Topic 4
The PRIMARY reason for prioritizing risk scenarios is to:
A
Topic 4
A third-party vendor has offered to perform user access provisioning and termination. Which of the following control
accountabilities is BEST retained within the organization?
C
Topic 4
In order to determine if a risk is under-controlled, the risk practitioner will need to:
D
Topic 4
Which of the following is the BEST way to quantify the likelihood of risk materialization?
C
Topic 4
Which of the following is the PRIMARY responsibility of the first line of defense related to computer-enabled fraud?
B
Topic 4
Which of the following is MOST important for an organization to update following a change in legislation requiring notification
to individuals impacted by data breaches?
B
Topic 4
An organization striving to be on the leading edge in regard to risk monitoring would MOST likely implement:
C
Topic 4
Which of the following is MOST helpful to understand the consequences of an IT risk event?
C
Topic 4
What information related to a system vulnerability would be MOST useful to management in making an effective risk-based
decision?
A
Topic 4
Which of the following risk-related information is MOST valuable to senior management when formulating an IT strategic
plan?
D
Topic 4
Before assigning sensitivity levels to information, it is MOST important to:
A
Topic 4
Within the three lines of defense model, the accountability for the system of internal controls resides with:
A
Topic 4
The PRIMARY purpose of using a framework for risk analysis is to:
A
Topic 4
Which of the following will BEST help to ensure the continued effectiveness of the IT risk management function within an
organization experiencing high employee turnover?
B
Topic 4
Which of the following is MOST important to review when determining whether a potential IT service providers control
environment is effective?
D