Exam Bank Flashcards
Which of the following business requirements BEST relates to the need for resilient business and information systems processes? A. Effectiveness B. Confidentiality C. Integrity D. Availability
D. Availability
Which of the following best describes the value of a risk register?
A. It captures the risk inventory
B. It drives the risk response plan
C. It is a risk reporting tool
D. It lists internal risk and external risk
B. It drives the risk response plan
Shortly after performing the annual review and revision of corporate policies, a risk practitioner becomes aware that a new law may affect security requirements for the HR system. The risk practitioner should:
A. analyse in detail how the law may affect the enterprise
B. ensure that necessary adjustments are implemented during the next review cycle
C. initiate an adhoc revision of the corporate policy
D. notify the system custodian to implement changes
A. Analyse in detail how the law may affect the enterprise
An information system that processes weather forecasts for public consumption is MOST likely to place its highest priority on: A. non-repudiation B. confidentiality C. integrity D. availability
C. integrity
Which of the following choices provides the BEST view of risk management?
A. An interdisciplinary team
B. A third party risk assessment service provider
C. The enterprises IT department
D. The enterprises internal compliance department
A. An interdisciplinary team
Which of the following choices is a PRIMARY consideration when developing an IT risk awareness program?
A. Why technology risk is owned by IT
B. How technology risk can impact each attendees area of business
C. How business process owners can transfer technology risk
D. Why technology risk is more difficult to manage compared to other risk
B. How technology risk can impact each attendees area of business
It is MOST important that risk appetite is aligned with business objectives to ensure that:
A. resources are directed towards areas of low risk tolerance
B. major risk is identified and eliminated
C. IT and business goals are aligned
D. the risk strategy is adequately communicated
A. resources are directed towards areas of low risk tolerance
Weak passwords and transmission over unprotected communication lines are examples of: A. vulnerabilities B. threats C. probabilities D. impacts
A. vulnerablities