CISM Practice C Topic 2 Flashcards
A risk mitigation report would include recommendations for:
acceptance
A risk management program should reduce risk to:
an acceptable level.
The MOST important reason for conducting periodic risk assessments is because:
security risks are subject to frequent change.
Which of the following BEST indicates a successful risk management practice?
Residual risk is minimized
Which of the following would generally have the GREATEST negative impact on an organization?
Loss of customer confidence
A successful information security management program should use which of the following to determine the amount of resources devoted to mitigating exposures?
Risk analysis results
Which of the following will BEST protect an organization from internal security attacks?
Prospective employee background checks
For risk management purposes, the value of an asset should be based on:
replacement cost.
In a business impact analysis, the value of an information system should be based on the overall cost:
if unavailable.
Acceptable risk is achieved when:
residual risk is minimized.
The value of information assets is BEST determined by:
individual business managers.
During which phase of development is it MOST appropriate to begin assessing the risk of a new application system?
Feasibility
The MOST effective way to incorporate risk management practices into existing production systems is through:
change management.
Which of the following would be MOST useful in developing a series of recovery time objectives (RTOs)?
Business impact analysis
The recovery time objective (RTO) is reached at which of the following milestones?
Restoration of the system
Which of the following results from the risk assessment process would BEST assist risk management decision making?
Residual risk
The decision on whether new risks should fall under periodic or event-driven reporting should be based on which of the following?
Visibility of impact
Risk acceptance is a component of which of the following?
Mitigation
Risk management programs are designed to reduce risk to:
a level that the organization is willing to accept.
A risk assessment should be conducted:
annually or whenever there is a significant change.
The MOST important function of a risk management program is to:
minimize residual risk.
Which of the following risks would BEST be assessed using qualitative risk assessment techniques?
Permanent decline in customer confidence
Which of the following will BEST prevent external security attacks?
Network address translation
In performing a risk assessment on the impact of losing a server, the value of the server should be calculated using the:
cost to obtain a replacement.
A business impact analysis (BIA) is the BEST tool for calculating:
priority of restoration.
When residual risk is minimized:
acceptable risk is probable.
Quantitative risk analysis is MOST appropriate when assessment data:
contain percentage estimates.
Which of the following is the MOST appropriate use of gap analysis?
Measuring current state vs. desired future state
Identification and prioritization of business risk enables project managers to:
address areas with most significance.
A risk analysis should:
address the potential size and likelihood of loss.
The recovery point objective (RPO) requires which of the following?
Before-image restoration
Based on the information provided, which of the following situations presents the GREATEST information security risk for an organization with multiple, but small, domestic processing locations?nt is not performed
Change management procedures are poor
Which of the following BEST describes the scope of risk analysis?
Organizational activities
The decision as to whether a risk has been reduced to an acceptable level should be determined by:
organizational requirements.
Which of the following is the PRIMARY reason for implementing a risk management program?
Is a necessary part of management’s due diligence
Which of the following groups would be in the BEST position to perform a risk analysis for a business?
Process owners
A successful risk management program should lead to:
optimization of risk reduction efforts against cost.
Which of the following risks would BEST be assessed using quantitative risk assessment techniques?
An electrical power outage
The impact of losing frame relay network connectivity for 18-24 hours should be calculated using the:
financial losses incurred by affected business units.
Which of the following is the MOST usable deliverable of an information security risk analysis?
List of action items to mitigate risk
Ongoing tracking of remediation efforts to mitigate identified risks can BEST be accomplished through the use of which of the following?
Heat charts
Who would be in the BEST position to determine the recovery point objective (RPO) for business applications?
Chief operations officer (COO)
Which two components PRIMARILY must be assessed in an effective risk analysis?
Likelihood and impact
Information security managers should use risk assessment techniques to:
justify selection of risk mitigation strategies.
In assessing risk, it is MOST essential to:
consider both monetary value and likelihood of loss.
When the computer incident response team (CIRT) finds clear evidence that a hacker has penetrated the corporate network and modified customer information, an information security manager should FIRST notify:
data owners who may be impacted.
Data owners are PRIMARILY responsible for establishing risk mitigation methods to address which of the following areas?
Entitlement changes
The PRIMARY goal of a corporate risk management program is to ensure that an organization’s:
stated objectives are achievable.
It is important to classify and determine relative sensitivity of assets to ensure that:
countermeasures are proportional to risk.
The service level agreement (SLA) for an outsourced IT function does not reflect an adequate level of protection. In this situation an information security manager should:
determine the current level of security.
An information security manager has been assigned to implement more restrictive preventive controls. By doing so, the net effect will be to PRIMARILY reduce the:
vulnerability.
When performing a quantitative risk analysis, which of the following is MOST important to estimate the potential loss?
Calculate the value of the information or asset
Before conducting a formal risk assessment of an organization’s information resources, an information security manager should FIRST:
map the major threats to business objectives.
The valuation of IT assets should be performed by:
the information owner