لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Which of the following roles would be MOST helpful in providing a high-level view of risk related to customer data loss?
A. Customer database manager
B. Customer data custodian
C. Data privacy officer
D. Audit committee
عرض الإجابة
اجابة صحيحة: A
السؤال #2
Which of the following is the MOST important consideration for a risk practitioner when making a system implementation go-live recommendation?
A. Completeness of system documentation
B. Results of end user acceptance testing
C. Variances between planned and actual cost
D. availability of in-house resources
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Which of the following will BEST help an organization evaluate the control environment of several third-party vendors?
A. Review vendors' internal risk assessments covering key risk and controls
B. Obtain independent control reports from high-risk vendors
C. Review vendors performance metrics on quality and delivery of processes
D. Obtain vendor references from third parties
عرض الإجابة
اجابة صحيحة: A
السؤال #4
A third-party vendor has offered to perform user access provisioning and termination. Which of the following control accountabilities is BEST retained within the organization?
A. Reviewing access control lists
B. Authorizing user access requests
C. Performing user access recertification
D. Terminating inactive user access
عرض الإجابة
اجابة صحيحة: A
السؤال #5
Calculation of the recovery time objective (RTO) is necessary to determine the:
A. time required to restore files
B. point of synchronization
C. priority of restoration
D. annual loss expectancy (ALE)
عرض الإجابة
اجابة صحيحة: A
السؤال #6
After undertaking a risk assessment of a production system, the MOST appropriate action is for the risk manager to:
A. recommend a program that minimizes the concerns of that production system
B. inform the development team of the concerns, and together formulate risk reduction measures
C. inform the process owner of the concerns and propose measures to reduce them
D. inform the IT manager of the concerns and propose measures to reduce them
عرض الإجابة
اجابة صحيحة: A
السؤال #7
Which of the following provides the MOST important information to facilitate a risk response decision?
A. Audit findings
B. Risk appetite
C. Key risk indicators
D. Industry best practices
عرض الإجابة
اجابة صحيحة: C
السؤال #8
Which of the following is the MOST common concern associated with outsourcing to a service provider?
A. Lack of technical expertise
B. Combining incompatible duties
C. Unauthorized data usage
D. Denial of service attacks
عرض الإجابة
اجابة صحيحة: B
السؤال #9
An organization with a large number of applications wants to establish a security risk assessment program. Which of the following would provide the MOST useful information when determining the frequency of risk assessments?
A. Feedback from end users
B. Results of a benchmark analysis
C. Recommendations from internal audit
D. Prioritization from business owners
عرض الإجابة
اجابة صحيحة: D
السؤال #10
In an organization dependent on data analytics to drive decision-making, which of the following would BEST help to minimize the risk associated with inaccurate data?
A. Establishing an intellectual property agreement
B. Evaluating each of the data sources for vulnerabilities
C. Periodically reviewing big data strategies
D. Benchmarking to industry best practice
عرض الإجابة
اجابة صحيحة: C
السؤال #11
Which of the following will BEST mitigate the risk associated with IT and business misalignment?
A. Establishing business key performance indicators (KPIs)
B. Introducing an established framework for IT architecture
C. Establishing key risk indicators (KRIs)
D. Involving the business process owner in IT strategy
عرض الإجابة
اجابة صحيحة: D
السؤال #12
Which of the following would BEST help minimize the risk associated with social engineering threats?
A. Enforcing employees sanctions
B. Conducting phishing exercises
C. Enforcing segregation of dunes
D. Reviewing the organization's risk appetite
عرض الإجابة
اجابة صحيحة: D
السؤال #13
Which of the following is the MOST important consideration when developing an organization's risk taxonomy?
A. Leading industry frameworks
B. Business context
C. Regulatory requirements
D. IT strategy
عرض الإجابة
اجابة صحيحة: A
السؤال #14
Management has noticed storage costs have increased exponentially over the last 10 years because most users do not delete their emails. Which of the following can BEST alleviate this issue while not sacrificing security?
A. Implementing record retention tools and techniques
B. Establishing e-discovery and data loss prevention (DLP)
C. Sending notifications when near storage quota
D. Implementing a bring your own device 1BVOD) policy
عرض الإجابة
اجابة صحيحة: B
السؤال #15
Which of the following is MOST critical when designing controls?
A. Involvement of internal audit
B. Involvement of process owner
C. Quantitative impact of the risk
D. Identification of key risk indicators
عرض الإجابة
اجابة صحيحة: D
السؤال #16
Which of the following would BEST help to ensure that identified risk is efficiently managed?
A. Reviewing the maturity of the control environment
B. Regularly monitoring the project plan
C. Maintaining a key risk indicator for each asset in the risk register
D. Periodically reviewing controls per the risk treatment plan
عرض الإجابة
اجابة صحيحة: C
السؤال #17
Sensitive data has been lost after an employee inadvertently removed a file from the premises, in violation of organizational policy. Which of the following controls MOST likely failed?
A. Background checks
B. Awareness training
C. User access
D. Policy management
عرض الإجابة
اجابة صحيحة: B
السؤال #18
Which of the following is MOST important when discussing risk within an organization?
A. Adopting a common risk taxonomy
B. Using key performance indicators (KPIs)
C. Creating a risk communication policy
D. Using key risk indicators (KRIs)
عرض الإجابة
اجابة صحيحة: B

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: