Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Premium Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
Categories
- Not categorized 0%
Unlock Your Full Report
You missed {missed_count} questions. Enter your email to see exactly which ones you got wrong and read the detailed explanations.
Submit to instantly unlock detailed explanations for every question.
Success! Your results are now unlocked. You can see the correct answers and detailed explanations below.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
The monitoring system at a listed company has flagged an anomaly related to Roles and responsibilities of the board and senior management in risk oversight during business continuity. Investigation reveals that during a recent 48-hour system outage, the recovery time objective (RTO) was exceeded by 12 hours, yet the board of directors had not received any prior notification that the existing infrastructure was insufficient to meet the stated risk appetite for operational resilience. The internal audit report suggests a breakdown in the communication of risk metrics between the executive suite and the risk committee. Which of the following best describes the fundamental governance failure in this scenario?
Correct
Correct: In a robust risk governance framework, the board is responsible for setting the risk appetite and ensuring it is operationalized. Senior management is responsible for implementing the board’s strategy and ensuring that the board is informed of any gaps between current capabilities and the desired risk profile. The failure here lies in the lack of translation from high-level appetite to operational limits and the subsequent failure of senior management to report the inability to meet those limits.
Incorrect: Defining the high-level risk appetite is a primary responsibility of the board, not senior management, although management provides input. The board’s role is strategic oversight, not the review of granular technical scripts or hardware specifications, which is an operational task for management. Risk tolerance and appetite setting are top-down governance functions that should not be fully delegated to business units, as this would lead to a fragmented and inconsistent risk culture.
Takeaway: Effective risk oversight requires the board to set the risk appetite while senior management ensures that operational capabilities and reporting lines are aligned to support that appetite.
Incorrect
Correct: In a robust risk governance framework, the board is responsible for setting the risk appetite and ensuring it is operationalized. Senior management is responsible for implementing the board’s strategy and ensuring that the board is informed of any gaps between current capabilities and the desired risk profile. The failure here lies in the lack of translation from high-level appetite to operational limits and the subsequent failure of senior management to report the inability to meet those limits.
Incorrect: Defining the high-level risk appetite is a primary responsibility of the board, not senior management, although management provides input. The board’s role is strategic oversight, not the review of granular technical scripts or hardware specifications, which is an operational task for management. Risk tolerance and appetite setting are top-down governance functions that should not be fully delegated to business units, as this would lead to a fragmented and inconsistent risk culture.
Takeaway: Effective risk oversight requires the board to set the risk appetite while senior management ensures that operational capabilities and reporting lines are aligned to support that appetite.
-
Question 2 of 10
2. Question
Which safeguard provides the strongest protection when dealing with Cybersecurity Risk Management? A global financial institution is integrating its cybersecurity protocols into its broader Enterprise Risk Management (ERM) framework. The board of directors is concerned that existing technical defenses are insufficient to address the strategic implications of a major data breach. To align with professional risk management standards, the firm needs a solution that ensures cyber risk is managed as a top-tier enterprise threat rather than an isolated IT issue.
Correct
Correct: Establishing a comprehensive risk governance structure that integrates cybersecurity risk metrics into the organization’s formal risk appetite statement is the strongest safeguard because it ensures that cyber risk is managed at the board level. This alignment allows the organization to make informed strategic decisions based on its defined tolerance for risk, ensuring that resources are allocated effectively and that there is clear accountability across the enterprise, which is a core principle of Enterprise Risk Management (ERM).
Incorrect
Correct: Establishing a comprehensive risk governance structure that integrates cybersecurity risk metrics into the organization’s formal risk appetite statement is the strongest safeguard because it ensures that cyber risk is managed at the board level. This alignment allows the organization to make informed strategic decisions based on its defined tolerance for risk, ensuring that resources are allocated effectively and that there is clear accountability across the enterprise, which is a core principle of Enterprise Risk Management (ERM).
-
Question 3 of 10
3. Question
During a periodic assessment of Big data technologies and their application in risk management as part of incident response at an insurer, auditors observed that the organization recently migrated its claims fraud detection system to a distributed NoSQL database to handle unstructured social media feeds and telematics. While the system successfully identifies high-risk patterns in real-time, the risk management department lacks a formal process to document the transformations and filtering logic applied to the raw data before it enters the predictive model. Which of the following represents the most critical risk to the organization’s risk management framework in this scenario?
Correct
Correct: In big data environments used for risk management, establishing data lineage is a fundamental requirement. Data lineage provides the necessary trail of how data was sourced, transformed, and utilized throughout its lifecycle. Without clear lineage and metadata management, the organization cannot validate the integrity of the risk models or ensure that the outputs used for critical decisions, such as capital adequacy or regulatory reporting, are based on accurate and untampered data. This directly impacts the ‘Risk measurement and quantification’ and ‘Risk reporting’ components of the ERM framework.
Incorrect: Increased latency is an operational performance issue that, while important for real-time detection, does not fundamentally undermine the integrity of the risk management framework as much as a lack of auditability does. Verification by third-party aggregators is a data quality control, but the internal governance of how data is transformed is a more direct and critical responsibility of the risk management function. While having specialized skills in audit is beneficial for modern risk environments, the absence of a specific role is a resource management issue rather than a systemic risk to the framework’s reliability compared to the lack of data lineage.
Takeaway: Effective governance of big data in risk management requires robust data lineage to ensure the transparency, integrity, and auditability of model-driven decisions.
Incorrect
Correct: In big data environments used for risk management, establishing data lineage is a fundamental requirement. Data lineage provides the necessary trail of how data was sourced, transformed, and utilized throughout its lifecycle. Without clear lineage and metadata management, the organization cannot validate the integrity of the risk models or ensure that the outputs used for critical decisions, such as capital adequacy or regulatory reporting, are based on accurate and untampered data. This directly impacts the ‘Risk measurement and quantification’ and ‘Risk reporting’ components of the ERM framework.
Incorrect: Increased latency is an operational performance issue that, while important for real-time detection, does not fundamentally undermine the integrity of the risk management framework as much as a lack of auditability does. Verification by third-party aggregators is a data quality control, but the internal governance of how data is transformed is a more direct and critical responsibility of the risk management function. While having specialized skills in audit is beneficial for modern risk environments, the absence of a specific role is a resource management issue rather than a systemic risk to the framework’s reliability compared to the lack of data lineage.
Takeaway: Effective governance of big data in risk management requires robust data lineage to ensure the transparency, integrity, and auditability of model-driven decisions.
-
Question 4 of 10
4. Question
How can the inherent risks in Contractual clauses and their risk implications be most effectively addressed? A global investment bank is currently renegotiating its Master Netting Agreements and Credit Support Annexes (CSAs) with several emerging market counterparties. The risk management team is concerned about the interplay between legal enforceability, operational liquidity, and credit risk mitigation. In this context, which approach ensures that the contractual framework robustly supports the firm’s risk management objectives?
Correct
Correct: The most effective approach involves a holistic, cross-functional strategy. Close-out netting is only a valid risk mitigant if it is legally enforceable in the counterparty’s jurisdiction; otherwise, the firm faces gross rather than net exposure. Furthermore, aligning contractual triggers (such as Ratings Downgrade triggers) with liquidity stress testing ensures that the firm is prepared for the cash flow implications of collateral calls or the termination of trades, addressing the intersection of credit, legal, and liquidity risk.
Incorrect: Relying solely on standardized templates is insufficient because they may not account for specific jurisdictional risks or the unique credit profile of a counterparty. Focusing only on quantitative collateral measures ignores the qualitative legal triggers that often precede a default. While restrictive termination events might seem protective, they are ineffective if the underlying legal framework does not support immediate close-out or if the firm lacks the liquidity to manage the resulting cash flow shifts.
Takeaway: Effective contractual risk management requires integrating legal enforceability validation with liquidity and credit risk assessments to ensure that mitigants like netting and collateral function as intended during stress events.
Incorrect
Correct: The most effective approach involves a holistic, cross-functional strategy. Close-out netting is only a valid risk mitigant if it is legally enforceable in the counterparty’s jurisdiction; otherwise, the firm faces gross rather than net exposure. Furthermore, aligning contractual triggers (such as Ratings Downgrade triggers) with liquidity stress testing ensures that the firm is prepared for the cash flow implications of collateral calls or the termination of trades, addressing the intersection of credit, legal, and liquidity risk.
Incorrect: Relying solely on standardized templates is insufficient because they may not account for specific jurisdictional risks or the unique credit profile of a counterparty. Focusing only on quantitative collateral measures ignores the qualitative legal triggers that often precede a default. While restrictive termination events might seem protective, they are ineffective if the underlying legal framework does not support immediate close-out or if the firm lacks the liquidity to manage the resulting cash flow shifts.
Takeaway: Effective contractual risk management requires integrating legal enforceability validation with liquidity and credit risk assessments to ensure that mitigants like netting and collateral function as intended during stress events.
-
Question 5 of 10
5. Question
A regulatory inspection at a credit union focuses on Technological disruption and innovation risks in the context of outsourcing. The examiner notes that the institution has recently migrated its core lending decision engine to a third-party fintech platform that utilizes a proprietary, machine-learning algorithm for credit scoring. This migration, completed within a 6-month timeframe, was intended to improve member experience and reduce manual processing times. However, the examiner expresses concern regarding the institution’s risk assessment framework for this innovative technology. Which of the following actions represents the most effective risk management approach to address the disruption and innovation risks associated with this outsourcing arrangement?
Correct
Correct: In the context of technological disruption and innovation, the primary risk is often the dependency on a unique or unproven third-party solution. A robust risk management framework must include operational resilience planning, specifically a stressed exit strategy. This ensures that if the innovative provider fails, the technology becomes obsolete, or the partnership dissolves, the credit union can maintain its core functions without significant disruption to its members or financial stability.
Incorrect: Focusing on fixed-price contracts addresses financial risk but fails to mitigate the operational and disruption risks inherent in innovative technology. Seeking 100% alignment with legacy systems defeats the purpose of adopting innovative machine-learning models, which are intended to improve upon legacy limitations. Requiring prior regulatory approval for every change is an inefficient governance model that stifles innovation and is generally not a requirement of standard risk management frameworks, which instead emphasize internal accountability and oversight.
Takeaway: Effective management of innovation risk in outsourcing requires a focus on operational resilience and the ability to exit or transition from a disruptive technology provider without compromising core services.
Incorrect
Correct: In the context of technological disruption and innovation, the primary risk is often the dependency on a unique or unproven third-party solution. A robust risk management framework must include operational resilience planning, specifically a stressed exit strategy. This ensures that if the innovative provider fails, the technology becomes obsolete, or the partnership dissolves, the credit union can maintain its core functions without significant disruption to its members or financial stability.
Incorrect: Focusing on fixed-price contracts addresses financial risk but fails to mitigate the operational and disruption risks inherent in innovative technology. Seeking 100% alignment with legacy systems defeats the purpose of adopting innovative machine-learning models, which are intended to improve upon legacy limitations. Requiring prior regulatory approval for every change is an inefficient governance model that stifles innovation and is generally not a requirement of standard risk management frameworks, which instead emphasize internal accountability and oversight.
Takeaway: Effective management of innovation risk in outsourcing requires a focus on operational resilience and the ability to exit or transition from a disruptive technology provider without compromising core services.
-
Question 6 of 10
6. Question
The operations team at a broker-dealer has encountered an exception involving Technological disruption and innovation risks during change management. They report that the deployment of a new machine-learning-based execution engine has resulted in a data latency issue where the firm’s centralized risk dashboard lags behind the actual market positions by approximately 120 seconds. This discrepancy was identified during the final stage of the 30-day pilot program. Given the firm’s commitment to the Enterprise Risk Management (ERM) framework, which of the following actions should the risk manager prioritize to address this innovation-driven risk?
Correct
Correct: In the context of technological disruption, when a new system’s speed outpaces the existing control infrastructure, the risk manager must ensure that the risk remains within the firm’s established tolerance. Suspending the rollout and implementing automated circuit breakers (kill switches) at the execution level provides a direct, preventative control that mitigates the risk of unauthorized or excessive exposure while the monitoring lag is resolved. This aligns with ERM principles of maintaining control effectiveness during innovation.
Incorrect: Adjusting the risk appetite to accommodate a known control failure is a reactive approach that undermines the integrity of the risk management framework. Re-calibrating VaR models is a market risk measurement technique that does not address the underlying operational failure of reporting latency. Delegating monitoring solely to the front office violates the ‘Three Lines of Defense’ principle, as it removes the independent oversight required for effective risk governance.
Takeaway: Technological innovation requires that control and monitoring capabilities evolve at the same pace as the underlying business activity to prevent operational blind spots in risk oversight.
Incorrect
Correct: In the context of technological disruption, when a new system’s speed outpaces the existing control infrastructure, the risk manager must ensure that the risk remains within the firm’s established tolerance. Suspending the rollout and implementing automated circuit breakers (kill switches) at the execution level provides a direct, preventative control that mitigates the risk of unauthorized or excessive exposure while the monitoring lag is resolved. This aligns with ERM principles of maintaining control effectiveness during innovation.
Incorrect: Adjusting the risk appetite to accommodate a known control failure is a reactive approach that undermines the integrity of the risk management framework. Re-calibrating VaR models is a market risk measurement technique that does not address the underlying operational failure of reporting latency. Delegating monitoring solely to the front office violates the ‘Three Lines of Defense’ principle, as it removes the independent oversight required for effective risk governance.
Takeaway: Technological innovation requires that control and monitoring capabilities evolve at the same pace as the underlying business activity to prevent operational blind spots in risk oversight.
-
Question 7 of 10
7. Question
A gap analysis conducted at an investment firm regarding Regulatory requirements for cybersecurity as part of incident response concluded that the firm lacks a standardized protocol for determining the materiality of data breaches. Currently, the firm’s policy requires a full forensic audit to be completed before notifying the primary regulator, a process that typically exceeds the 72-hour reporting window mandated by recent financial stability guidelines. The Risk Committee has been tasked with revising the incident response plan to ensure compliance without compromising the accuracy of the information provided. Which of the following actions should the firm prioritize to satisfy these regulatory expectations?
Correct
Correct: Establishing a multi-disciplinary oversight group is the most effective way to ensure regulatory compliance. Cybersecurity is an enterprise risk that requires input from legal, risk management, and IT to determine ‘materiality.’ By defining these thresholds in advance and formalizing an escalation path, the firm can make informed decisions quickly enough to meet the 72-hour notification requirement while ensuring the information is accurate and contextually relevant.
Incorrect: Immediate disclosure of all anomalies is incorrect because it leads to ‘regulatory fatigue’ and ignores the standard requirement that only material incidents be reported. Centralizing decisions in the IT department is incorrect because it creates a siloed approach that ignores the legal and business implications of a breach. Allowing for a 10-day extension for third-party breaches is incorrect as most modern financial regulations do not grant automatic extensions for third-party incidents; the firm is generally held responsible for its entire data ecosystem.
Takeaway: Effective cybersecurity regulatory compliance requires a formalized governance structure and clear materiality definitions to ensure reporting occurs within mandated timeframes.
Incorrect
Correct: Establishing a multi-disciplinary oversight group is the most effective way to ensure regulatory compliance. Cybersecurity is an enterprise risk that requires input from legal, risk management, and IT to determine ‘materiality.’ By defining these thresholds in advance and formalizing an escalation path, the firm can make informed decisions quickly enough to meet the 72-hour notification requirement while ensuring the information is accurate and contextually relevant.
Incorrect: Immediate disclosure of all anomalies is incorrect because it leads to ‘regulatory fatigue’ and ignores the standard requirement that only material incidents be reported. Centralizing decisions in the IT department is incorrect because it creates a siloed approach that ignores the legal and business implications of a breach. Allowing for a 10-day extension for third-party breaches is incorrect as most modern financial regulations do not grant automatic extensions for third-party incidents; the firm is generally held responsible for its entire data ecosystem.
Takeaway: Effective cybersecurity regulatory compliance requires a formalized governance structure and clear materiality definitions to ensure reporting occurs within mandated timeframes.
-
Question 8 of 10
8. Question
Which practical consideration is most relevant when executing Liquidity risk in different markets? A risk manager is evaluating the liquidity profile of a portfolio containing both exchange-traded equities and over-the-counter (OTC) credit default swaps (CDS) during a period of heightened market volatility.
Correct
Correct: In professional risk management, the interaction between market liquidity (the ease of trading an asset) and funding liquidity (the ease of raising cash) is a critical practical consideration. During periods of stress, these two forms of liquidity often deteriorate simultaneously in a ‘liquidity spiral.’ As market liquidity dries up, asset prices fall, leading to higher haircuts and margin calls, which in turn reduces funding liquidity and forces further asset sales, creating a self-reinforcing cycle of illiquidity.
Incorrect: Assuming constant bid-ask spreads is incorrect because spreads are dynamic and typically widen significantly during periods of high volatility as risk premiums increase. Relying solely on historical volume is a common pitfall, as volume can vanish instantly during a crisis, making historical data a poor predictor of ‘stressed’ liquidity. Prioritizing exchange-traded instruments solely because of their trading venue ignores the complexity of liquidity; OTC markets may sometimes remain more resilient for certain institutional sizes, and exchange-traded markets can be subject to trading halts or circuit breakers that eliminate liquidity entirely.
Takeaway: Liquidity risk management must account for the symbiotic relationship between market liquidity and funding liquidity, particularly how they can collapse together during market stress.
Incorrect
Correct: In professional risk management, the interaction between market liquidity (the ease of trading an asset) and funding liquidity (the ease of raising cash) is a critical practical consideration. During periods of stress, these two forms of liquidity often deteriorate simultaneously in a ‘liquidity spiral.’ As market liquidity dries up, asset prices fall, leading to higher haircuts and margin calls, which in turn reduces funding liquidity and forces further asset sales, creating a self-reinforcing cycle of illiquidity.
Incorrect: Assuming constant bid-ask spreads is incorrect because spreads are dynamic and typically widen significantly during periods of high volatility as risk premiums increase. Relying solely on historical volume is a common pitfall, as volume can vanish instantly during a crisis, making historical data a poor predictor of ‘stressed’ liquidity. Prioritizing exchange-traded instruments solely because of their trading venue ignores the complexity of liquidity; OTC markets may sometimes remain more resilient for certain institutional sizes, and exchange-traded markets can be subject to trading halts or circuit breakers that eliminate liquidity entirely.
Takeaway: Liquidity risk management must account for the symbiotic relationship between market liquidity and funding liquidity, particularly how they can collapse together during market stress.
-
Question 9 of 10
9. Question
Which characterization of Regulatory frameworks impacting risk management (e.g., Basel Accords) is most accurate for Professional Risk Manager (PRM)? Under the Basel III framework, how does the introduction of the Net Stable Funding Ratio (NSFR) specifically complement the Liquidity Coverage Ratio (LCR) to enhance the resilience of the banking sector?
Correct
Correct: The Basel III framework introduced two global liquidity standards to ensure banks have sufficient liquidity. The Liquidity Coverage Ratio (LCR) is designed to ensure that a bank has enough high-quality liquid assets (HQLA) to survive a significant stress scenario lasting 30 calendar days. The Net Stable Funding Ratio (NSFR) complements this by promoting resilience over a longer time horizon (one year), ensuring that a bank’s long-term assets are funded with a reliable and stable source of funding, thereby reducing the risk of a funding crisis caused by maturity mismatches.
Incorrect: The second option is incorrect because it swaps the definitions and time horizons of the LCR and NSFR. The third option is incorrect because it describes the Leverage Ratio (a non-risk-based backstop) as the NSFR and mischaracterizes the LCR as a capital requirement for market risk. The fourth option is incorrect because it confuses the NSFR with capital adequacy requirements (Tier 1 capital) and incorrectly describes the LCR as a tool for monitoring interbank lending rates rather than a bank-specific liquidity requirement.
Takeaway: Basel III liquidity risk management relies on a dual approach: the LCR for short-term survival (30 days) and the NSFR for long-term structural funding stability (one year).
Incorrect
Correct: The Basel III framework introduced two global liquidity standards to ensure banks have sufficient liquidity. The Liquidity Coverage Ratio (LCR) is designed to ensure that a bank has enough high-quality liquid assets (HQLA) to survive a significant stress scenario lasting 30 calendar days. The Net Stable Funding Ratio (NSFR) complements this by promoting resilience over a longer time horizon (one year), ensuring that a bank’s long-term assets are funded with a reliable and stable source of funding, thereby reducing the risk of a funding crisis caused by maturity mismatches.
Incorrect: The second option is incorrect because it swaps the definitions and time horizons of the LCR and NSFR. The third option is incorrect because it describes the Leverage Ratio (a non-risk-based backstop) as the NSFR and mischaracterizes the LCR as a capital requirement for market risk. The fourth option is incorrect because it confuses the NSFR with capital adequacy requirements (Tier 1 capital) and incorrectly describes the LCR as a tool for monitoring interbank lending rates rather than a bank-specific liquidity requirement.
Takeaway: Basel III liquidity risk management relies on a dual approach: the LCR for short-term survival (30 days) and the NSFR for long-term structural funding stability (one year).
-
Question 10 of 10
10. Question
You have recently joined a wealth manager as operations manager. Your first major assignment involves Risk measurement and quantification techniques during business continuity, and a control testing result indicates that the firm’s current Value at Risk (VaR) model failed to capture extreme tail events during a recent 48-hour system outage. The Chief Risk Officer is concerned that the existing parametric approach, which assumes a normal distribution of returns, significantly underestimated potential losses when market liquidity vanished during the disruption. You are tasked with recommending a more robust quantification technique to enhance the firm’s resilience framework for future high-impact, low-probability events. Which of the following approaches would most effectively address the limitations of the current model in capturing non-linear risks and extreme market shifts during periods of operational stress?
Correct
Correct: Expected Shortfall (ES) is a coherent risk measure that addresses the tail risk that Value at Risk (VaR) often ignores. Unlike VaR, which only identifies the threshold loss, ES quantifies the average loss that occurs in the tail of the distribution. By using historical simulation rather than a parametric normal distribution, the model can incorporate actual observed market behavior, including fat tails (kurtosis) and skewness, which are critical during periods of extreme stress and business continuity disruptions.
Incorrect: Increasing the confidence level in a parametric model still assumes a normal distribution, which fails to account for the leptokurtic nature of financial returns and will still underestimate tail risk. Relying on historical correlation matrices from a stable period is ineffective because correlations often break down or converge to one during crises. Linear sensitivity analysis (Delta-Normal) is insufficient for capturing non-linear risks associated with complex products and options, which often exhibit gamma and vega risks that become prominent during high volatility.
Takeaway: Expected Shortfall provides a more comprehensive view of tail risk than Value at Risk by quantifying the average loss exceeding a specific threshold, especially when non-normal distributions are present.
Incorrect
Correct: Expected Shortfall (ES) is a coherent risk measure that addresses the tail risk that Value at Risk (VaR) often ignores. Unlike VaR, which only identifies the threshold loss, ES quantifies the average loss that occurs in the tail of the distribution. By using historical simulation rather than a parametric normal distribution, the model can incorporate actual observed market behavior, including fat tails (kurtosis) and skewness, which are critical during periods of extreme stress and business continuity disruptions.
Incorrect: Increasing the confidence level in a parametric model still assumes a normal distribution, which fails to account for the leptokurtic nature of financial returns and will still underestimate tail risk. Relying on historical correlation matrices from a stable period is ineffective because correlations often break down or converge to one during crises. Linear sensitivity analysis (Delta-Normal) is insufficient for capturing non-linear risks associated with complex products and options, which often exhibit gamma and vega risks that become prominent during high volatility.
Takeaway: Expected Shortfall provides a more comprehensive view of tail risk than Value at Risk by quantifying the average loss exceeding a specific threshold, especially when non-normal distributions are present.