Which of the following are parts of SWOT Analysis? Each correct answer represents a complete solution. Choose all that apply.
Correct Answer: A,C,D,E,F
is incorrect. Tools are not the parts of SWOT analysis.
CRISC Exam Question 597
Which of the following is MOST important for mitigating ethical risk when establishing accountability for control ownership?
Correct Answer: C
CRISC Exam Question 598
Which of the following is the BEST defense against successful phishing attacks?
Correct Answer: C
Explanation/Reference: Explanation: Phishing is a way of attempting to acquire information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. Phishing attacks are a type of to social engineering attack and are best defended by end-user awareness training. Incorrect Answers: A: An intrusion detection system does not protect against phishing attacks since phishing attacks usually do not have a particular pattern or unique signature. B: Application hardening does not protect against phishing attacks since phishing attacks generally use e- mail as the attack vector, with the end-user as the vulnerable point, not the application. D: Certain highly specialized spam filters can reduce the number of phishing e-mails that reach the inboxes of user, but they are not as effective in addressing phishing attack as end-user awareness.
CRISC Exam Question 599
Which of the following actions assures management that the organization's objectives are protected from the occurrence of risk events?
Correct Answer: A
is incorrect. Hedging is the process of managing the risk of price changes in physical material by offsetting that risk in the futures market. In other words, it is the avoidance of risk. So, it only avoids risk but can not assure protection against risk.
CRISC Exam Question 600
Which of the following would be MOST beneficial as a key risk indicator (KRI)?