Exam Bank Flashcards

1
Q
Which of the following business requirements BEST relates to the need for resilient business and information systems processes?
A. Effectiveness
B. Confidentiality
C. Integrity
D. Availability
A

D. Availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which of the following best describes the value of a risk register?
A. It captures the risk inventory
B. It drives the risk response plan
C. It is a risk reporting tool
D. It lists internal risk and external risk

A

B. It drives the risk response plan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Shortly after performing the annual review and revision of corporate policies, a risk practitioner becomes aware that a new law may affect security requirements for the HR system. The risk practitioner should:
A. analyse in detail how the law may affect the enterprise
B. ensure that necessary adjustments are implemented during the next review cycle
C. initiate an adhoc revision of the corporate policy
D. notify the system custodian to implement changes

A

A. Analyse in detail how the law may affect the enterprise

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q
An information system that processes weather forecasts for public consumption is MOST likely to place its highest priority on:
A. non-repudiation
B. confidentiality
C. integrity
D. availability
A

C. integrity

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which of the following choices provides the BEST view of risk management?
A. An interdisciplinary team
B. A third party risk assessment service provider
C. The enterprises IT department
D. The enterprises internal compliance department

A

A. An interdisciplinary team

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of the following choices is a PRIMARY consideration when developing an IT risk awareness program?
A. Why technology risk is owned by IT
B. How technology risk can impact each attendees area of business
C. How business process owners can transfer technology risk
D. Why technology risk is more difficult to manage compared to other risk

A

B. How technology risk can impact each attendees area of business

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

It is MOST important that risk appetite is aligned with business objectives to ensure that:
A. resources are directed towards areas of low risk tolerance
B. major risk is identified and eliminated
C. IT and business goals are aligned
D. the risk strategy is adequately communicated

A

A. resources are directed towards areas of low risk tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
Weak passwords and transmission over unprotected communication lines are examples of:
A. vulnerabilities
B. threats
C. probabilities
D. impacts
A

A. vulnerablities

How well did you know this?
1
Not at all
2
3
4
5
Perfectly