لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which of the following roles is BEST suited to help a risk practitioner understand the impact of IT-related events on business objectives?
A. IT management
B. Internal audit
C. Process owners
D. Senior management
عرض الإجابة
اجابة صحيحة: B
السؤال #2
Which of the following BEST indicates the efficiency of a process for granting access privileges?
A. Average time to grant access privileges
B. Number of changes in access granted to users
C. Average number of access privilege exceptions
D. Number and type of locked obsolete accounts
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Which of the following is the PRIMARY factor in determining a recovery time objective (RTO)?
A. Cost of offsite backup premises
B. Cost of downtime due to a disaster
C. Cost of testing the business continuity plan
D. Response time of the emergency action plan
عرض الإجابة
اجابة صحيحة: B
السؤال #4
A risk practitioner is organizing risk awareness training for senior management. Which of the following is the MOST important topic to cover in the training session?
A. The organization's strategic risk management projects
B. Senior management roles and responsibilities
C. The organizations risk appetite and tolerance
D. Senior management allocation of risk management resources
عرض الإجابة
اجابة صحيحة: D
السؤال #5
Which of the following is the MOST important input when developing risk scenarios?
A. Key performance indicators
B. Business objectives
C. The organization's risk framework
D. Risk appetite
عرض الإجابة
اجابة صحيحة: D
السؤال #6
A control owner responsible for the access management process has developed a machine learning model to automatically identify excessive access privileges. What is the risk practitioner's BEST course of action?
A. Review the design of the machine learning model against control objectives
B. Adopt the machine learning model as a replacement for current manual access reviews
C. Ensure the model assists in meeting regulatory requirements for access controls
D. Discourage the use of emerging technologies in key processes
عرض الإجابة
اجابة صحيحة: A
السؤال #7
Which of the following should be included in a risk assessment report to BEST facilitate senior management's understanding of the results?
A. Benchmarking parameters likely to affect the results
B. Tools and techniques used by risk owners to perform the assessments
C. A risk heat map with a summary of risk identified and assessed
D. The possible impact of internal and external risk factors on the assessment results
عرض الإجابة
اجابة صحيحة: D
السؤال #8
An organization has identified a risk exposure due to weak technical controls in a newly implemented HR system. The risk practitioner is documenting the risk in the risk register. The risk should be owned by the:
A. chief risk officer
B. project manager
C. chief information officer
D. business process owner
عرض الإجابة
اجابة صحيحة: B
السؤال #9
Which of the following is MOST important when developing key performance indicators (KPIs)?
A. Alignment to risk responses
B. Alignment to management reports
C. Alerts when risk thresholds are reached
D. Identification of trends
عرض الإجابة
اجابة صحيحة: B
السؤال #10
Which of the following would be MOST relevant to stakeholders regarding ineffective control implementation?
A. Threat to IT
B. Number of control failures
C. Impact on business
D. Risk ownership
عرض الإجابة
اجابة صحيحة: D
السؤال #11
Which of the following will BEST help an organization select a recovery strategy for critical systems?
A. Review the business impact analysis
B. Create a business continuity plan
C. Analyze previous disaster recovery reports
D. Conduct a root cause analysis
عرض الإجابة
اجابة صحيحة: A
السؤال #12
The BEST way to determine the likelihood of a system availability risk scenario is by assessing the:
A. availability of fault tolerant software
B. strategic plan for business growth
C. vulnerability scan results of critical systems
D. redundancy of technical infrastructure
عرض الإجابة
اجابة صحيحة: A
السؤال #13
Which of the following would BEST enable mitigation of newly identified risk factors related to internet of Things (loT)?
A. Introducing control procedures early in the life cycle
B. Implementing loT device software monitoring
C. Performing periodic risk assessments of loT
D. Performing secure code reviews
عرض الإجابة
اجابة صحيحة: C
السؤال #14
Which of the following is the MOST effective key performance indicator (KPI) for change management?
A. Percentage of changes with a fallback plan
B. Number of changes implemented
C. Percentage of successful changes
D. Average time required to implement a change
عرض الإجابة
اجابة صحيحة: C
السؤال #15
Who should be responsible for strategic decisions on risk management?
A. Chief information officer (CIO)
B. Executive management team
C. Audit committee
D. Business process owner
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: