Which of the following is the MOST important objective of embedding risk management practices into the initiation phase of the project management life cycle?
To deliver projects on time and on budget
To assess inherent risk
To include project risk in the enterprise-wide IT risk profit.
To assess risk throughout the project
The most important objective of embedding risk management practices into the initiation phase of the project management life cycle is to assess inherent risk. Inherent risk is the risk that exists before any controls or mitigations are applied. By assessing inherent risk in the initiation phase, the project team can identify the potential sources, causes, and impacts of risk that may affect the project objectives, scope, and deliverables. Assessing inherent risk in the initiation phase also helps to prioritize the risks, determine the risk appetite and tolerance, and plan the risk responses. Delivering projects on time and on budget, including project risk in the enterprise-wide IT risk profile, and assessing risk throughout the project are important objectives of risk management,but they are not the most important objective of embedding risk management practices into the initiation phase. References = Risk and Information Systems Control Study Manual, 7th Edition, Chapter 2, Section 2.1.1.1, page 511
1: ISACA Certified in Risk and Information Systems Control (CRISC®) Exam Guide, Answer to Question 658.
An organization uses a vendor to destroy hard drives. Which of the following would BEST reduce the risk of data leakage?
Require the vendor to degauss the hard drives
Implement an encryption policy for the hard drives.
Require confirmation of destruction from the IT manager.
Use an accredited vendor to dispose of the hard drives.
Data leakage is the unauthorized or accidental disclosure of sensitive or confidential data to unauthorized parties. Data leakage can cause serious damages or losses to the organization, such as data breaches, fines, lawsuits, reputational harm, or loss of customer trust. Data leakage can occur due to various reasons, such as human errors, malicious attacks, or inadequate controls1.
An organization that uses a vendor to destroy hard drives faces a risk of data leakage, as the vendor may not properly or securely destroy the hard drives, or may access or misuse the data stored on them. The best way to reduce this risk is to use an accredited vendor to dispose of the hard drives, because it means that the vendor:
Has been certified or verified by a reputable or recognized authority or organization, such as ISACA, NAID, or R2, to provide hard drive destruction services
Follows the industry standards and best practices for hard drive destruction, such as NIST 800-88 or DoD 5220.22-M, and ensures the compliance with the legal and regulatory requirements, such as HIPAA, PCI DSS, or GDPR
Provides a secure and transparent process for hard drive destruction, such as using a specialized shredder, issuing a certificate of destruction, or allowing the customer to witness the destruction
Maintains a high level of professionalism and integrity, and does not compromise the confidentiality or security of the customer’s data234
The other options are not the best ways to reduce the risk of data leakage, but rather some of the steps or aspects of hard drive destruction. Require the vendor to degauss the hard drives is a step that can help to erase the data on the hard drives by using a strong magnetic field. However,degaussing may not be effective or reliable for some types of hard drives, such as solid state drives (SSDs), and it may not prevent the vendor from accessing or misusing the data before degaussing5. Implement an encryption policy for the hard drives is an aspect that can help to protect the data on the hard drives by using a cryptographic algorithm to make it unreadable without a key. However, encryption may not be sufficient or applicable for some types of data, such as metadata, and it may not prevent the vendor from accessing or misusing the key or the encrypted data6. Require confirmation of destruction from the IT manager is a step that can help to verify that the hard drives have been destroyed by the vendor, and to document the process and the outcome. However, confirmation of destruction may not be accurate or authentic, and it may not prevent the vendor from accessing or misusing the data before destruction7. References =
Data Leakage - ISACA
Hard Drive Shredding Services | Hard Drive Destruction & Disposal
Hard Drive Shredding and Destruction Service | CompuCycle
Electronic Destruction & Recycling | Shred Nations
Degaussing - ISACA
Encryption - ISACA
Certificate of Destruction - ISACA
[CRISC Review Manual, 7th Edition]
Which of the following is the MOST important consideration when determining whether to accept residual risk after security controls have been implemented on a critical system?
Cost versus benefit of additional mitigating controls
Annualized loss expectancy (ALE) for the system
Frequency of business impact
Cost of the Information control system
Residual risk is the risk that remains after security controls have been implemented on a system. Residual risk can be accepted, transferred, avoided, or further mitigated. The most important consideration when deciding whether to accept residual risk is the cost versus benefit of additional mitigating controls. This means comparing the potential impact of the residual risk with the cost and effectiveness of implementing more controls to reduce it. If the cost of additional controls outweighs the benefit of reducing the residual risk, then it may be acceptableto accept the residual risk. However, if the benefit of additional controls exceeds the cost, then it may be advisable to implement more controls to lower the residual risk to an acceptable level. References = Risk and Information Systems Control Study Manual, Chapter 3: Risk Response and Mitigation, Section 3.4: Risk Response Selection, p. 156-157.
The MOST important reason to monitor key risk indicators (KRIs) is to help management:
identity early risk transfer strategies.
lessen the impact of realized risk.
analyze the chain of risk events.
identify the root cause of risk events.
Key risk indicators (KRIs) are metrics used by organizations to monitor and assess potential risks that may impact their objectives and performance. KRIs also provide early warning signals that help organizations identify, analyze, and address risks before they escalate into significant issues1. The most importantreason to monitor KRIs is to help management lessen the impact of realized risk, which is the actual or expected negative consequence of a risk event2. By monitoring KRIs, management can gain insight into the current and emerging risk exposures and trends, and evaluate their alignment with the organization’s risk appetite and tolerance3. This enables management to make informed and timely decisions and actions to mitigate or eliminate the risks, and to allocate resources and prioritize efforts where they are most needed. By lessening the impact of realized risk, management can also protect and enhance the organization’s reputation, performance, and value. Identifying early risk transfer strategies, analyzing the chain of risk events, and identifying the root cause of risk events are not the most important reasons to monitor KRIs, as they do not provide the same level of benefit and value as lessening the impact of realized risk. Identifying early risk transfer strategies is a process that involves finding and implementing ways to shift or share the risk or its impact to another party, such as through insurance, outsourcing, or hedging4. Identifying early risk transfer strategies can help to reduce the organization’s risk exposure and liability, but it does not necessarily lessen the impact of realized risk, as the risk or its impact may still occur or affect the organization indirectly. Analyzing the chain of risk events is a process that involves tracing and understanding the sequence and interconnection of the risk events that lead to a specific outcome or consequence5. Analyzing the chain of risk events can help to identify and address the root causes and contributing factors of the risk events, but it does not necessarily lessen the impact of realized risk, as the outcome or consequence may have already occurred or be unavoidable. Identifying the root cause of risk events is a process that involves finding and determining the underlying or fundamental source or reason of the risk events. Identifying the root cause of risk events can help to prevent or correct the recurrence or escalation of the risk events, but it does not necessarily lessen the impact of realized risk, as the impact may have already happened or be irreversible. References = 1: Key Risk Indicators: A Practical Guide | SafetyCulture2: Risk Impact - an overview | ScienceDirect Topics3: KRI Framework for Operational Risk Management | Workiva4: Risk Transfer - an overview | ScienceDirect Topics5: EventChainMethodology - Wikipedia : [Root Cause Analysis - an overview | ScienceDirect Topics] : [Risk and Information Systems Control Study Manual, Chapter 4: Risk and Control Monitoring and Reporting, Section 4.1: Key Risk Indicators, pp. 181-185.]
Copyright © 2021-2025 CertsTopics. All Rights Reserved