During the risk assessment of an organization that processes credit cards, a number of existing controls have been found to be ineffective and do not meet industry standards. The overall control environment may still be effective if:
compensating controls are in place.
a control mitigation plan is in place.
risk management is effective.
residual risk is accepted.
Compensating controls are additional or alternative controls that are implemented when the existing controls are found to be ineffective or do not meet the required standards. Compensating controls are designed to reduce the risk exposure to an acceptable level and ensure that the organization can still comply with the relevant regulations and industry best practices. For an organization that processes credit cards, compensating controls may include enhanced encryption, monitoring, auditing, or authentication mechanisms. By having compensating controls in place, the organization can maintain an effective overall control environment despite the deficiencies in the existing controls. The other options are not correct because they do not ensure that the overall control environment is effective. A control mitigation plan is a document that outlines the actions and resources needed to address the control deficiencies, but it does not guarantee that the compensating controls will be implemented or effective. Risk management is a process that involves identifying, analyzing, evaluating, and treating risks, but it does not directly affect the control environment. Residual risk is the risk that remains after the risk treatment, and it may or may not be acceptable depending on the risk appetite of the organization. References = CRISC Review Manual, pages 153-1541; CRISC Review Questions, Answers & Explanations Manual, page 632
Which of the following is the MOST important key performance indicator (KPI) to establish in the service level agreement (SLA) for an outsourced data center?
Percentage of systems included in recovery processes
Number of key systems hosted
Average response time to resolve system incidents
Percentage of system availability
The percentage of system availability is the most important key performance indicator (KPI) to establish in the service level agreement (SLA) for an outsourced data center. This KPI measures the uptime or reliability of the systems hosted by the data center provider, and reflects the ability of the provider to meet the customer’s expectations and requirements for system performance and accessibility. A high percentage of system availability indicates that the provider is delivering consistent and quality service, while a low percentage of system availability indicates that the provider is experiencing frequent or prolonged system failures or disruptions, which can negatively affect the customer’s business operations and reputation. Therefore, the percentage of system availability is a critical factor for evaluating the effectiveness and efficiency of the data center provider, and should be clearly defined and monitored in the SLA. The other options are not the most important KPIs to establish in the SLA for an outsourced data center, as they do not directly measure the quality or reliability of the service provided. The percentage of systems included in recovery processes is a measure of the scope or coverage of the disaster recovery plan (DRP) of the data center provider, but it does not indicate how well the provider can execute the DRP or restore the systems in the event of a disaster. The number of key systems hosted is a measure of the capacity or utilization of the data center provider, but it does not indicate how efficiently or securely the provider can manage the systems. The average response time to resolve system incidents is a measure of the responsiveness or agility of the data center provider, but it does not indicate how effectively or proactively the provider can prevent or mitigate system incidents. References = Risk and Information Systems Control Study Manual, 7th Edition, Chapter 3, Section 3.2.3.4, Page 140.
A risk assessment has identified that departments have installed their own WiFi access points on the enterprise network. Which of the following would be MOST important to include in a report to senior management?
The network security policy
Potential business impact
The WiFi access point configuration
Planned remediation actions
A risk assessment is a process of identifying, analyzing, and evaluating the risks that may affect the enterprise’s objectives and operations. It involves determining the likelihood and impact of various risk scenarios, and prioritizing them based on their significance and urgency.
A WiFi access point is a device that allows wireless devices to connect to a wired network using radio signals. It can provide convenience and flexibility for users, but it can also introduce security risks, such as unauthorized access, data leakage, malware infection, or denial of service attacks.
If departments have installed their own WiFi access points on the enterprise network, without proper authorization, configuration, or monitoring, it means that they have bypassed the network security policy and controls, and created potential vulnerabilities and exposures for the enterprise.
The most important information to include in a report to senior management is the potential business impact of this risk, which is the estimated loss or damage that the enterprise may suffer if the risk materializes. The potential business impact can be expressed in terms of financial, operational, reputational, or legal consequences, and it can help senior management to understand the severity and urgency of the risk, and to decide on the appropriate risk response and allocation of resources.
The other options are not the most important information to include in a report to senior management, because they do not convey the magnitude and significance of the risk, and they may not be relevant or actionable for senior management.
The network security policy is the set of rules and guidelines that define the security objectives, requirements, and responsibilities for the enterprise network. It is important to have a clear and comprehensive network security policy, and to ensure that it is communicated, enforced, and monitored across the enterprise, but it is not the most important information to include in a report to senior management, because it does not indicate the actual or potential impact of the risk, and it may not reflect the current or desired state of the network security.
The WiFi access point configuration is the set of parameters and settings that define the functionality, performance, and security of the WiFi access point. It is important to have a secure and consistent WiFi access point configuration, and to follow the best practices and standards for wireless network security, but it is not the most important information to include in a report to senior management, because it does not indicate the actual or potential impact of the risk, and it may not be relevant or understandable for senior management.
The planned remediation actions are the steps and measures that are intended to mitigate, transfer, avoid, or accept the risk, and to restore the normal operation and security of the enterprise network. It is important to have a feasible and effective plan for remediation actions, and to implement and monitor them in a timely and efficient manner, but it is not the most important information to include in a report to senior management, because it does not indicate the actual or potential impact of the risk, and it may not be feasible or appropriate without senior management’s approval or support. References =
ISACA, CRISC Review Manual, 7th Edition, 2022, pp. 19-20, 23-24, 27-28, 31-32, 40-41, 47-48
ISACA, CRISC Review Questions, Answers & Explanations Database, 2022, QID 146
Risk mitigation procedures should include:
buying an insurance policy.
acceptance of exposures
deployment of counter measures.
enterprise architecture implementation.
Risk mitigation procedures are the actions and plans that an organization implements to reduce the likelihood and impact of identified risks. Risk mitigation procedures should include the deployment of counter measures, which are the specific controls or solutions that address the root causes or sources of the risks, and prevent or minimize the potential losses or damages. For example, a counter measure for the risk of data breach could be encrypting the data or implementing a firewall. The deployment of counter measures should be based on a cost-benefit analysis, a risk assessment, and a risk response strategy. The other options are not necessarily part of risk mitigation procedures. Buying an insurance policy is an example of risk transfer, which is a risk response strategy that shifts the responsibility or burden of the risk to another party, such as an insurer or a vendor. However, risk transfer does not eliminate or reduce the risk itself, and it may involve additional costs or conditions. Acceptance of exposures is an example of risk acceptance, which is a risk response strategy that acknowledges the existence and consequences of the risk, and decides not to take any action to change the risk situation. However, risk acceptance does not mitigate the risk, and it may require contingency plans or reserves to deal with the potential outcomes. Enterprise architecture implementation is an example of a business process or project that may involve or create risks, but it is not a risk mitigation procedure itself. Enterprise architecture is the design and structure of an organization’s IT systems, networks, and resources, and how they align with the organization’s goals and strategies. Enterprise architecture implementation may require risk management activities, such as risk identification, assessment, and response, but it is not a risk mitigation procedure itself. References = Risk IT Framework, ISACA, 2022, p. 151
Copyright © 2021-2025 CertsTopics. All Rights Reserved