through has taken place, such as penetration attempts investigated.
Violation log reports are not indicative of whether investigative action was taken. The most useful metric is one that measures the degree to which complete follow-through has taken place.
Violation log entries are not indicative of whether investigative action was taken. The most useful metric is one that measures the degree to which complete follow-through has taken place.
Frequency of corrective actions taken is not indicative of whether investigative action was taken. The most useful metric is one that measures the degree to which complete follow-through has taken place.

155
Q

Which control assessment type is MOST effective for an Internet-facing application?

A.Vulnerability assessment
B.Audits
C.Threat risk assessments
D.Penetration testing

A

D is the correct answer.

Justification
Vulnerability assessments are performed internally and therefore are not as effective as penetration testing in identifying exposures for Internet-facing applications.
Audits do not provide as robust information as penetration testing in identifying exposures for Internet-facing applications.
Threat risk assessments are a result of penetration testing.
Penetration testing is the method used to identify exposures in Internet-facing applications and is the most effective because it is conducted by an external party.

156
Q

Which of the following is the FIRST step when developing a risk monitoring program?

A.Developing key indicators to monitor outcomes
B.Gathering baseline data on indicators
C.Analyzing and reporting findings
D.Conducting a capability assessment

A

D is the correct answer.

Justification
Developing key indicators to monitor outcomes is necessary but not the first step. There is no use for indicators if there is no information on what the indicators are going to report.
Gathering baseline data on indicators is necessary but not the first step. There is no use for gathering baseline data if the indicators are not defined.
Analyzing and reporting findings is necessary but not the first step. There is no use for analyzing and reporting findings if the baseline is not there.
This step determines the capacity and readiness of the entity to develop a risk management program. This assessment identifies champions, barriers, owners and contributors to the program, including identifying the overall goal of the program. A capability assessment helps determine the enterprise’s maturity in its risk management processes and the capacity and readiness of the entity to develop a risk management program. When the enterprise is more mature, more sophisticated responses can be implemented; when the enterprise is rather immature, some basic responses may be a better starting point.

157
Q

What is the MOST important criterion when reviewing information security controls?

A.To provide assurance to management of control monitoring
B.To ensure that the controls are effectively addressing risk
C.To review the impact of the controls on business operations and performance
D.To establish a baseline as a benchmark for future tests

A

B is the correct answer.

Justification
It is important to inform management of the monitoring and testing of controls, but that is not the primary purpose of a control.
The primary purpose of a control is to ensure that it is effectively addressing the risk for which the control was selected and implemented.
The impact of the control on performance is secondary to the requirement to ensure that the control is properly addressing risk.
Providing a benchmark for future tests is not the primary purpose of a control review.

158
Q

Which of the following MUST be included when developing metrics to identify and monitor the control life cycle?

A.Thresholds that identify when controls no longer provide the intended value
B.Customized reports of the metrics for key stakeholders
C.A description of the methods and practices used to develop the metrics
D.Identification of a repository where metrics will be maintained and stored

A

A is the correct answer.

Justification
Metrics used to monitor the control life cycle require thresholds to identify when controls are no longer providing their intended value, which ensures that the enterprise is aware and can take appropriate action. Without this information, an enterprise may be under the impression that ineffective controls are still effective and do not need to be adjusted or retired.
Customized reports of the metrics for key stakeholders are valuable but not required as part of the metric and measurement development process for life cycle controls.
While a description of how a specific metric was developed may be useful for knowledge transfer and to improve the metric over time, it is not a requirement.
A repository where metrics are maintained or stored may be useful in larger enterprises; however, for smaller enterprises there may be no need to create a formal repository.

159
Q

An enterprise recently implemented a key risk indicator (KRI) to alert top executives of security incidents. Several security incidents were identified, but top executives were not notified. The MOST likely reason is that:

A.the incidents did not meet the KRI sensitivity threshold.
B.the KRI is not linked to a specific control.
C.the cost of maintaining the KRI is too high to justify.
D.the KRI provides results that cannot be compared over time.

A

A is the correct answer.

Justification
The sensitivity of a key risk indicator (KRI) determines the threshold at which reporting occurs, and each KRI is related to the risk appetite and tolerance levels of the enterprise. Security incidents occur frequently in large enterprises, but few of them reach the threshold at which it would make sense to alert top executives. Most likely, the enterprise established a KRI that was designed to refrain from generating an alert unless and until a particular security incident posed the potential for enterprise-level impact.
KRIs do not need to be linked to specific controls. They could be linked to external data.
KRIs need to be maintained over time in order to preserve their alignment with the enterprise’s internal and external environments and organizational risk appetite and tolerance, but maintenance is not a factor in this situation.
KRIs that are not specific, measurable and repeatable should not be implemented. Implementing a KRI whose results cannot be compared over time is a common mistake.

160
Q

A backward-looking key risk indicator is intended to:

A.provide early warning.
B.serve as a predictor.
C.improve risk responses.
D.indicate risk variances.

A

C is the correct answer.

Justification
Forward-looking key risk indicators (KRIs) offer early warning signals that a high risk is emerging, potentially allowing management to take proactive action.
Reliable indicators possess a high correlation with risk. They may be forward- or backward-looking.
KRIs that provide insight into events that have already occurred, enabling risk responses and management to be improved, are referred to as backward-looking indicators.
Sensitive indicators are capable of accurately indicating risk variances and are typically forward-looking.

161
Q

When developing key risk indicators, which of the following choices will BEST guide the risk practitioner?

A.Data extraction tools
B.Policies and regulations
C.Nonperforming assets
D.Summary reports

A

B is the correct answer.

Justification
Data extraction tools provide critical input when developing key risk indicators (KRIs), and the output is used when measuring against a KRI.
Policies and regulations oversee the business operations of the enterprise and provide the baseline for defining measures against business goals and objectives.
Nonperforming assets can potentially have KRIs affiliated with them; however, they will not be the best guide in the development of KRIs.
Summary reports are one of the value propositions for KRIs.

162
Q

The selection of key risk indicators for monitoring the risk management program should be based on selecting:

A.indicators that drill down to the actual symptoms of events.
B.indicators identified with the involvement of critical stakeholders.
C.a balance between lead and lag indicators.
D.automated systems that can provide the relevant data on indicators.

A

C is the correct answer.

Justification
Key risk indicators (KRIs) should drill down to the root cause of the event, not symptoms.
KRIs should be identified with the involvement of all stakeholders, not just critical stakeholders.
Lead and lag indicators should be in balance because any KRI should be a combination of risk events that have occurred and proactive monitoring of risk to initiate action. Lead indicators are forward-looking and signal that a high risk is emerging, while lag indicators are backward-looking and signal events that have occurred. Enabling risk response improvement requires both of these elements.
Using automated systems to provide the relevant data on indicators would not be appropriate because indicators may also come from manual systems, processes and other sources that are not necessarily automated.

163
Q

What is the BEST approach for creating key risk indicators (KRIs) for quarterly reporting to senior leadership?

A.Survey senior leaders about their primary risk concerns.
B.Identify a list of the most common vulnerabilities in the network.
C.Determine which KRIs are used in similar industry verticals.
D.Identify the enterprise risk appetite and metrics and measures of current risk.

A

D is the correct answer.

Justification
Speaking with senior leaders will provide insights into areas of concern, but feedback may be subjective and immeasurable. This information could be used as a contributor to the analysis for creating KRIs.
Vulnerabilities lack the likelihood and impact component of risk and alone cannot be leveraged to create a KRI.
The creation of KRIs should be based on the enterprise’s risk appetite and the measures available.
Key risk indicators (KRIs) are measurable and quantifiable indicators of risk to assist in the monitoring and appropriate risk treatment proactively.

164
Q

A risk practitioner has collected several IT-related key risk indicators related to the core financial application. These would MOST likely be reported to:

A.key stakeholders.
B.the IT administrator group.
C.the finance department.
D.IT management.

A

D is the correct answer.

Justification
Key stakeholders are a broad group of internal and external individuals and entities that are affected by a specific process. While some stakeholders may need to know about relevant key risk indicators (KRIs), it may not be appropriate to share such information with other stakeholders.
The IT administrator group is not a key target for sharing IT-related KRIs. KRIs generally are shared with those who make risk response decisions or who are accountable for the execution of risk responses.
The finance department is not a key target for sharing IT-related KRIs for the financial application. KRIs generally are shared with those who make risk response decisions or who are accountable for the execution of risk responses.
IT management is a key target group for sharing IT-related KRIs for the financial application because it makes decisions related to risk response.

165
Q

Which of the following BEST assists in the proper design of an effective key risk indicator?

A.Generating the frequency of reporting cycles to report on the risk
B.Preparing a business case that includes the measurement criteria for the risk
C.Conducting a risk assessment to provide an overview of the key risk
D.Documenting the operational flow of the business from beginning to end

A

D is the correct answer.

Justification
Generating the frequency of reporting for the key risk indicator (KRI) means nothing if the KRI is not designed.
A proper business case describes what is going to be done, why it is worth doing, how it will be accomplished, and what resources will be required. It will not document the data points, structures, or anything else needed for designing a KRI.
A risk assessment is the determination of a value of risk related to some situation and a recognized threat. While it contributes somewhat to the design of the KRI, there is a need for additional information.
Prior to starting to design the KRI, a risk manager must understand the end-to-end operational flow of the business. The risk manager requires detailed insight into data flows, decision-making processes, acceptable levels of risk for the business, etc., which enables the application of top and bottom levels for the KRI.

166
Q

Which of the following BEST describes the reliability of a key risk indicator? The metric:

A.performs within the appropriate thresholds.
B.tests the target at predetermined intervals.
C.flags exceptions every time they occur.
D.initiates corrective action.

A

C is the correct answer.

Justification
Sensitivity of the key risk indicator (KRI) relates to the variation from a defined state that the indicator will allow before it flags an exception. The smaller the variation, the more sensitive the KRI. While sensitivity may affect the reliability of the KRI, sensitivity itself is not sufficient to determine reliability.
Testing the target at predetermined intervals relates to the frequency of the KRI. While frequency may affect the reliability of the KRI, frequency itself is not sufficient to determine reliability.
KRIs that are reporting on the data points that cannot be controlled by the enterprise or are not alerting management at the correct time to an adverse condition must be adjusted (optimized) to be more precise, more relevant or more accurate. Flagging exceptions every time they occur indicates the reliability of the KRI.
Reliability does not initiate corrective action; it means that there is a high correlation with the risk and is a good predictor or outcome measure.

167
Q

Which of the following is MOST useful for communicating current enterprise risk to management?

A.Control self-assessment results
B.A controls inventory
C.Key risk indicators
D.Independent audit reports

A

C is the correct answer.

Justification
Creating economies of scale, such as a control self-assessment results, will allow the enterprise to share common resources. This is typically done during the identification of business opportunities phase.
A controls inventory will assist the enterprise in managing risk more efficiently because existing controls can be considered during risk scenario development or when selecting a risk response.
Of the choices listed, reporting on key risk indicators is the most useful for informing management of the current state of enterprise risk.
Independent audit reports provide insights on audit findings and related risk, based on the specific scope of the audits being performed. Audit reports do not provide an enterprise-wide risk perspective.

168
Q

An operations manager assigns monitoring responsibility of key risk indicators to line staff. Which of the following is MOST effective in validating the effort?

A.Reported results should be independently reviewed.
B.Line staff should complete risk management training.
C.The threshold should be determined by risk management.
D.Indicators should have benefits that exceed their costs.

A

A is the correct answer.

Justification
Because key risk indicators (KRIs) are monitored by line staff, there is a chance that staff may alter results to suppress unfavorable findings. Additional reliability of monitoring metrics can be achieved by having the results reviewed by an independent party.
It is not mandatory that line staff complete risk management training in order to be engaged in monitoring of KRIs.
The threshold should be determined through discussion between risk management, line staff and business managers.
It is important that the benefits of KRIs justify their costs; however, this determination does not help verify that the monitoring efforts of KRIs are effective.

169
Q

When the key risk indicator for the IT change management process reaches its threshold, a risk practitioner should FIRST report this to the:

A.business owner.
B.chief information security officer.
C.help desk.
D.incident response team.

A

A is the correct answer.

Justification
Reporting to the business owners first is the most appropriate action because they own the risk and determine the risk response.
Reporting to the chief information security officer is important but is not as critical as reporting to the business owners.
Reporting to the help desk is not appropriate when reporting on risk. The report must go to the business owners because they own the risk and determine the risk response.
Reporting to the incident response team is not appropriate when reporting on risk. The report must go to the business owners because they own the risk and determine the risk response.

170
Q

What is the MOST essential attribute of an effective key risk indicator (KRI)?

A.The KRI is accurate and reliable.
B.The KRI is predictive of a risk event.
C.The KRI provides quantitative metrics.
D.The KRI indicates required action.

A

B is the correct answer.

Justification
Key risk indicators (KRIs) are usually indicators that risk is developing and typically are neither accurate nor reliable in the sense that they indicate what the actual risk is.
A KRI should indicate that a risk is developing or changing to show that investigation is needed to determine the nature and extent of a risk.
KRIs typically do not provide quantitative metrics about risk.
KRIs will not indicate that any particular action is required other than to investigate further.

171
Q

Which of the following is the GREATEST benefit of using key risk indicators? They provide:

A.a backward-looking view.
B.an indication of risk tolerance and appetite.
C.an early warning signal.
D.an improved chance of achieving enterprise objectives.

A

C is the correct answer.

Justification
A backward-looking view alone does not initiate proactive action.
Providing an indication of risk tolerance and appetite alone does not initiate proactive action.
Providing an early warning signal is most beneficial, as it allows for proactive action to be taken.
Improving the chance of achieving enterprise objectives alone does not initiate proactive action.

172
Q

An enterprise implements lagging key risk indicators in order to:

A.gather data to report to management.
B.predict an approaching risk event.
C.proactively monitor the current state of the risk profile.
D.conduct forecasting for the risk event.

A

A is the correct answer.

Justification
Lagging, or backward-looking, key risk indicators (KRIs) can be used to report data to management.
Leading, or forward-looking, KRIs can predict risk events, not lagging KRIs.
Leading KRIs are used to proactively monitor and control the current state of the risk profile, not lagging KRIs.
Leading KRIs can provide future-looking data for forecasting of risk events, not lagging KRIs.

173
Q

Which of the following attributes of a key risk indicator is the MOST important when reviewing its effectiveness?

A.Repeatable
B.Timing
C.Corrective action
D.Actionable

A

A is the correct answer.

Justification
A key risk indicator must be repeatable to be measured and to be effective over time.
Timing on its own does not ensure effectiveness.
Corrective action on its own does not ensure effectiveness.
Actionable is an attribute of a key performance indicator.

174
Q

What is the MOST important attribute of an effective key risk indicator (KRI)?

A.A KRI’s tolerance level should be defined.
B.A KRI should provide quantitative data for trend analysis.
C.A KRI should enable consistent data collection.
D.A KRI should be linked to a specific risk.

A

D is the correct answer.

Justification
Based upon management input, the tolerance level of the key risk indicator (KRI) may be defined, but it is a secondary action. For some KRIs, there might be zero tolerance in risk deviation.
Lagging KRIs can provide incident reports (i.e., information about a risk event after it occurs) and may not be useful for trend analysis. Future-looking KRIs are used for trend analysis and forecasting.
Any data collection or reporting tool should enable consistent data collection. This is not specific to KRIs.
A KRI should be linked to a specific risk event in order to be useful. Without attaching it to an event, a KRI would not be useful.

175
Q

Where are key risk indicators MOST likely identified when initiating risk management across a range of projects?

A.Risk governance
B.Risk response
C.Risk analysis
D.Risk monitoring

A

B is the correct answer.

Justification
Risk governance is a systemic approach to decision-making processes associated with risk. From a CRISC perspective, IT risk is adopted to achieve more effective risk management and to reduce risk exposure and vulnerability by filling gaps in the risk policy. This is not a risk management activity, but rather a risk management oversight function.
Key risk indicators (KRIs) and risk definition and prioritization are considered part of the risk response process. After having identified, quantified and prioritized the risk to the enterprise, relevant risk indicators need to be identified to help provide risk owners with meaningful information about a specific risk or a combination of types of risk.
Risk analysis is the process of identifying the types, probability and severity of risk that may occur during a project. Once the identification has taken place, the analysis feeds into the risk response process, which identifies KRIs, among other tasks.
Risk monitoring occurs after the risk response process and is ongoing. Assigning ownership to KRIs and defining various levels of KRI thresholds—along with automating the monitoring and notification process—help ensure monitoring of KRIs. KRIs must be identified before risk monitoring is implemented.

176
Q

An enterprise is developing a key risk indicator (KRI) to determine if end users need additional security awareness training. Which of the following is the BEST KRI to implement in this situation?

A.Number of successful attacks
B.Number of lost external storage devices
C.Unauthorized software installations
D.Increase in the number of network outages

A

C is the correct answer.

Justification
The number of successful attacks on a system is the result of external threat actors and does not indicate that internal security awareness training is needed.
The number of lost drives is not an indication that additional training is needed. It could be the result of unintentional error.
Users should install only authorized software. In this case, additional training is needed to prevent this activity.
An increase in network outages is not necessarily due to end users’ lapse of security.

177
Q

An enterprise has contracted an external supplier to develop critical components of a consumer product. Risk tolerance levels for the outsourced component have been documented and approved. Which of the following can serve to gauge risk that may trigger stakeholder concern?

A.Indicators with approved thresholds
B.Approved status report of completed milestones
C.List of controls to be implemented by the supplier
D.Number of findings in external audit reports

A

A is the correct answer.

Justification
Indicators with approved thresholds demonstrate the acceptable risk levels stakeholders are willing to tolerate, and any risk above those approved levels will likely trigger stakeholder concern.
A status report of completed milestones only shows deliverables that have been completed against projected timelines for the outsourced component.
The lists of controls to be implemented by the supplier are requirements that the supplier will fulfill. To gauge potential for stakeholder concern, indicators for thresholds and tolerance must be defined and approved.
The number of findings in external audit reports is not an indicator of risk tolerance levels.

178
Q

Which of the following considerations is MOST important when implementing key risk indicators?

A.The metric is easy to measure.
B.The metric is easy to aggregate.
C.The metric can be interpreted clearly.
D.The metric links to a specific risk.

A

D is the correct answer.

Justification
Ease of measuring the key risk indicator (KRI) is an important consideration and includes the considerations of data extraction, validation, aggregation and analysis. It is, however, secondary to linking a KRI to a specific risk.
An important consideration of metrics is the ability to classify and combine several metrics together in order to understand the underlying risk they represent. This is, however, secondary to linking a KRI to a specific risk.
Being able to easily understand (interpret) the metric is an important consideration. It is, however, secondary to linking a KRI to a specific risk.
Linking to a specific risk is the most important criterion when selecting a KRI. A KRI is designed to trigger a warning when the key performance indicator is approaching a threshold or tolerance. If the KRI is not tied to a specific risk, then the warning is unclear.

179
Q

A key risk indicator continues to trigger false positives for a network intrusion detection system. Which of the following might a risk practitioner recommend that the risk owner adjust?

A.Sensitivity
B.Timing
C.Frequency
D.Reliability

A

A is the correct answer.

Justification
Reliable key risk indicators (KRIs) must measure precise and accurate data that can be validated. Adjusting the sensitivity of the false positive must be reviewed and considered.
Timing does not have an impact on false-positive alarms recorded by the KRI because timing is based on the impact at the time the event occurred and was detected by the intrusion detection system (IDS).
Frequency does not have an impact on false-positive alarms recorded by the KRI.
Reliability of the KRI is dependent on the accuracy of the reporting device (such as an IDS).

180
Q

Which of the following provides the BEST capability to identify whether controls that are in place remain effective in mitigating their intended risk?

A.A key performance indicator
B.A risk assessment
C.A key risk indicator
D.An audit

A

C is the correct answer.

Justification
A key performance indicator (KPI) is a measure that determines how well the process enables the goal to be reached. A KPI is a leading indicator of whether a goal will likely be reached and a good indicator of capabilities, practices and skills. It measures an activity goal, which is an action that the process owner must take to achieve effective process performance.
A risk assessment is a process used to identify and evaluate risk and its potential effects. It includes assessing the critical functions necessary for an enterprise to continue business operations, defining the controls in place to reduce enterprise exposure and evaluating the cost of such controls. Risk analysis often involves an evaluation of the probabilities of a particular event.
A key risk indicator (KRI) identifies whether a risk exists and has the potential to be realized in a way that would have a negative impact on the enterprise. If controls that are in place to mitigate identified risk are working properly, then KRIs should not report a concern.
An audit is a formal inspection and verification to check whether a standard or set of guidelines is being followed, records are accurate, or efficiency and effectiveness targets are being met.

181
Q

Business stakeholders and decision makers reviewing the effectiveness of IT risk responses would PRIMARILY validate whether:

A.IT controls eliminate the risk in question.
B.IT controls are continuously monitored.
C.IT controls achieve the desired objectives.
D.IT risk indicators are formally documented.

A

C is the correct answer.

Justification
Risk cannot be eliminated; the objective is to manage risk to an acceptable level.
The continuous monitoring of controls does not necessarily indicate the effectiveness of the control itself.
The stakeholders are most interested in whether the control meets the stated objectives.
The documentation of IT risk indicators does not demonstrate the effectiveness of the risk response.

182
Q

The MOST important reason for reporting control effectiveness as part of risk reporting is that it:

A.enables audit reporting.
B.affects the risk profile.
C.requires mitigation.
D.helps manage the control life cycle.

A

B is the correct answer.

Justification
Changes in controls are not necessarily reported to the audit function.
Changes may render a control ineffective and allow a vulnerability to be exploited. Changes in control may also strengthen the enterprise’s risk profile (e.g., in cases in which highly manual processes are automated).
A change may be replacing a weaker control with a stronger control; changes do not necessarily require mitigation.
Reporting changes in controls may help manage the control life cycle, particularly in cases in which a control is failing and is consequently modified or replaced.

183
Q

Which of the following should be in place before a black box penetration test begins?

A.A clearly stated definition of scope
B.Previous test results
C.Proper communication and awareness training
D.An incident response plan

A

A is the correct answer.

Justification
A clearly stated definition of scope ensures a proper understanding of risk and success criteria.
Previous test results may help define the scope.
Communication and awareness training are not a necessary requirement.
An incident response plan is not a necessary requirement. In fact, a penetration test could help promote the creation and execution of the incident response plan.

184
Q

Which of the following BEST enables an enterprise to measure its risk management process against peers?

A.Adoption of an enterprise architecture model
B.Adoption of a balanced scorecard
C.Adoption of a risk assessment methodology
D.Adoption of a maturity model

A

D is the correct answer.

Justification
An enterprise architecture is unique to an enterprise.
A balanced scorecard is unique to an enterprise.
Results of risk assessments will be enterprise-specific because no two business environments are the same.
A maturity model consists of various levels of competence that enterprises can use as benchmarks to assess how they compare to peers.

185
Q

Which of the following controls is an example of one that reduces the impact of a risk event?

A.A firewall is implemented at the network perimeter and configured to block all unauthorized inbound traffic.
B.Backup procedures that include storage of multiple iterations are in place for critical application files.
C.A personnel policy dictates that employees must complete compliance awareness training.
D.Processing facility entrances are controlled using card readers and attendants.

A

B is the correct answer.

Justification
A firewall that is implemented at the network perimeter and configured to block all unauthorized inbound traffic reduces the probability of a risk event related to unauthorized network intrusions but does not reduce the impact.
Backup procedures that include storage of multiple iterations in place for critical application files reduce the impact of a risk event by maintaining older versions of files for a period of time after they are modified.
A personnel policy dictating that employees must complete compliance awareness training reduces the probability of a risk event related to compliance violations but does not reduce the impact.
Processing facility entrances controlled using card readers and attendants reduces the probability of a risk event related to unauthorized facility intrusions but does not reduce the impact.

186
Q

Which of the following BEST helps the risk practitioner identify IS control deficiencies?

A.An IT control framework
B.Defined control objectives
C.A countermeasure analysis
D.A threat analysis

A

B is the correct answer.

Justification
An IT control framework is generic, and reviewing it does not help in identifying IS control deficiencies.
Controls are deployed to achieve the desired objectives based on risk assessment and to meet the business requirements.
A countermeasure analysis provides results on countermeasures for a control. The countermeasures are deployed when a threat is perceived and additional controls act as countermeasures. This, however, does not help to identify IS control deficiencies.
A threat analysis identifies the various threats affecting the systems and assets and does not help to identify IS control deficiencies.

187
Q

The BEST way to ensure that an information systems control is appropriate and effective is to verify that the:

A.control is operating as designed.
B.risk associated with the control is mitigated.
C.control has not been bypassed.
D.control logs are reviewed frequently.

A

B is the correct answer.

Justification
A control may be operating correctly but may not mitigate the risk it was designed to address. It is most important that the control reduce the risk it was designed to mitigate.
A control is designed to mitigate or reduce a risk. Even if the control is operating correctly, it is not the appropriate control if it does not address the risk it was designed to mitigate.
Even if the control has not been bypassed, it still may not effectively mitigate the associated risk.
A control must be checked periodically, but this does not ensure that it is the correct control to mitigate the risk.

188
Q

What is the BEST method to validate the effectiveness of an enterprise’s patching program?

A.Conduct penetration testing.
B.Conduct a risk identification initiative.
C.Carry out vulnerability scans.
D.Review the requests for change.

A

C is the correct answer.

Justification
Penetration testing is not the most effective way of validating the effectiveness of an enterprise patching program as it could elevate risk on production systems.
A risk identification initiative will identify new and emerging risk but will not reveal information about the effectiveness of a patching control.
Performing vulnerability scans will enable the IT risk practitioner to determine if patches are being installed on a timely basis.
Requests for change are a valid input. However, requests for change do not mean a patch is applied and do not identify new vulnerabilities.

189
Q

An enterprise implemented a new control to mitigate a recurring risk event. Which of the following would BEST measure the effectiveness of the implemented control?

A.Reduction in financial impact on the annual report
B.Measurable reduction in likelihood, impact or both
C.Readjustment of risk appetite to meet residual risk
D.Increased efficiency over the appropriate processes

A

B is the correct answer.

Justification
Reduction in financial impact on the annual report focuses on financial risk only (other categories could include operational, market, reputational, etc.). Additionally, it does not address likelihood of risk realization for other types of risk.
The reduction of likelihood or impact of occurrence is the best measurement to ensure that controls are effective.
Risk appetite is determined through management and is not measured through the effectiveness of controls. Readjustment of risk appetite is not an appropriate solution because risk appetite will drive the selection of controls, which results in residual risk.
Increased efficiency over processes would not necessarily indicate the effectiveness of a control. Effectiveness of controls could be measured by ensuring that a control achieve its objective, and not by process performance.

190
Q

Which of the following controls is an example of one that reduces the probability of a risk event?

A.A change management process requires that intersystem dependencies be considered prior to approval of system downtime.
B.A call tree procedure for reporting data center incidents is in place.
C.An infrastructure investment plan includes support for two different application hosting platforms to protect against obsolescence.
D.After terminations, employee equipment is placed on legal hold for 60 days before being recycled into production.

A

A is the correct answer.

Justification
This control reduces the probability of a risk event by identifying potential issues ahead of time.
This control reduces the impact of a risk event by using a call tree to decrease time to resolution.
In the event of an obsolescence event, an infrastructure investment plan that includes multiple platforms will reduce the impact of obsolescence.
In order to reduce the impact of a loss event related to litigation, an enterprise can keep a terminated employee’s device on hand to provide evidence in proceedings.

191
Q

Which of the following options BEST ensures that an identified risk is mitigated?

A.Control metrics
B.Control testing
C.Control objective
D.Control ownership

A

B is the correct answer.

Justification
Control metrics will only report on the control’s effectiveness on an ongoing basis. Control metrics do not necessarily trigger immediate remedial actions, although they will be used to determine such actions.
Control testing determines the effectiveness of the controls in achieving their stated objectives, ensuring that the risk is mitigated.
A control objective is only a statement of the desired result or purpose to be achieved by implementing a given control and does not ensure a risk is mitigated.
Control ownership establishes lines of accountability but does not identify whether a risk has been mitigated.

192
Q

Which of the following BEST mitigates control risk?

A.Continuous monitoring
B.An effective security awareness program
C.Effective change management procedures
D.Senior management support for control implementation

A

A is the correct answer.

Justification
Continuous monitoring tests controls that mitigate the risk of the control being less effective over time. A risk assessment will identify when the control is no longer effective and the control will be replaced.
An effective security awareness program does not mitigate control risk.
Effective change management procedures alone do not mitigate control risk.
Senior management support will only assist in implementing a new control but does not directly mitigate control risk.

193
Q

Which of the following is the BEST way to ensure that a corporate network is adequately secured against external attack?

A.Use an intrusion detection system.
B.Establish minimum security baselines.
C.Implement vendor recommended settings.
D.Perform periodic penetration testing.

A

D is the correct answer.

Justification
An intrusion detection system may detect an attempted attack, but it will not confirm whether the perimeter is secure.
Minimum security baselines are beneficial, but they will not provide the level of assurance that is provided by penetration testing.
Applying vendor recommended settings is beneficial, but it will not provide the level of assurance that is provided by penetration testing.
Penetration testing is the best way to ensure that perimeter security is adequate.

194
Q

Which of the following BEST ensures that identified risk remains at an acceptable level?

A.Reviewing controls periodically, according to the risk treatment plan
B.Listing each risk as a separate entry in the risk register
C.Creating a separate risk register for every department
D.Maintaining a key risk indicator for assets in the risk register

A

A is the correct answer.

Justification
Controls deployed according to the risk treatment plan should provide the desired results, because the risk treatment plan is based on management’s acceptance of residual risk and management’s approval of deployment steps in the plan.
Listing each risk as a separate entry in the risk register may help in better evaluating the risk, but the register in itself does not ensure risk management of identified risk at a reasonable level.
Creating a separate risk register for every department may help inform development of better risk assessment exercises, but separation of registers does not necessarily ensure risk management of identified risk at a reasonable level.
Maintaining a key risk indicator for assets in the risk register may improve the overall risk management cycle, but the register in itself does not ensure that the management of identified risk has been performed according to the risk action plan.

195
Q

An IT department has put in place an anti-malware system to reduce risk. Assuming the control is working within specified parameters, which of the following statements BEST describes how this control reduces risk?

A.The control reduces the probability of malware on enterprise computers but does not reduce the impact of attacks.
B.The control reduces the impact of malware on enterprise computers but does not reduce the probability of attacks.
C.The control reduces the probability and impact of malware on enterprise computers.
D.The control reduces neither probability nor impact of malware on enterprise computers.

A

B is the correct answer.

Justification
An anti-malware system does not reduce the probability that a malware file will attack a system; it will simply prevent it from functioning once it is there.
The control eliminates the ability of malware files to execute or propagate outside of protected systems, thus reducing the impact. The system does not mitigate the source of the files.
An anti-malware system does not reduce the probability that a malware file will attack a system; it will simply prevent it from functioning once it is there.
An anti-malware system reduces the impact of an attack.

196
Q

One way to determine control effectiveness is by determining:

A.the test results of intended objectives.
B.whether it is preventive, detective or compensatory.
C.the capability of providing notification of failure.
D.the evaluation and analysis of reliability.

A

A is the correct answer.

Justification
Control effectiveness requires a way to verify that the control process worked as intended. For example, dual-control or dual-entry bookkeeping provide verification and assurance that the process operated as intended.
The type of control is not relevant.
Notification of failure is not determinative of control strength.
Reliability is not an indication of control strength; weak controls can be highly reliable, even if they are ineffective controls.

197
Q

What is the MOST important reason for periodically testing controls?

A.To meet regulatory requirements
B.To meet due care requirements
C.To ensure that control objectives are met
D.To achieve compliance with standard policy

A

C is the correct answer.

Justification
The testing of controls is important for more than just compliance with regulatory requirements. Many controls are not related to a regulatory requirement.
Periodically testing controls does not help meet due care requirements. Due care is what a reasonable person of similar competency would do under similar circumstances. The testing of the controls is a demonstration of due diligence, not due care. Due care puts the control in place; due diligence tests whether the control is working.
Periodically testing controls ensures that controls continue to meet control objectives.
Compliance with policy is not the most important reason for periodically testing controls.

198
Q

Testing compliance of a response and recovery plan should begin by conducting a:

A.tabletop exercise.
B.review of archived logs.
C.penetration test.
D.business impact analysis.

A

A is the correct answer.

Justification
Tabletop exercises simulate incidents to test the response capability of an enterprise. The exercise involves scenarios that require a coordinated response to realistic incidents developing in real time. Participants gather to formulate responses to each development. Tabletop exercises are used extensively by police, fire and emergency medical services to gather key personnel who practice response and recovery in the context of simulated incidents likely within a given jurisdiction.
Logs provide a way to trace the activities performed during the vulnerability assessment.
Penetration tests highlight specific weaknesses; although these tests generally are very controlled, they do not provide the depth and breadth of a tabletop exercise.
A business impact analysis provides input to the response and recovery plan at a given point in time and reflects the viewpoint of business owners. It should be used as the basis for building test scripts to validate compliance, but in and of itself, it is not a testing tool.

199
Q

The MOST important objective of regularly testing information system controls is to:

A.identify design flaws, failures and redundancies.
B.provide the necessary evidence to support management assertions.
C.assess the control risk and formulate an opinion on the level of reliability.
D.evaluate the need for a risk assessment and indicate the corrective actions to be taken, where applicable.

A

A is the correct answer.

Justification
Identification of design flaws, failures and redundancies is necessary to ensure that the control is designed correctly and is operating effectively and efficiently during the production phase.
This activity is performed after the completion of an assessment or audit of the information system control.
This activity is primarily performed during the design phase of the information system control.
Risk assessments do not depend on testing of controls.

200
Q

A financial institution is undergoing testing of its electronic funds transfer (EFT) system after major enhancements. The risk practitioner would MOST benefit from a test that:

A.identifies the introduction of potential new gaps in security.
B.verifies adequate system recovery in case of failure.
C.ensures the system performs to expectation.
D.ensures the system can support the volume of transactions.

A

A is the correct answer.

Justification
The security of an electronic funds transfer (EFT) system would be of the most interest to a risk practitioner. Testing should identify the introduction of potential new gaps in information security.
Recovery testing will determine readiness for continuity of the EFT system, which is not as high a priority as information security to the risk practitioner.
System performance is not as high a priority as information security to the risk practitioner.
Stress testing checks if the system can handle peak volume of transactions, which is not as high a priority as information security to the risk practitioner.