Which of the following is the BEST way to identify changes to the risk landscape?
Internal audit reports
Access reviews
Threat modeling
Root cause analysis
The risk landscape is the set of internal and external factors and conditions that may affect the organization’s objectives and operations, and create or influence the risks that the organization faces. The risk landscape is dynamic and complex, and it may change over time due to various drivers or events, such as technological innovations, market trends, regulatory changes, customer preferences, competitor actions, environmental issues, etc.
The best way to identify changes to the risk landscape is threat modeling, which is the process of identifying, analyzing, and prioritizing the potential threats or sources of harm that may exploit the vulnerabilities or weaknesses in the organization’s assets, processes, or systems, and cause adverse impacts or consequences for the organization. Threat modeling can help the organization to anticipate and prepare for the changes in the risk landscape, and to design and implement appropriate controls or countermeasures to mitigate or prevent the threats.
Threat modeling can be performed using various techniques, such as brainstorming, scenario analysis, attack trees, STRIDE, DREAD, etc. Threat modeling can also be integrated with the risk management process, and aligned with the organization’s objectives and risk appetite.
The other options are not the best ways to identify changes to the risk landscape, because they do not provide the same level of proactivity, comprehensiveness, and effectiveness of identifying and addressing the potential threats or sources of harm that may affect the organization.
Internal audit reports are the documents that provide the results and findings of the internal audits that are performed to assess and evaluate the adequacy and effectiveness of the organization’s governance, risk management, and control functions. Internal audit reports can provide useful information and recommendations on the current state and performance of the organization, and identify the issues or gaps that need to be addressed or improved, but they are not the best way to identify changes to the risk landscape, because they areusually retrospective and reactive, and they may not cover all the relevant or emerging threats or sources of harm that may affect the organization.
Access reviews are the processes of verifying and validating the access rights and privileges that are granted to the users or entities that interact with the organization’s assets, processes, orsystems, and ensuring that they are appropriate and authorized. Access reviews can provide useful information and feedback on the security and compliance of the organization’s access management, and identify and revoke any unauthorized or unnecessary access rights or privileges, but they are not the best way to identify changes to the risk landscape, because they are usually periodic and specific, and they may not cover all the relevant or emerging threats or sources of harm that may affect the organization.
Root cause analysis is the process of identifying and understanding the underlying or fundamental causes or factors that contribute to or result in a problem or incident that has occurred or may occur in the organization. Root cause analysis can provide useful insights and solutions on the origin and nature of the problem or incident, and prevent or reduce its recurrence or impact, but it is not the best way to identify changes to the risk landscape, because it is usually retrospective and reactive, and it may not cover all the relevant or emerging threats or sources of harm that may affect the organization. References =
ISACA, CRISC Review Manual, 7th Edition, 2022, pp. 19-20, 23-24, 27-28, 31-32, 40-41, 47-48, 54-55, 58-59, 62-63
ISACA, CRISC Review Questions, Answers & Explanations Database, 2022, QID 167
CRISC Practice Quiz and Exam Prep
Which of the following changes would be reflected in an organization's risk profile after the failure of a critical patch implementation?
Risk tolerance is decreased.
Residual risk is increased.
Inherent risk is increased.
Risk appetite is decreased
A critical patch is a software update that fixes a security vulnerability or a bug that may affect the performance, functionality, or reliability of a system or a network. A critical patch implementation is a process that applies the software update to the system or network in a timely and effective manner. The failure of a critical patch implementation is a situation where the software update is not applied or not applied correctly, which may expose the system or network to various threats, such as data theft, data corruption, data leakage, or denial of service. The failure of a critical patch implementation would be reflected in an organization’s risk profile by increasing the residual risk. Residual risk is the risk that remains after the risk response, which means the risk that is not avoided, transferred, or mitigated by the existing controls or measures. The failure of a critical patch implementation would increase the residual risk, as it would reduce the effectiveness or efficiency of the existing controls or measures that are supposed to address the security vulnerability or the bug. The failure of a critical patch implementation would also increase the likelihood or impact of the potential threats, as well as the exposure or consequences of the system or network. The other options are not the correct changes that would be reflected in an organization’s risk profile after the failure of a critical patch implementation, although they may be affected or related. Risk tolerance is the degree of variation from the risk appetite that the organization is not willing to accept. Risk tolerance may be decreased by the failure of a critical patch implementation, as the organization may become more cautious or conservative in accepting the risk, but it is not a direct or immediate change in the risk profile. Inherent risk is the risk that exists in the absence of any controls or measures, which means the risk that is inherent to the system or network or the environment. Inherent risk may be increased by the failure of a critical patch implementation, as the system or network may become more vulnerable or susceptible to the threats, but it is not a change in the risk profile, as the risk profile considers the existing controls or measures. Risk appetite is the amount and type of risk that the organization is willing to accept in pursuit of its objectives. Risk appetite may be decreasedby the failure of a critical patch implementation, as the organization may become less willing orable to accept the risk, but it is not a change in the risk profile, as the risk profile reflects the actual or current risk level, not the desired or expected risk level. References = CRISC Review Manual, pages 32-331; CRISC Review Questions, Answers & Explanations Manual, page 972; What is a Critical Patch? - Definition from Techopedia3; What is Residual Risk? - Definition from Techopedia4
Which of the following would BEST ensure that identified risk scenarios are addressed?
Reviewing the implementation of the risk response
Creating a separate risk register for key business units
Performing real-time monitoring of threats
Performing regular risk control self-assessments
The best way to ensure that identified risk scenarios are addressed is to review the implementation of the risk response. The risk response is the action or plan that is taken to reduce, avoid, transfer, or accept the risk, depending on the chosen risk treatment option1. Reviewing the implementation of the risk response means checking whether the risk response actions are executed as planned, whether they are effective and efficient in mitigating the risk, and whether they are aligned with the organization’s objectives and risk appetite2. Reviewing the implementation of the risk response helps to monitor and control the risk, identify any gaps or issues, and make any necessary adjustments or improvements. The other options are not the best ways to ensure that identified risk scenarios are addressed, as they are either less comprehensive or less specific than reviewing the implementation of the risk response. Creating a separate risk register for key business units is a way of documenting and tracking the risks that affect different parts of the organization. However, this is not the same as addressing the risk scenarios, as it does not indicate how the risks are treated or resolved. Performing real-time monitoring of threats is a way of detecting and responding to any changes or events that may increase the likelihood or impact of the risks. However, this is not the same as addressing the riskscenarios, as it does not measure the effectiveness or efficiency of the risk response actions. Performing regular risk control self-assessments is a way of evaluating and testing the design and operation of the controls that are implemented to mitigate the risks. However, this is not the same as addressing the risk scenarios, as it does not cover the other aspects of the risk response, such as risk avoidance, transfer, or acceptance. References = Risk and Information Systems Control Study Manual, 7th Edition, Chapter 2, Section 2.1.7, Page 59.
Which of the following would be MOST important for a risk practitioner to provide to the internal audit department during the audit planning process?
Closed management action plans from the previous audit
Annual risk assessment results
An updated vulnerability management report
A list of identified generic risk scenarios
The audit planning process is the process of defining and describing the scope, objectives, and approach of the internal audit that is performed to assess and evaluate the adequacy and effectiveness of the organization’s governance, risk management, and control functions. The audit planning process involves identifying and prioritizing the audit areas, topics, or issues, and allocating the audit resources, time, and budget.
The most important information for a risk practitioner to provide to the internal audit department during the audit planning process is the annual risk assessment results, which are the outcomes or outputs of the risk assessment process that measures and compares the likelihood and impact of various risk scenarios, and prioritizes them based on their significance and urgency. The annual risk assessment results can help the internal audit department to plan the audit by providing the following information:
The level and priority of the risks that may affect the organization’s objectives and operations, and the potential consequences or impacts that they may cause for the organization if they materialize.
The gap or difference between the current and desired level of risk, and the extent or degree to which the risk responses or controls contribute to or affect the gap or difference.
The cost-benefit or feasibility analysis of the possible actions or plans to address or correct the risks and their responses, and the expected or desired outcomes or benefits that they may provide for the organization.
The other options are not the most important information for a risk practitioner to provide to the internal audit department during the audit planning process, because they do not provide the same level of detail and insight that the annual risk assessment results provide, and they may not be relevant or actionable for the internal audit department.
Closed management action plans from the previous audit are the actions or plans that have been implemented or completed by the management to address or correct the findings or recommendations from the previous internal audit that was performed. Closed management action plans from the previous audit can provide useful information on the progress and performance of the management in improving and optimizing the organization’s governance, risk management, and control functions, but they are not the most important information for a risk practitioner to provide to the internal audit department during the audit planning process, because they do not indicate the current or accurate state and performance of the organization’s risk profile, and they may not cover all the relevant or emerging risks that may exist or arise.
An updated vulnerability management report is a report that provides the information and status of the vulnerabilities or weaknesses in the organization’s assets, processes, or systems that can be exploited or compromised by the threats or sources of harm that may affect the organization’s objectives or operations. An updated vulnerability management report can provide useful information on the existence and severity of the vulnerabilities, and the actions or plans to mitigate or prevent them, but it is not the most important information for a risk practitioner to provide to the internal audit department during the audit planning process, because it does not indicate the likelihood and impact of the risk scenarios that are associated with the vulnerabilities, and the potential consequences or impacts that they may cause for the organization.
A list of identified generic risk scenarios is a list that contains the descriptions or representations of the possible or hypothetical situations or events that may cause or result in a risk for the organization, without specifying the details or characteristics of the risk source, event, cause, or impact. A list of identified generic risk scenarios can provide useful information on the types or categories of the risks that may affect the organization, but it is not the most important information for a risk practitioner to provide to the internal audit department during the audit planning process, because it does not indicate the level and priority of the risks, and the potential consequences or impacts that they may cause for the organization. References =
ISACA, CRISC Review Manual, 7th Edition, 2022, pp. 19-20, 23-24, 27-28, 31-32, 40-41, 47-48, 54-55, 58-59, 62-63
ISACA, CRISC Review Questions, Answers & Explanations Database, 2022, QID 188
CRISC Practice Quiz and Exam Prep
Copyright © 2021-2025 CertsTopics. All Rights Reserved