A cote data center went offline abruptly for several hours affecting many transactions across multiple locations. Which of the to" owing would provide the MOST useful information to determine mitigating controls?
Correct Answer: C
The most useful information to determine mitigating controls when a core data center went offline abruptly for several hours affecting many transactions across multiple locations is the root cause analysis. Root cause analysis is a technique that identifies the underlying factors or reasons that caused the problem or incident. Root cause analysis can help to understand the nature, scope, and impact of the problem or incident, and to prevent or reduce the recurrence or severity of the problem or incident in the future. Root cause analysis can also help to identify and prioritize the appropriate mitigating controls that address the root causes of the problem or incident. The other options are not as useful as root cause analysis, as they are related to the investigation, evaluation, or measurement of the problem or incident, not the resolution or prevention of the problem or incident. References = Risk and Information Systems Control Study Manual, Chapter 4: Risk and Control Monitoring and Reporting, Section 4.4: Key Control Indicators, page 211.
Question 197
A recent audit identified high-risk issues in a business unit though a previous control self-assessment (CSA) had good results. Which of the following is the MOST likely reason for the difference?
Correct Answer: D
* A compliance-based CSA focuses on ensuring that the business unit follows the policies and procedures established by the enterprise, regardless of the actual risk level or impact of the controls. * A risk-based CSA focuses on identifying and evaluating the risks that may affect the business unit's objectives, and designing and implementing controls that are appropriate to mitigate those risks. * A compliance-based CSA may not capture all the high-risk issues that exist in a business unit, especially if they are not aligned with the enterprise's standards or expectations. * A risk-based CSA may identify more high-risk issues than a compliance-based CSA, because it considers both internal and external factors that may affect the business unit's performance or security. * Therefore, a difference in results between a previous control self-assessment (CSA) and an audit indicates that either one of them was not risk-based, but rather compliance-based. The references for this answer are: * Risk IT Framework, page 9 * Information Technology & Security, page 3 * Risk Scenarios Starter Pack, page 1
Question 198
Which of the following is the BEST way to validate the results of a vulnerability assessment?
Correct Answer: A
Section: Volume D
Question 199
Which of the following would be an IT business owner's BEST course of action following an unexpected increase in emergency changes?
Correct Answer: A
Section: Volume D
Question 200
You are working in an enterprise. You project deals with important files that are stored on the computer. You have identified the risk of the failure of operations. To address this risk of failure, you have guided the system administrator sign off on the daily backup. This scenario is an example of which of the following?
Correct Answer: D,E,F,G
is incorrect. The scenario does not describe risk acceptance, Acceptance is a strategy that provides for formal acknowledgement of the existence of a risk and the monitoring of that risk.