Q: 11
Which of the following would be the BEST recommendation if the level of risk in the IT risk profile
has decreased and is now below management's risk appetite?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 12
Which of the following is MOST important for maintaining the effectiveness of an IT risk register?
Options
Discussion
Option D You need those regular reviews and updates, otherwise the register gets stale fast.
I'd say B, since tracking response plans feels key to managing the register. Pretty sure that's what keeps actions moving.
Be respectful. No spam.
Q: 13
Which of the following should be the PRIMARY consideration when implementing controls for
monitoring user activity logs?
Options
Discussion
Always best to focus on proportionality for controls, so C here.
Be respectful. No spam.
Q: 14
Recent penetration testing of an organization's software has identified many different types of
security risks. Which of the following is the MOST likely root cause for the identified risk?
Options
Discussion
No comments yet. Be the first to comment.
Be respectful. No spam.
Q: 15
Which of the following is the MOST important objective of regularly presenting the project risk
register to the project steering committee?
Options
Discussion
D. that's what regular risk register reviews are for. Steering committee needs to track how mitigation actions are progressing. Agree?
Be respectful. No spam.
Q: 16
Which of the following will BEST help an organization evaluate the control environment of several
third-party vendors?
Options
Discussion
B tbh, because independent control reports like SOC 2 or ISAE 3402 give you an unbiased look at how strong a vendor's controls really are. Internal docs or references aren't as reliable for assessing actual control environment. Open to hearing other views if you disagree.
B
Honestly not super clear on this but independent reports sound most objective for control checks. Can someone confirm if B is the typical best practice or am I missing something?
Be respectful. No spam.
Q: 17
An organization's IT team has proposed the adoption of cloud computing as a cost-saving measure
for the business. Which of the following should be of GREATEST concern to the risk practitioner?
Options
Discussion
A or D but leaning A here. Without proper due diligence on the cloud vendor, you can't be sure about their security or compliance posture, which could expose the org to way bigger risks than unclear architecture roles. Similar question showed up in some practice sets.
Be respectful. No spam.
Q: 18
The question focuses on the primary reason for communicating risk assessment results to data
owners.
Analyzing the Options:
Options
Discussion
Option C is the right pick. Communicating risk assessment results helps data owners know where to focus and prioritize their response actions. Pretty sure that's what ISACA's looking for here.
Be respectful. No spam.
Q: 19
Winch of the following can be concluded by analyzing the latest vulnerability report for the it
infrastructure?
Options
Discussion
D imo. Vulnerability reports really just highlight where your controls aren't working right? Not seeing how you'd get the others from just that report. Let me know if I'm missing something.
Be respectful. No spam.
Q: 20
During an IT risk scenario review session, business executives question why they have been assigned
ownership of IT-related risk scenarios. They feel IT risk is technical in nature and therefore should be
owned by IT. Which of the following is the BEST way for the risk practitioner to address these
concerns?
Options
Discussion
A imo. Execs usually relate better when IT risk is tied directly to business impact.
Be respectful. No spam.
Question 11 of 20 · Page 2 / 2