1. Right Answer: D
Explanation: Reporting risks are caused due to wrong reporting which leads to bad decision. This bad decision due to wrong report hence causes a risk on the functionality of the organization. Therefore, the greatest risk to reporting is reliability of data. Reliability of data refers to the accuracy, robustness, and timing of the data.Incorrect Answers:A, B, C: Integrity, availability, and confidentiality of data are also important, but these three in combination comes under reliability itself.
2. Right Answer: B
Explanation: Transference is the risk response that transfers the risk to a third party, usually for a fee. Insurance and subcontracting of dangerous works are two common examples of transference with a contractual obligation.Incorrect Answers:A: Sharing is a positive risk response. Note that sharing may also have contractual obligations, sometimes called teaming agreements.C: Mitigation is a negative risk response used to lower the probability and/or impact of a risk event.D: Exploiting is a positive risk response and not a negative response and doesn't have contractual obligations.
3. Right Answer: A
Explanation: A knowledge management platform with workflow and polling feature will automate the process of maintaining the risk registers. Hence this ensures that an accurate and updated risk register is maintained.Incorrect Answers:B: Audit personnel may not have the appropriate business knowledge in risk assessment, hence cannot properly identify risk. Regular audits may also cause hindrance to the business activities.C: Business process owners typically cannot effectively identify risk to their business processes. They may not have the ability to be unbiased and may not have the appropriate skills or tools for evaluating risks.D: Monitoring key risk indicators, and record the findings in the risk register will only provide insights to known and identified risk and will not account for obscure risk, i.e. , risk that has not been identified yet.
4. Right Answer: B
Explanation: Tying user accounts to access requests confirms that all existing accounts have been approved. Hence, the effectiveness of the system access management process can be accounted.Incorrect Answers:A: Tying user accounts to human resources (HR) records confirms whether user accounts are uniquely tied to employees, not accounts for the effectiveness of the system access management process.C: Tying vendor records to user accounts may confirm valid accounts on an e-commerce application, but it does not consider user accounts that have been established without the supporting access request.D: Tying access requests to user accounts confirms that all access requests have been processed; however, the test does not consider user accounts that have been established without the supporting access request.
5. Right Answer: D
Explanation: Control effectiveness requires a process to verify that the control process worked as intended and meets the intended control objectives.Hence the test result of intended objective helps in verifying effectiveness of control.Incorrect Answers:A: Notification of failure does not determine control strength, hence this option is not correct.B: The type of control, like preventive or detective, does not help determine control effectiveness.C: Reliability is not an indication of control strength; weak controls can be highly reliable, even if they do not meet the control objective.
Leave a comment