لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Topic 4Within the three lines of defense model, the accountability for the system of internal controls resides with:
A. enterprise risk management
B. the risk practitioner
C. the chief information officer (CIO)
D. the board of directors
عرض الإجابة
اجابة صحيحة: A
السؤال #2
Topic 4Which of the following risk-related information is MOST valuable to senior management when formulating an IT strategicplan?
A. Risk mitigation plans
B. IT risk appetite statement
C. Emerging IT risk scenarios
D. Key risk indicators (KRIs)
عرض الإجابة
اجابة صحيحة: D
السؤال #3
From a risk management perspective, which of the following is the PRIMARY benefit of using automated system configuration validation tools?
A. Residual risk is reduced
B. Staff costs are reduced
C. Operational costs are reduced
D. Inherent risk is reduced
عرض الإجابة
اجابة صحيحة: C
السؤال #4
Topic 4Which of the following is MOST important to review when determining whether a potential IT service providers controlenvironment is effective?
A. Control self-assessment (CSA)
B. Service level agreements (SLAs)
C. Key performance indicators (KPIs)
D. Independent audit report
عرض الإجابة
اجابة صحيحة: D
السؤال #5
Topic 4An organization striving to be on the leading edge in regard to risk monitoring would MOST likely implement:
A. a tool for monitoring critical activities and controls
B. procedures to monitor the operation of controls
C. real-time monitoring of risk events and control exceptions
D. monitoring activities for all critical assets
عرض الإجابة
اجابة صحيحة: C
السؤال #6
Topic 4Which of the following is the PRIMARY responsibility of the first line of defense related to computer-enabled fraud?
A. Ensuring that risk and control assessments consider fraud
B. Implementing processes to detect and deter fraud
C. Providing oversight of risk management processes
D. Monitoring the results of actions taken to mitigate fraud
عرض الإجابة
اجابة صحيحة: B
السؤال #7
Topic 4Which of the following is MOST helpful to understand the consequences of an IT risk event?
A. Fault tree analysis
B. Root cause analysis
C. Business impact analysis (BIA)
D. Historical trend analysis
عرض الإجابة
اجابة صحيحة: C
السؤال #8
Topic 4What information related to a system vulnerability would be MOST useful to management in making an effective risk-baseddecision?
A. Consequences if the vulnerability is exploited
B. Availability of patches to mitigate the vulnerability
C. Vulnerability scanning tools currently in place
D. Risk mitigation plans for the vulnerability
عرض الإجابة
اجابة صحيحة: A
السؤال #9
Topic 4The PRIMARY reason for prioritizing risk scenarios is to:
A. facilitate risk response decisions
B. support risk response tracking
C. assign risk ownership
D. provide an enterprise-wide view of risk
عرض الإجابة
اجابة صحيحة: A
السؤال #10
Topic 4A third-party vendor has offered to perform user access provisioning and termination. Which of the following controlaccountabilities is BEST retained within the organization?
A. Reviewing access control lists
B. Performing user access recertification
C. Authorizing user access requests
D. Terminating inactive user access
عرض الإجابة
اجابة صحيحة: C

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: