Question 6 of 1896

Which of the following is the MOST important use of KRIs?

Answer

Suggested Answer

The suggested answer is B.

The most important use of Key Risk Indicators (KRIs) is to provide an early warning signal. KRIs are designed to give advance notice of potential risk issues before they escalate into significant problems. By doing so, they enable management to take proactive measures to mitigate risks and prevent potential losses. While other uses, such as providing a backward-looking view on risk events, indicating risk appetite and tolerance, and enabling trend analysis, are valuable, the primary function of KRIs is to serve as an early warning mechanism.

Question 7 of 1896

Which of the following role carriers will decide the

Key Risk Indicator of the enterprise?

Each correct answer represents a part of the solution. Choose two.

Answer

Suggested Answer

The suggested answer is A, B.

Deciding the Key Risk Indicators (KRIs) of an enterprise typically involves both business leaders and senior management. Business leaders have a thorough understanding of the business environment and strategic objectives, making them well-positioned to identify key risks that may impact the organization. Senior management oversees the overall performance and risk management, ensuring that identified risks align with the enterprise's goals and regulatory requirements. Therefore, both business leaders and senior management collaboratively select the KRIs to monitor.

Community Votes1 vote
ABSuggested
100%
Question 8 of 1896

What are the requirements for creating risk scenarios? Each correct answer represents a part of the solution. (Choose three.)

Answer

Suggested Answer

The suggested answer is B, C, D.

Creating a scenario requires determination of the value of an asset or a business process at risk and the potential threats and vulnerabilities that could cause loss.
The risk scenario should be assessed for relevance and realism, and then entered into the risk register if found to be relevant.
In practice following steps are involved in risk scenario development:
✑ First determine manageable set of scenarios, which include:
- Frequently occurring scenarios in the industry or product area.
- Scenarios representing threat sources that are increasing in count or severity level.
- Scenarios involving legal and regulatory requirements applicable to the business.
✑ After determining manageable risk scenarios, perform a validation against the business objectives of the entity.
✑ Based on this validation, refine the selected scenarios and then detail them to a level in line with the criticality of the entity.
✑ Lower down the number of scenarios to a manageable set. Manageable does not signify a fixed number, but should be in line with the overall importance and criticality of the unit.
✑ Risk factors kept in a register so that they can be reevaluated in the next iteration and included for detailed analysis if they have become relevant at that time.
✑ Risk factors kept in a register so that they can be reevaluated in the next iteration and included for detailed analysis if they have become relevant at that time.
✑ Include an unspecified event in the scenarios, that is, address an incident not covered by other scenarios.
Incorrect Answers:
A: Cause-and-effect analysis is a predictive or diagnostic analytical tool used to explore the root causes or factors that contribute to positive or negative effects or outcomes. It is used during the process of exposing risk factors.
Community Votes3 votes
ACDMost voted
67%
ABC
33%
Question 9 of 1896

You work as the project manager for Bluewell Inc. Your project has several risks that will affect several stakeholder requirements. Which project management plan will define who will be available to share information on the project risks?

Answer

Suggested Answer

The suggested answer is D.

The Communications Management Plan defines who will be available to share information on the project risks. This plan sets the structure for communication throughout the project's life, identifying and defining roles, and specifying the communication methods and frequency for stakeholder engagement, especially in the context of managing and disseminating risk-related information.

Question 10 of 1896

Which of the following controls is an example of non-technical controls?

Answer

Suggested Answer

The suggested answer is B.

Physical security is an example of non-technical control. It comes under the family of operational controls.
Incorrect Answers:
A, C, D: Intrusion detection system, access control, and encryption are the safeguards that are incorporated into computer hardware, software or firmware, hence they refer to as technical controls.
Community Votes1 vote
BSuggested
100%