Topic 2 : Pool B Jul-Aug-Sep
Who is MOST likely to be responsible for the coordination between the IT risk strategy and the business risk
strategy?
A.
Chief financial officer
B.
Information security director
C.
Internal audit director
D.
Chief information officer
Chief information officer
Which of the following is the BEST course of action to reduce risk impact?
A.
Create an IT security policy.
B.
Implement corrective measures.
C.
Implement detective controls.
D.
Leverage existing technology
Implement corrective measures.
Which of the following is MOST important when developing key risk indicators (KRIs)?
A.
Alignment with regulatory requirements
B.
Availability of qualitative data
C.
Properly set thresholds
D.
Alignment with industry benchmarks
Properly set thresholds
Which of the following is performed after a risk assessment is completed?
A.
Defining risk taxonomy
B.
Identifying vulnerabilities
C.
Conducting an impact analysis
D.
Defining risk response options
Conducting an impact analysis
During a routine check, a system administrator identifies unusual activity indicating an intruder within a firewall. Which of the following controls has MOST likely been compromised?
A.
Data validation
B.
Identification
C.
Authentication
D.
Data integrity
Authentication
Page 26 out of 193 Pages |
Previous |