Summer Sale Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: ecus65

Exin CITM - EXIN EPI Certified Information Technology Manager

Page: 1 / 2
Total 50 questions

One of the company’s assets is valued at $200,000.00. Based on historical data, the exposure factor is 25%, and the Annual Loss Expectancy (ALE) is calculated at $100,000.00. What is the Annualized Rate of Occurrence (ARO)?

A.

0.4

B.

1

C.

2

Before signing the contract with the proposed vendor, concerns have been raised over future price increases. The internal business units, however, insist that the agreement with the vendor must take place as a result of the vendor evaluation process. What is the likely action to take?

A.

Ignore the business units and change vendor

B.

Include contractual terms

C.

Sign the contract

D.

Re-tender the project

A selection process for new IT staff has started. The Human Resource department has requested to follow the corporate staff hiring protocol. One mandatory item to be included is additional screening. What is verified by doing this?

A.

Salary demands

B.

Number of years working experience

C.

Criminal record

D.

Educational level

Due to technical and operational constraints, the preferred control to lower the risks identified is to outsource part of IT operations to an external vendor. What type of risk treatment is applied here?

A.

Sharing

B.

Retention

C.

Transferred

D.

Modification

As part of feedback collection techniques, it is suggested to include anonymous feedback. What would be the most likely reason for this?

A.

Avoidance of non-compliance to regulations

B.

Promotion of honest feedback while avoiding fear for backfiring on the participant

C.

Easier processing of data collected

D.

Reduced time spent for feedback participant

Business is changing fast, resulting in the need to formally appoint a new staff member responsible for guiding the process in a controlled manner. Which role does apply?

A.

Risk Manager

B.

Service Level Manager

C.

Business Relationship Manager

D.

Change Manager

In business continuity planning, the maximum age of the data to restore in the event of a disaster is considered which of the following?

A.

Maximum Time Allowed (MTA)

B.

Recovery Time Objective (RTO)

C.

Maximum Allowable Outage (MAO)

D.

Recovery Point Objective (RPO)

Senior management suspects possible threats in the IT organization and demands a high-level assessment which will list risks identified in order of priority for treatment. Which type of analysis should be conducted?

A.

Quantitative analysis

B.

Semi-quantitative analysis

C.

Ad hoc analysis

D.

Qualitative analysis

The introduction of a security awareness program has resulted in a quick decrease in security incidents. Eight months later, security incidents are showing a sudden increase, and the blame is put on a non-functioning security awareness program. What is most likely the cause?

A.

Insufficient budget

B.

Scope of the program is too narrow, not covering all areas of interest

C.

Message materials are few and static, and renewal is not taking place

D.

Lack of resources for instructor-led sessions

The IT department is requested to select and implement technology and support which will deliver knowledge capable of supporting cross-functional business units. What do you require?

A.

Information management

B.

Data management

C.

Both