Join the discussion
Question 68/138
The design of procedures to prevent fraudulent transactions within an enterprise resource planning (ERP) system should be based on:
Correct Answer: D
Add Comments
- Other Question (138q)
- Q1. Which of the following is the greatest risk to reporting?...
- Q2. Which of the following is the MOST effective method for indicating that the risk level is ...
- Q3. An organization has initiated a project to launch an IT-based service to customers and tak...
- Q4. Which of the following is the MAIN reason for analyzing risk scenarios?...
- Q5. Which of the following should be considered FIRST when assessing risk associated with the ...
- Q6. In an organization with a mature risk management program, which of the following would pro...
- Q7. Which of the following should be the PRIMARY focus of an IT risk awareness program?...
- Q8. You are the administrator of your enterprise. Which of the following controls would you us...
- Q9. In which of the following risk management capability maturity levels does the enterprise t...
- Q10. Which of the following is described by the definition given below? "It is the expected gua...
- Q11. An enterprise has identified risk events in a project. While responding to these identifie...
- Q12. Which of the following control is used to ensure that users have the rights and permission...
- Q13. Which of the following process ensures that the risk response strategy remains active and ...
- Q14. Which of the following is the MOST appropriate action when a tolerance threshold is exceed...
- Q15. A risk practitioner is reviewing a vendor contract and finds there is no clause to control...
- Q16. What can be determined from the risk scenario chart? (Exhibit)...
- Q17. You are the project manager of GHT project. You and your team have developed risk response...
- Q18. When an organization is having new software implemented under contract, which of the follo...
- Q19. A deficient control has been identified which could result in great harm to an organizatio...
- Q20. Before implementing instant messaging within an organization using a public solution, whic...
- Q21. In order to determining a risk is under-controlled the risk practitioner will need to...
- Q22. Which of the following would be an IT business owner's BEST course of action following an ...
- Q23. You are the project manager of the NKJ Project for your company. The project's success or ...
- Q24. You are the product manager in your enterprise. You have identified that new technologies,...
- Q25. Which of the following is the BEST indicator of the effectiveness of a control monitoring ...
- Q26. You are the project manager for BlueWell Inc. You have noticed that the risk level in your...
- Q27. Which of the following matrices is used to specify risk thresholds?...
- Q28. A risk assessment has identified that an organization may not be in compliance with indust...
- Q29. Marie has identified a risk event in her project that needs a mitigation response. Her res...
- Q30. Your project is an agricultural-based project that deals with plant irrigation systems. Yo...
- Q31. An organization has completed a project to implement encryption on all databases that host...
- Q32. Which of the following activities would BEST contribute to promoting an organization-wide ...
- Q33. You work as a Project Manager for Company Inc. You have to conduct the risk management act...
- Q34. You are the risk professional in Bluewell Inc. You have identified a risk and want to impl...
- Q35. Which of the following is the BEST approach for performing a business impact analysis (BIA...
- Q36. After mapping generic risk scenarios to organizational security policies, the NEXT course ...
- Q37. Which of following is NOT used for measurement of Critical Success Factors of the project?...
- Q38. A contract associated with a cloud service provider MUST include:...
- Q39. You are the risk control professional of your enterprise. You have implemented a tool that...
- Q40. An organization control environment is MOST effective when:...
- Q41. Natural disaster is BEST associated to which of the following types of risk?...
- Q42. Accountability for a particular risk is BEST represented in a:...
- Q43. Which of the following process ensures that extracted data are ready for analysis?...
- Q44. Which of the following would BEST ensure that identified risk scenarios are addressed?...
- Q45. What are the responsibilities of the CRO? Each correct answer represents a complete soluti...
- Q46. You are the project manager of your enterprise. You have introduced an intrusion detection...
- Q47. Which of the following would qualify as a key performance indicator (KPI)?...
- Q48. Which of the following business requirements MOST relates to the need for resilient busine...
- Q49. Which of the following risk management practices BEST facilitates the incorporation of IT ...
- Q50. Which of the following is MOST helpful in determining the effectiveness of an organization...
- Q51. When reviewing a report on the performance of control processes, it is MOST important to v...
- Q52. Which of the following is the BEST recommendation to senior management when the results of...
- Q53. Which of the following are parts of SWOT Analysis? Each correct answer represents a comple...
- Q54. Which of the following events refer to loss of integrity? Each correct answer represents a...
- Q55. Which of the following methods involves the use of predictive or diagnostic analytical too...
- Q56. Mortality tables are based on what mathematical activity? Each correct answer represents a...
- Q57. You are the project manager of HJT project. Important confidential files of your project a...
- Q58. During the risk assessment of an organization that processes credit cards, a number of exi...
- Q59. The PRIMARY purpose of IT control status reporting is to:...
- Q60. When a high-risk security breach occurs, which of the following would be MOST important to...
- Q61. Where are all risks and risk responses documented as the project progresses?...
- Q62. A risk practitioner has learned that an effort to implement a risk mitigation action plan ...
- Q63. Which of the following is MOST helpful in determining the effectiveness of an organization...
- Q64. Which of the following is true for risk management frameworks, standards and practices? Ea...
- Q65. Which of the following BEST informs decision-makers about the value of a notice and consen...
- Q66. How are the potential choices of risk based decisions are represented in decision tree ana...
- Q67. Which of the following elements of a risk register is MOST likely to change as a result of...
- Q68. The design of procedures to prevent fraudulent transactions within an enterprise resource ...
- Q69. Which of the following risks is the risk that happen with an important business partner an...
- Q70. Which of the following is the BEST way to determine whether new controls mitigate security...
- Q71. Which of the following should be the HIGHEST priority when developing a risk response?...
- Q72. Which of the following is MOST important to include in a Software as a Service (SaaS) vend...
- Q73. A payroll manager discovers that fields in certain payroll reports have been modified with...
- Q74. A PRIMARY function of the risk register is to provide supporting information for the devel...
- Q75. Which of the following roles would be MOST helpful in providing a high-level view of risk ...
- Q76. You are working as a project manager in Bluewell Inc.. You are nearing the final stages of...
- Q77. Which of the following is a risk practitioner's BEST recommendation to address an organiza...
- Q78. Which of the following management action will MOST likely change the likelihood rating of ...
- Q79. Which of the following is the MOST effective way to help ensure an organization's current ...
- Q80. An organization's control environment is MOST effective when...
- Q81. Your project change control board has approved several scope changes that will drastically...
- Q82. Which of the following considerations should be taken into account while selecting risk in...
- Q83. Which of the following provides the BEST evidence that risk mitigation plans have been imp...
- Q84. An organization maintains independent departmental risk registers that are not automatical...
- Q85. Which of the following contributes MOST to the effective implementation of risk responses?...
- Q86. Which of the following key risk indicators (KRIs) is MOST effective for monitoring risk re...
- Q87. Which of the following should be an element of the risk appetite of an organization?...
- Q88. Which of the following would be MOST important for a risk practitioner to provide to the i...
- Q89. You are the project manager of your enterprise. While performing risk management, you are ...
- Q90. Which of the following practices would be MOST effective in protecting personality identif...
- Q91. An IT department has organized training sessions to improve user awareness of organization...
- Q92. What is the IMMEDIATE step after defining set of risk scenarios?...
- Q93. Risk mitigation procedures should include:
- Q94. Which of the following BEST ensures that a firewall is configured in compliance with an en...
- Q95. You are the program manager for your organization and you are working with Alice, a projec...
- Q96. Which of the following is MOST influential when management makes risk response decisions?...
- Q97. The only output of qualitative risk analysis is risk register updates. When the project ma...
- Q98. Within the three lines of defense model, the accountability for the system of internal con...
- Q99. During implementation of an intrusion detection system (IDS) to monitor network traffic, a...
- Q100. Which of the following would BEST help to ensure that suspicious network activity is ident...
- Q101. You are the project manager of GHT project. Your project utilizes a machine for production...
- Q102. You and your project team are identifying the risks that may exist within your project. So...
- Q103. What should be considered while developing obscure risk scenarios? Each correct answer rep...
- Q104. Which of the following findings of a security awareness program assessment would cause the...
- Q105. You are the project manager of the QPS project. You and your project team have identified ...
- Q106. Which of the following is the MOST effective way to reduce potential losses due to ongoing...
- Q107. Which of the following is the MOST important topic to cover in a risk awareness training p...
- Q108. Which of the following statements are true for risk communication? Each correct answer rep...
- Q109. Which of the following should be included in a risk scenario to be used for risk analysis?...
- Q110. How are the potential choices of risk based decisions are represented in decision tree ana...
- Q111. When developing a risk awareness training program, which of the following training topics ...
- Q112. The BEST way to improve a risk register is to ensure the register:...
- Q113. Which of the following would MOST likely drive the need to review and update key performan...
- Q114. Wendy has identified a risk event in her project that has an impact of $75,000 and a 60 pe...
- Q115. You are elected as the project manager of GHT project. You have to initiate the project. Y...
- Q116. You are the project manager of GHT project. You have analyzed the risk and applied appropr...
- Q117. You are the project manager of HJT project. You want to measure the operational effectiven...
- Q118. Which of the following is the BEST way to validate whether controls have been implemented ...
- Q119. Which of the following BEST ensures that a firewall is configured in compliance with an en...
- Q120. Print jobs containing confidential information are sent to a shared network printer locate...
- Q121. Which of the following is the BEST way for a risk practitioner to help management prioriti...
- Q122. You are the project manager of the NGQQ Project for your company. To help you communicate ...
- Q123. A risk practitioner observes that hardware failure incidents have been increasing over the...
- Q124. Which of the following is the MOST critical element to maximize the potential for a succes...
- Q125. John works as a project manager for BlueWell Inc. He is determining which risks can affect...
- Q126. Which of the following can be interpreted from a single data point on a risk heat map7...
- Q127. You are the project manager of the GHY project for your organization. You are working with...
- Q128. When prioritizing risk response, management should FIRST:...
- Q129. Risks to an organization's image are referred to as what kind of risk?...
- Q130. Which of the following is the BEST key performance indicator (KPI) to measure the effectiv...
- Q131. An IT risk practitioner is evaluating an organization's change management controls over th...
- Q132. A program manager has completed an unsuccessful disaster recovery test. Which of the follo...
- Q133. Which of the following statements are true for risk communication? Each correct answer rep...
- Q134. Which of the following is the priority of data owners when establishing risk mitigation me...
- Q135. The only output of qualitative risk analysis is risk register updates. When the project ma...
- Q136. Which of the following is the BEST indicator of the effectiveness of IT risk management pr...
- Q137. A company has located its computer center on a moderate earthquake fault. Which of the fol...
- Q138. A part of a project deals with the hardware work. As a project manager, you have decided t...
