CISM Practice B Topic 2 Flashcards
(136 cards)
A risk mitigation report would include recommendations for:
assessment.
acceptance.
evaluation.
quantification.
acceptance
A risk management program should reduce risk to:
zero.
an acceptable level.
an acceptable percent of revenue.
an acceptable probability of occurrence.
an acceptable level.
\The MOST important reason for conducting periodic risk assessments is because:
- risk assessments are not always precise.
- security risks are subject to frequent change.
- reviewers can optimize and reduce the cost of controls.
- it demonstrates to senior management that the security function can add value.
security risks are subject to frequent change.
Which of the following BEST indicates a successful risk management practice?
Overall risk is quantified
Inherent risk is eliminated
Residual risk is minimized
Control risk is tied to business units
Residual risk is minimized
Which of the following would generally have the GREATEST negative impact on an organization?
Theft of computer software
Interruption of utility services
Loss of customer confidence
Internal fraud resulting in monetary loss
Loss of customer confidence
A successful information security management program should use which of the following to determine the amount of resources devoted to mitigating exposures?
Risk analysis results
Audit report findings
Penetration test results
Amount of IT budget available
Risk analysis results
Which of the following will BEST protect an organization from internal security attacks?
Static IP addressing
Internal address translation
Prospective employee background checks
Employee awareness certification program
Prospective employee background checks
For risk management purposes, the value of an asset should be based on:
original cost.
net cash flow.
net present value.
replacement cost.
replacement cost.
In a business impact analysis, the value of an information system should be based on the overall cost:
of recovery.
to recreate.
if unavailable.
of emergency operations.
if unavailable.
Acceptable risk is achieved when:
residual risk is minimized.
transferred risk is minimized.
control risk is minimized.
inherent risk is minimized.
residual risk is minimized.
The value of information assets is BEST determined by:
individual business managers.
business systems analysts.
information security management.
industry averages benchmarking.
individual business managers.
During which phase of development is it MOST appropriate to begin assessing the risk of a new application system?
Feasibility
Design
Development
Testing
Feasibility
The MOST effective way to incorporate risk management practices into existing production systems is through:
policy development.
change management.
awareness training.
regular monitoring.
change management.
Which of the following would be MOST useful in developing a series of recovery time objectives (RTOs)?
Gap analysis
Regression analysis
Risk analysis
Business impact analysis
Business impact analysis
The recovery time objective (RTO) is reached at which of the following milestones?
Disaster declaration
Recovery of the backups
Restoration of the system
Return to business as usual processing
Restoration of the system
Which of the following results from the risk assessment process would BEST assist risk management decision making?
Control risk
Inherent risk
Risk exposure
Residual risk
Residual risk
The decision on whether new risks should fall under periodic or event-driven reporting should be based on which of the following?
Mitigating controls
Visibility of impact
Likelihood of occurrence
Incident frequency
Visibility of impact
Risk acceptance is a component of which of the following?
Assessment
Mitigation
Evaluation
Monitoring
Mitigation
Risk management programs are designed to reduce risk to:
a level that is too small to be measurable.
the point at which the benefit exceeds the expense.
a level that the organization is willing to accept.
a rate of return that equals the current cost of capital.
a level that the organization is willing to accept.
A risk assessment should be conducted:
once a year for each business process and subprocess.
every three to six months for critical business processes.
by external parties to maintain objectivity.
annually or whenever there is a significant change.
annually or whenever there is a significant change.
The MOST important function of a risk management program is to:
quantify overall risk.
minimize residual risk.
eliminate inherent risk.
maximize the sum of all annualized loss expectancies (ALEs).
minimize residual risk.
Which of the following risks would BEST be assessed using qualitative risk assessment techniques?
Theft of purchased software
Power outage lasting 24 hours
Permanent decline in customer confidence
Temporary loss of e-mail due to a virus attack
Permanent decline in customer confidence
Which of the following will BEST prevent external security attacks?
Static IP addressing
Network address translation
Background checks for temporary employees
Securing and analyzing system access logs
Network address translation
In performing a risk assessment on the impact of losing a server, the value of the server should be calculated using the:
original cost to acquire.
cost of the software stored.
annualized loss expectancy (ALE).
cost to obtain a replacement.
cost to obtain a replacement.