Quiz-summary
0 of 10 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
Information
Premium Practice Questions
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 10 questions answered correctly
Your time:
Time has elapsed
Categories
- Not categorized 0%
Unlock Your Full Report
You missed {missed_count} questions. Enter your email to see exactly which ones you got wrong and read the detailed explanations.
Submit to instantly unlock detailed explanations for every question.
Success! Your results are now unlocked. You can see the correct answers and detailed explanations below.
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- Answered
- Review
-
Question 1 of 10
1. Question
Your team is drafting a policy on Regulatory Capital for Market Risk as part of outsourcing for a fund administrator. A key unresolved point is the classification of financial instruments to ensure compliance with the Fundamental Review of the Trading Book (FRTB) standards. The administrator currently manages a portfolio of credit-linked notes and equity derivatives with a 90-day investment horizon. To prevent regulatory arbitrage and ensure capital adequacy, the policy must define the specific conditions under which an instrument is assigned to the trading book rather than the banking book. Which of the following criteria is most consistent with the revised Basel framework for determining the boundary between the trading book and the banking book?
Correct
Correct: Under the Fundamental Review of the Trading Book (FRTB) framework established by the Basel Committee, the boundary between the trading book and the banking book is strictly defined. Instruments must be assigned to the trading book if they are held with trading intent (e.g., for short-term resale or to profit from price movements) or to hedge other positions in the trading book. This intent is validated by active management and the ability to value the instrument daily at market or model prices.
Incorrect: Option b is incorrect because the Basel framework does not use a specific 60-day holding period as a hard cutoff for reclassification; intent and liquidity are the primary drivers. Option c is incorrect because many instruments in the trading book, such as credit-linked notes, carry significant credit risk; the type of risk does not dictate the book assignment as much as the management intent does. Option d is incorrect because while structural interest rate risk is a banking book concern, the derivatives used to hedge it are subject to specific internal risk transfer (IRT) rules and are not automatically exempt from market risk capital requirements.
Takeaway: The regulatory boundary between the trading and banking books is primarily determined by the documented intent to trade and the requirement for daily fair value measurement.
Incorrect
Correct: Under the Fundamental Review of the Trading Book (FRTB) framework established by the Basel Committee, the boundary between the trading book and the banking book is strictly defined. Instruments must be assigned to the trading book if they are held with trading intent (e.g., for short-term resale or to profit from price movements) or to hedge other positions in the trading book. This intent is validated by active management and the ability to value the instrument daily at market or model prices.
Incorrect: Option b is incorrect because the Basel framework does not use a specific 60-day holding period as a hard cutoff for reclassification; intent and liquidity are the primary drivers. Option c is incorrect because many instruments in the trading book, such as credit-linked notes, carry significant credit risk; the type of risk does not dictate the book assignment as much as the management intent does. Option d is incorrect because while structural interest rate risk is a banking book concern, the derivatives used to hedge it are subject to specific internal risk transfer (IRT) rules and are not automatically exempt from market risk capital requirements.
Takeaway: The regulatory boundary between the trading and banking books is primarily determined by the documented intent to trade and the requirement for daily fair value measurement.
-
Question 2 of 10
2. Question
The operations team at a fintech lender has encountered an exception involving Ethical Culture and Tone at the Top during gifts and entertainment. They report that several senior vice presidents have been attending high-value sporting events in luxury suites hosted by a software vendor whose contract is currently up for a competitive renewal. Although the corporate ethics policy mandates a 100 USD limit on individual gifts, these executives have classified the events as ‘strategic relationship building’ to circumvent the standard reporting and approval workflow. Given the potential impact on the organization’s integrity and the upcoming procurement decision, what is the most appropriate primary action for the internal auditor to take?
Correct
Correct: The internal auditor’s primary responsibility regarding ‘Tone at the Top’ is to assess whether the actions of senior management align with the organization’s stated values and ethical policies. When executives use loopholes to bypass controls, it signals a weak ethical culture. Reporting this systemic issue to the audit committee is essential because it involves a breakdown in governance and oversight that cannot be resolved simply by adjusting lower-level procedures.
Incorrect: Updating the procurement policy is a valid secondary control but fails to address the root cause, which is the executive circumvention of existing ethical standards. Implementing a secondary tracking system for exceptions essentially formalizes the bypass of the ethics policy rather than correcting the behavior. Benchmarking against industry peers is irrelevant because an industry-wide practice of high-value gifts does not justify a violation of the organization’s own internal code of conduct or the potential conflict of interest during a contract renewal.
Takeaway: Internal auditors must look beyond individual policy violations to assess whether executive behavior aligns with the organization’s ethical framework and report governance failures directly to the board or audit committee.
Incorrect
Correct: The internal auditor’s primary responsibility regarding ‘Tone at the Top’ is to assess whether the actions of senior management align with the organization’s stated values and ethical policies. When executives use loopholes to bypass controls, it signals a weak ethical culture. Reporting this systemic issue to the audit committee is essential because it involves a breakdown in governance and oversight that cannot be resolved simply by adjusting lower-level procedures.
Incorrect: Updating the procurement policy is a valid secondary control but fails to address the root cause, which is the executive circumvention of existing ethical standards. Implementing a secondary tracking system for exceptions essentially formalizes the bypass of the ethics policy rather than correcting the behavior. Benchmarking against industry peers is irrelevant because an industry-wide practice of high-value gifts does not justify a violation of the organization’s own internal code of conduct or the potential conflict of interest during a contract renewal.
Takeaway: Internal auditors must look beyond individual policy violations to assess whether executive behavior aligns with the organization’s ethical framework and report governance failures directly to the board or audit committee.
-
Question 3 of 10
3. Question
When evaluating options for Customer Due Diligence (CDD) and Enhanced Due Diligence (EDD), what criteria should take precedence? An internal auditor is reviewing the anti-money laundering (AML) framework of a multinational commercial bank that has recently expanded its private banking operations into several emerging markets. The auditor notes that the bank is onboarding several high-net-worth individuals who are classified as Politically Exposed Persons (PEPs). In this context, which factor is most critical for the auditor to verify regarding the bank’s application of due diligence procedures?
Correct
Correct: According to international standards such as those from the Financial Action Task Force (FATF) and local regulations like the Bank Secrecy Act, a risk-based approach is mandatory. For high-risk customers such as PEPs, Enhanced Due Diligence (EDD) must be performed. This requires going beyond standard identification to understand the customer’s risk profile, which specifically includes verifying the source of wealth and source of funds to ensure they are not derived from corruption or criminal activity.
Incorrect: Focusing on revenue or strategic importance is a violation of compliance principles as it prioritizes profit over regulatory risk. Standardizing documentation across all segments is inappropriate because EDD requires more intensive information gathering than standard CDD. Relying on a lack of prior SARs is insufficient because the absence of past reports does not mitigate the inherent risks posed by a customer’s current profile or the need for proactive verification in a new relationship.
Takeaway: The core of an effective AML program is a risk-based approach where the intensity of due diligence is directly proportional to the risk posed by the customer’s profile, business, and geography.
Incorrect
Correct: According to international standards such as those from the Financial Action Task Force (FATF) and local regulations like the Bank Secrecy Act, a risk-based approach is mandatory. For high-risk customers such as PEPs, Enhanced Due Diligence (EDD) must be performed. This requires going beyond standard identification to understand the customer’s risk profile, which specifically includes verifying the source of wealth and source of funds to ensure they are not derived from corruption or criminal activity.
Incorrect: Focusing on revenue or strategic importance is a violation of compliance principles as it prioritizes profit over regulatory risk. Standardizing documentation across all segments is inappropriate because EDD requires more intensive information gathering than standard CDD. Relying on a lack of prior SARs is insufficient because the absence of past reports does not mitigate the inherent risks posed by a customer’s current profile or the need for proactive verification in a new relationship.
Takeaway: The core of an effective AML program is a risk-based approach where the intensity of due diligence is directly proportional to the risk posed by the customer’s profile, business, and geography.
-
Question 4 of 10
4. Question
During a routine supervisory engagement with a listed company, the authority asks about Physical Security Controls in the context of regulatory inspection. They observe that while the commercial bank has implemented biometric access for its primary data center, there is no documented evidence of a periodic review of access rights for third-party maintenance contractors who were granted temporary badges during the last fiscal quarter. The internal audit team is evaluating the risk of unauthorized physical access resulting from these legacy permissions. Which of the following audit procedures would provide the most reliable evidence regarding the effectiveness of the bank’s physical access management for these contractors?
Correct
Correct: Reconciling physical access logs with work orders and termination lists is a substantive test that provides direct evidence of whether access rights are aligned with current business needs. This procedure identifies ‘orphan’ accounts or badges that remain active after a contractor’s assignment has ended, which is the specific risk identified in the scenario.
Incorrect: Reviewing the security policy only confirms that a control framework exists but does not verify if the controls are operating effectively in practice. Interviewing the facility manager provides testimonial evidence, which is considered less reliable than documentary evidence and does not prove that the automated expiration is actually functioning. Inspecting the hardware of biometric scanners ensures the devices are operational but does not address the administrative control failure regarding who is authorized to use the system.
Takeaway: Internal auditors must use substantive reconciliation of access records against authoritative source documents to verify that physical security permissions are restricted to authorized personnel with a current business justification.
Incorrect
Correct: Reconciling physical access logs with work orders and termination lists is a substantive test that provides direct evidence of whether access rights are aligned with current business needs. This procedure identifies ‘orphan’ accounts or badges that remain active after a contractor’s assignment has ended, which is the specific risk identified in the scenario.
Incorrect: Reviewing the security policy only confirms that a control framework exists but does not verify if the controls are operating effectively in practice. Interviewing the facility manager provides testimonial evidence, which is considered less reliable than documentary evidence and does not prove that the automated expiration is actually functioning. Inspecting the hardware of biometric scanners ensures the devices are operational but does not address the administrative control failure regarding who is authorized to use the system.
Takeaway: Internal auditors must use substantive reconciliation of access records against authoritative source documents to verify that physical security permissions are restricted to authorized personnel with a current business justification.
-
Question 5 of 10
5. Question
During a committee meeting at a broker-dealer, a question arises about Database Security as part of data protection. The discussion reveals that while the firm utilizes robust perimeter defenses, a recent internal audit finding highlighted that database administrators (DBAs) currently possess unrestricted visibility into clear-text customer Social Security numbers and account balances to perform routine maintenance. With a regulatory examination scheduled in 6 months, the Chief Compliance Officer is concerned about meeting data privacy requirements under the Gramm-Leach-Bliley Act (GLBA) and SEC Regulation S-P. Which of the following represents the most effective control to mitigate the risk of unauthorized data exposure by these privileged users without disrupting their ability to manage the database infrastructure?
Correct
Correct: Dynamic data masking (DDM) is a highly effective control for privileged users because it limits the data’s visibility in real-time based on the user’s role, ensuring DBAs can perform structural maintenance without seeing sensitive PII. When combined with Database Activity Monitoring (DAM), the firm gains an audit trail of all administrative actions, which directly addresses the requirements of Regulation S-P and GLBA regarding the protection of non-public personal information.
Incorrect: Requiring a supervisor to approve every single SQL command is operationally unsustainable in a complex financial services environment and would lead to significant delays in routine maintenance. Full-disk encryption protects data from physical theft of the hardware but does not prevent a DBA with valid system credentials from viewing the data once the system is running. Air-gapping sensitive data is impractical for a modern broker-dealer that requires high-speed data availability for trading, reporting, and customer service functions.
Takeaway: To protect sensitive data from privileged user risk, financial institutions should employ technical controls like dynamic data masking and activity monitoring that enforce the principle of least privilege at the data layer.
Incorrect
Correct: Dynamic data masking (DDM) is a highly effective control for privileged users because it limits the data’s visibility in real-time based on the user’s role, ensuring DBAs can perform structural maintenance without seeing sensitive PII. When combined with Database Activity Monitoring (DAM), the firm gains an audit trail of all administrative actions, which directly addresses the requirements of Regulation S-P and GLBA regarding the protection of non-public personal information.
Incorrect: Requiring a supervisor to approve every single SQL command is operationally unsustainable in a complex financial services environment and would lead to significant delays in routine maintenance. Full-disk encryption protects data from physical theft of the hardware but does not prevent a DBA with valid system credentials from viewing the data once the system is running. Air-gapping sensitive data is impractical for a modern broker-dealer that requires high-speed data availability for trading, reporting, and customer service functions.
Takeaway: To protect sensitive data from privileged user risk, financial institutions should employ technical controls like dynamic data masking and activity monitoring that enforce the principle of least privilege at the data layer.
-
Question 6 of 10
6. Question
During a periodic assessment of IT Audit of Vendor Management (IT specific) as part of record-keeping at an insurer, auditors observed that the organization’s vendor risk management framework focuses exclusively on direct contractual relationships. For a critical SaaS provider hosting the insurer’s actuarial models, the auditors noted that the provider utilizes a secondary sub-service organization for data encryption services. No due diligence had been performed on this sub-service organization’s control environment within the last 24 months. Which of the following is the most appropriate recommendation to address the risk assessment gap?
Correct
Correct: In the financial services sector, effective IT vendor management requires assessing the entire supply chain, often referred to as Nth-party risk. Since the insurer does not have a direct contract with the sub-service provider, they must evaluate the primary vendor’s vendor management program. This is typically achieved by reviewing System and Organization Controls (SOC) reports. The auditor should determine if the primary vendor uses the ‘carve-out’ method (excluding the sub-service provider’s controls) or the ‘inclusive’ method, and verify that the primary vendor is monitoring those sub-service providers effectively to ensure the insurer’s data remains protected.
Incorrect: Requiring a performance bond is a risk transfer mechanism that addresses financial indemnity but fails to mitigate the underlying operational, regulatory, or data integrity risks. Performing independent on-site penetration tests on a fourth party is generally not feasible because the insurer lacks a ‘right to audit’ clause with an entity they have no direct contract with. Prohibiting the use of sub-service providers for high-criticality functions is an overly restrictive and impractical approach in modern cloud-based ecosystems, where almost all SaaS providers rely on underlying infrastructure or specialized security sub-contractors.
Takeaway: Internal auditors must ensure that vendor risk assessments extend to critical fourth-party dependencies by evaluating the primary vendor’s own third-party risk management effectiveness.
Incorrect
Correct: In the financial services sector, effective IT vendor management requires assessing the entire supply chain, often referred to as Nth-party risk. Since the insurer does not have a direct contract with the sub-service provider, they must evaluate the primary vendor’s vendor management program. This is typically achieved by reviewing System and Organization Controls (SOC) reports. The auditor should determine if the primary vendor uses the ‘carve-out’ method (excluding the sub-service provider’s controls) or the ‘inclusive’ method, and verify that the primary vendor is monitoring those sub-service providers effectively to ensure the insurer’s data remains protected.
Incorrect: Requiring a performance bond is a risk transfer mechanism that addresses financial indemnity but fails to mitigate the underlying operational, regulatory, or data integrity risks. Performing independent on-site penetration tests on a fourth party is generally not feasible because the insurer lacks a ‘right to audit’ clause with an entity they have no direct contract with. Prohibiting the use of sub-service providers for high-criticality functions is an overly restrictive and impractical approach in modern cloud-based ecosystems, where almost all SaaS providers rely on underlying infrastructure or specialized security sub-contractors.
Takeaway: Internal auditors must ensure that vendor risk assessments extend to critical fourth-party dependencies by evaluating the primary vendor’s own third-party risk management effectiveness.
-
Question 7 of 10
7. Question
When operationalizing Internal Controls to Prevent and Detect Fraud, what is the recommended method for an internal auditor to evaluate the effectiveness of a commercial bank’s anti-fraud framework in a high-volume transaction environment?
Correct
Correct: A multi-layered approach, often referred to as defense-in-depth, is the industry standard for fraud prevention and detection. Automated monitoring provides the technical capability to identify suspicious patterns in real-time, while administrative controls like mandatory job rotation are critical for uncovering internal collusion or concealment. A whistleblower mechanism (confidential reporting) is consistently cited by organizations like the ACFE as the most effective way to detect fraud that bypasses technical controls.
Incorrect: Relying on external audits is insufficient because they are periodic and not specifically designed to detect fraud. Centralizing fraud detection in IT ignores the human element and operational processes where fraud often originates. Focusing only on high-value transactions above regulatory thresholds is a common mistake, as it fails to detect ‘salami slicing’ techniques or smaller, frequent fraudulent activities designed to stay under the radar.
Takeaway: Effective fraud management requires a holistic integration of automated technical monitoring, rigorous administrative policies, and accessible reporting channels to address both internal and external threats.
Incorrect
Correct: A multi-layered approach, often referred to as defense-in-depth, is the industry standard for fraud prevention and detection. Automated monitoring provides the technical capability to identify suspicious patterns in real-time, while administrative controls like mandatory job rotation are critical for uncovering internal collusion or concealment. A whistleblower mechanism (confidential reporting) is consistently cited by organizations like the ACFE as the most effective way to detect fraud that bypasses technical controls.
Incorrect: Relying on external audits is insufficient because they are periodic and not specifically designed to detect fraud. Centralizing fraud detection in IT ignores the human element and operational processes where fraud often originates. Focusing only on high-value transactions above regulatory thresholds is a common mistake, as it fails to detect ‘salami slicing’ techniques or smaller, frequent fraudulent activities designed to stay under the radar.
Takeaway: Effective fraud management requires a holistic integration of automated technical monitoring, rigorous administrative policies, and accessible reporting channels to address both internal and external threats.
-
Question 8 of 10
8. Question
The monitoring system at a listed company has flagged an anomaly related to Sanctions Screening and Compliance during onboarding. Investigation reveals that a high-net-worth individual, identified as a 25% beneficial owner of a new corporate entity, triggered a potential match against the Office of Foreign Assets Control (OFAC) Specially Designated Nationals (SDN) list. The compliance officer dismissed the alert within the required 48-hour window, citing a discrepancy in the date of birth. However, the internal auditor notes that the screening software’s fuzzy matching logic was manually overridden for this specific case without a secondary independent review or documented justification of the source data used for the birth date verification. Which of the following represents the most significant control weakness in this process?
Correct
Correct: In high-risk compliance environments, manual overrides of automated system flags represent a significant point of failure. Without a ‘four-eyes’ principle or an independent quality assurance (QA) function to validate the rationale for dismissing a potential sanctions match, the institution is exposed to significant regulatory and reputational risk. A single individual could inadvertently or intentionally bypass critical controls, making independent verification the most critical control for ensuring the integrity of the sanctions screening process.
Incorrect: Configuring the system for 100% exact matches is incorrect because it would fail to identify sanctioned individuals using aliases or slight spelling variations, which fuzzy matching is designed to catch. While a 48-hour SLA might create time pressure, it is a standard operational metric; the lack of oversight on the decision-making process is the more fundamental control gap. Using secondary identifiers like date of birth is a standard and necessary industry practice for clearing false positives, but the weakness lies in the lack of independent validation of how that data was applied to override the system flag.
Takeaway: Effective sanctions compliance requires independent verification or dual-authorization for manual overrides of automated screening alerts to prevent the unauthorized or erroneous clearance of high-risk entities.
Incorrect
Correct: In high-risk compliance environments, manual overrides of automated system flags represent a significant point of failure. Without a ‘four-eyes’ principle or an independent quality assurance (QA) function to validate the rationale for dismissing a potential sanctions match, the institution is exposed to significant regulatory and reputational risk. A single individual could inadvertently or intentionally bypass critical controls, making independent verification the most critical control for ensuring the integrity of the sanctions screening process.
Incorrect: Configuring the system for 100% exact matches is incorrect because it would fail to identify sanctioned individuals using aliases or slight spelling variations, which fuzzy matching is designed to catch. While a 48-hour SLA might create time pressure, it is a standard operational metric; the lack of oversight on the decision-making process is the more fundamental control gap. Using secondary identifiers like date of birth is a standard and necessary industry practice for clearing false positives, but the weakness lies in the lack of independent validation of how that data was applied to override the system flag.
Takeaway: Effective sanctions compliance requires independent verification or dual-authorization for manual overrides of automated screening alerts to prevent the unauthorized or erroneous clearance of high-risk entities.
-
Question 9 of 10
9. Question
A stakeholder message lands in your inbox: A team is about to make a decision about Data Analytics for Fraud Detection as part of regulatory inspection at a payment services provider, and the message indicates that the current rule-based system is generating an unmanageable volume of false positives, leading to significant delays in investigating suspicious activity reports (SARs). The Chief Risk Officer is proposing a transition to a machine learning-based anomaly detection system to better identify complex patterns of money laundering and account takeover fraud. As the internal auditor, what is the most critical factor you should evaluate regarding this transition to ensure it meets regulatory expectations for model risk management?
Correct
Correct: In the financial services sector, regulatory bodies (such as the OCC and the Federal Reserve under SR 11-7) emphasize model risk management. When moving from simple rules to complex machine learning, the ‘black box’ nature of advanced analytics poses a risk. An auditor must ensure the model is explainable so that the institution can justify why a specific transaction was flagged or not flagged, which is essential for filing accurate Suspicious Activity Reports (SARs) and maintaining compliance with AML/KYC regulations.
Incorrect: Focusing on headcount reduction is an operational efficiency goal rather than a risk management or regulatory compliance priority. While processing speed is important for customer experience, it does not address the fundamental risk of model accuracy or regulatory transparency. Relying on a vendor’s performance in unrelated industries is insufficient because fraud patterns and regulatory requirements in financial services are unique and highly specific.
Takeaway: Internal auditors must prioritize model transparency and explainability in fraud detection analytics to satisfy regulatory requirements for suspicious activity reporting and model risk management.
Incorrect
Correct: In the financial services sector, regulatory bodies (such as the OCC and the Federal Reserve under SR 11-7) emphasize model risk management. When moving from simple rules to complex machine learning, the ‘black box’ nature of advanced analytics poses a risk. An auditor must ensure the model is explainable so that the institution can justify why a specific transaction was flagged or not flagged, which is essential for filing accurate Suspicious Activity Reports (SARs) and maintaining compliance with AML/KYC regulations.
Incorrect: Focusing on headcount reduction is an operational efficiency goal rather than a risk management or regulatory compliance priority. While processing speed is important for customer experience, it does not address the fundamental risk of model accuracy or regulatory transparency. Relying on a vendor’s performance in unrelated industries is insufficient because fraud patterns and regulatory requirements in financial services are unique and highly specific.
Takeaway: Internal auditors must prioritize model transparency and explainability in fraud detection analytics to satisfy regulatory requirements for suspicious activity reporting and model risk management.
-
Question 10 of 10
10. Question
A regulatory inspection at an investment firm focuses on Cybersecurity Controls (Access Controls, Encryption, Intrusion Detection) in the context of data protection. The examiner notes that the firm’s primary database, which houses sensitive client investment portfolios, utilizes AES-256 encryption for data at rest. However, during a walkthrough, the internal auditor discovers that the decryption keys are stored in a plain-text configuration file on the same application server to minimize latency during high-volume trading periods. Furthermore, the IT department has not tuned the Intrusion Detection System (IDS) in 12 months, resulting in a high rate of false positives. Which of the following should the internal auditor identify as the most critical control deficiency regarding the protection of client data?
Correct
Correct: Storing decryption keys on the same server as the encrypted data is a critical vulnerability because it violates the principle of separation of duties and secure key management. If an attacker gains unauthorized access to the server, they have access to both the encrypted data and the means to decrypt it, effectively rendering the encryption useless. In a financial services context, this represents a failure to protect the confidentiality of sensitive client information.
Incorrect: Failing to tune the IDS (option_b) is a significant operational issue that leads to alert fatigue and may cause security personnel to overlook genuine threats, but it is secondary to the immediate exposure of encrypted data. Using a single encryption standard like AES-256 (option_c) is generally considered an industry best practice and is not a deficiency. While hardware-based encryption modules (option_d) provide higher security, the use of application-level encryption is a common and acceptable practice; the critical failure in this scenario is the improper storage of the keys, not the level at which encryption occurs.
Takeaway: Effective data encryption requires the secure and separate management of encryption keys to ensure that a compromise of the storage environment does not lead to a compromise of the data.
Incorrect
Correct: Storing decryption keys on the same server as the encrypted data is a critical vulnerability because it violates the principle of separation of duties and secure key management. If an attacker gains unauthorized access to the server, they have access to both the encrypted data and the means to decrypt it, effectively rendering the encryption useless. In a financial services context, this represents a failure to protect the confidentiality of sensitive client information.
Incorrect: Failing to tune the IDS (option_b) is a significant operational issue that leads to alert fatigue and may cause security personnel to overlook genuine threats, but it is secondary to the immediate exposure of encrypted data. Using a single encryption standard like AES-256 (option_c) is generally considered an industry best practice and is not a deficiency. While hardware-based encryption modules (option_d) provide higher security, the use of application-level encryption is a common and acceptable practice; the critical failure in this scenario is the improper storage of the keys, not the level at which encryption occurs.
Takeaway: Effective data encryption requires the secure and separate management of encryption keys to ensure that a compromise of the storage environment does not lead to a compromise of the data.