Which of the following would be considered a vulnerability?
Delayed removal of employee access
Authorized administrative access to HR files
Corruption of files due to malware
Server downtime due to a denial of service (DoS) attack
According to the CRISC Review Manual (Digital Version), a vulnerability is a flaw or weakness in an asset’s design, implementation, or operation and management that could be exploited by a threat. A delayed removal of employee access is a vulnerability, as it allows former employees to retain access to the organization’s IT assets and processes, which could lead to unauthorized disclosure, modification, or destruction of data or resources. A delayed removal of employee access could be caused by poor personnel management, lack of security awareness, or inadequate access control policies and procedures.
References = CRISC Review Manual (Digital Version), Chapter 1: IT Risk Identification, Section 1.5: IT Risk Identification Methods and Techniques, pp. 32-331
Which of the following roles would provide the MOST important input when identifying IT risk scenarios?
Information security managers
Internal auditors
Business process owners
Operational risk managers
Business process owners would provide the most important input when identifying IT risk scenarios. IT risk scenarios are the situations or events that may affect the organization’s objectives, operations, or performance due to the use of information andtechnology1. Identifying IT risk scenarios means finding,recognizing, and describing the IT risks that the organization faces, as well as their sources, drivers, consequences, and responses2. Business process owners are the persons or entities who are responsible for the design, implementation, and operation of the business processes that support the organization’s goals and values3. Business process owners would provide the most important input when identifying IT risk scenarios, because they can:
Provide the context and perspective of the business objectives, strategies, and requirements that are affected or supported by the IT risks and controls;
Identify and prioritize the IT risks that are relevant and significant to their business processes, as well as the IT assets and resources that are involved or impacted by the IT risks;
Evaluate and communicate the likelihood and impact of the IT risks on their business processes, as well as the risk appetite and tolerance of their business units;
Suggest and implement the most suitable and effective IT risk response actions or measures to mitigate the IT risks, as well as monitor and report on the IT risk and control performance;
Align and integrate the IT risk management activities and outcomes with the business risk management framework, policies, and standards. The other options are not the most important roles for providing input when identifying IT risk scenarios, as they are either less relevant or less specific than business process owners. Information security managers are the persons or entities who are responsible for the planning, implementation, and maintenance of the information security measures and controls that protect the confidentiality, integrity, and availability of the organization’s data and systems4. Information security managers can provide input when identifying IT risk scenarios, because they can:
Provide the expertise and guidance on the information security risks and controls that are related to the use of information and technology;
Identify and assess the information security vulnerabilities and threats that may affect the organization’s data and systems, as well as the information security assets and resources that are involved or impacted by the information security risks;
Recommend and implement the most appropriate and effective information security risk response actions or measures to reduce or eliminate the information security risks, as well as monitor and report on the information security risk and control performance;
Align and integrate the information security risk management activities and outcomes with the information security framework, policies, and standards. However, information security managers are not the most important roles for providing input when identifying IT risk scenarios, because they may not have the full understanding or visibility of the business objectives, strategies, and requirements that are affected or supported by the IT risks and controls, or the risk appetite and tolerance of the business units. Internal auditors are the persons or entities who are responsible for theindependent and objective assurance and consulting on the effectiveness and efficiency of the organization’s governance, risk management, and internal control system5. Internal auditors can provide input when identifying IT risk scenarios, because they can:
Provide the assurance and validation on the design and operation of the IT risks and controls that are related to the use of information and technology;
Identify and evaluate the IT risk and control gaps or deficiencies that may affect the organization’s objectives, operations, or performance, as well as the IT risk and control objectives and activities that are involved or impacted by the IT risk and control gaps or deficiencies;
Report and recommend improvements or enhancements to the IT risks and controls, as well as follow up and verify the implementation and effectiveness of the IT risk and control improvements or enhancements;
Align and integrate the IT risk and control assurance and consulting activities and outcomes with the internal audit framework, policies, and standards. However, internal auditors are not the most important roles for providing input when identifying IT risk scenarios, because they may not have the authority or responsibility to implement or operate the IT risks and controls, or to decide or prioritize the IT risk response actions or measures. Operational risk managers are the persons or entities who are responsible for the identification, analysis, evaluation, and treatment of the risks that arise from the failures or inadequacies of the organization’s people, processes, systems, or external events6. Operational risk managers can provide input when identifying IT risk scenarios, because they can:
Provide the oversight and coordination of the operational risk management activities and performance across the organization, including the IT risks and controls that are related to the use of information and technology;
Identify and prioritize the operational risks that are relevant and significant to the organization, as well as the operational assets and resources that are involved or impacted by the operational risks;
Evaluate and communicate the likelihood and impact of the operational risks on the organization, as well as the risk appetite and tolerance of the organization;
Suggest and implement the most suitable and effective operational risk response actions or measures to mitigate the operational risks, as well as monitor and report on the operational risk and control performance;
Align and integrate the operational risk management activities and outcomes with the operational risk management framework, policies, and standards. However, operational risk managers are not the most important roles for providing input when identifying IT risk scenarios, because they may not have the specific knowledge or expertise on the IT risks and controls that are related to the use of information and technology, or the context and perspective of the business processes that are affected or supported by the IT risks and controls. References = Risk and Information Systems Control Study Manual, 7th Edition, Chapter 3, Section 3.1.1, Page 85.
Which of the following is MOST effective against external threats to an organizations confidential information?
Single sign-on
Data integrity checking
Strong authentication
Intrusion detection system
Strong authentication is the most effective measure against external threats to an organization’s confidential information. Confidential information is any data or information that is sensitive, proprietary, or valuable to the organization, and that should not be disclosed to unauthorized parties1. External threats are malicious actors outside the organization who attempt to gain unauthorized access to the organization’s networks, systems, and data, using various methods such as malware, hacking, or social engineering2. Strong authentication is a method of verifying the identity and legitimacy of a user or device before granting access to the organization’s resources or data3. Strong authentication typically involves the use of multiple factors or methods of authentication, such as passwords, tokens, biometrics, orcertificates4. Strong authentication can prevent or reduce the risk of external threats to the organization’s confidential information, by making it more difficult and costly for the attackers to compromise the credentials or devices of the authorized users, and by limiting the access to the data or resourcesthat are relevant and necessary for the users’ roles and responsibilities5. The other options are not the most effective measures against external threats to the organization’s confidential information, as they are either less secure or less relevant than strong authentication. Single sign-on is a method of allowing a user to access multiple systems or applications with a single set of credentials, without having to log in separately for each system or application6. Single sign-on can improve the user experience and convenience, as well as reduce the administrative burden and cost of managing multiple accounts and passwords. However, single sign-on is not the most effective measure against external threats to the organization’s confidential information, as it can also increase the risk of credential compromise or misuse, and create a single point of failure or attack for the attackers to access multiple systems or data. Data integrity checking is a method of ensuring that the data or information is accurate, complete, and consistent, and that it has not been altered or corrupted by unauthorized parties or processes. Data integrity checking can involve the use of techniques such as checksums, hashes, digital signatures, or encryption. Data integrity checking can enhance the quality and reliability of the data or information, as well as detect and prevent any unauthorized or malicious changes or tampering. However, data integrity checking is not the most effective measure against external threats to the organization’s confidential information, as it does not prevent or reduce the risk of data theft or leakage, and it does not verify the identity or legitimacy of the users or devices accessing the data. Intrusion detection system is a system that monitors the network or system activities and events, and detects and alerts any suspicious or malicious behaviors or anomalies that may indicate an attempted or successful breach or attack. Intrusion detection system can help to identify and respond to external threats to the organization’s networks, systems, and data, by providing visibility and awareness of the network or system status and activities, and by enabling timely and appropriate actions or countermeasures. However, intrusion detection system is not the most effective measure againstexternal threats to the organization’s confidential information, as it is a reactive or passive system that does not prevent or block the attacks, and it may generate false positives or negatives that can affect its accuracy and efficiency. References = Risk and Information Systems Control Study Manual, 7th Edition, Chapter 4, Section 4.2.1, Page 189.
Which of the following would be a risk practitioners’ BEST recommendation for preventing cyber intrusion?
Establish a cyber response plan
Implement data loss prevention (DLP) tools.
Implement network segregation.
Strengthen vulnerability remediation efforts.
A cyber intrusion is an unauthorized or malicious access to a computer system or network by an attacker. A cyber intrusion can compromise the confidentiality, integrity, or availability of the system or network, as well as the data and services that it hosts. A cyber intrusion can also cause damage, disruption, or theft to the organization or its stakeholders. One of the best ways toprevent cyber intrusion is to strengthen vulnerability remediation efforts, which means to identify and fix the weaknesses or flaws in the system or network that can be exploited by the attackers. Vulnerability remediation efforts can include conducting regularvulnerability assessments, applying security patches and updates, configuring security settings and policies, and implementing security controls and measures. By strengthening vulnerability remediation efforts, the organization can reduce the attack surface and the likelihood of cyber intrusion, as well as enhance the resilience and protection of the system or network. The other options are not the best recommendations for preventing cyber intrusion, although they may be helpful and complementary. Establishing a cyber response plan is a technique to prepare for and respond to a cyber incident, such as a cyber intrusion, by defining the roles, responsibilities, procedures, and resources that are needed to manage and recover from the incident. However, a cyber response plan is a reactive and contingency measure, while strengthening vulnerability remediation efforts is a proactive and preventive measure. Implementing data loss prevention (DLP) tools is a technology that tries to detect and stop sensitive data breaches, or data leakage incidents, in an organization. DLP tools can help to protect the data from being disclosed to an unauthorized person, whether it is deliberate or accidental. However, DLP tools do not prevent cyber intrusion itself, as they only focus on the data, not the system or network. Implementing network segregation is a method to divide a network into smaller segments or subnetworks, each with its own security policies and controls. Network segregation can help to isolate and contain the impact of a cyber intrusion, as well as to limit the access and movement of the attackers within the network. However, network segregation does not prevent cyber intrusion from occurring, as it does not address thevulnerabilities or flaws in the system or network. References = CRISC Review Manual, pages 164-1651; CRISC Review Questions, Answers & Explanations Manual, page 902; What Are Security Controls? - F53; Assessing Security Controls: Keystone of the Risk Management … - ISACA4
Copyright © 2021-2025 CertsTopics. All Rights Reserved