Which of the following approaches would BEST help to identify relevant risk scenarios?
Which of the following would BEST prevent an unscheduled application of a patch?
Recent penetration testing of an organization ' s software has identified many different types of security risks. Which of the following is the MOST likely root cause for the identified risk?
Which of the following is MOST important to understand when developing key risk indicators (KRIs)?
An application runs a scheduled job that compiles financial data from multiple business systems and updates the financial reporting system. If this job runs too long, it can delay financial reporting. Which of the following is the risk practitioner ' s BEST recommendation?
Which of the following is the MOST important consideration when sharing risk management updates with executive management?
A risk practitioner ' s BEST guidance to help an organization develop relevant risk scenarios is to ensure the scenarios are:
Which of the following is MOST important for the organization to consider before implementing a new in-house developed artificial intelligence (Al) solution?
Which of the following practices BEST mitigates risk related to enterprise-wide ethical decision making in a multi-national organization?
Which of the following should be the PRIMARY concern when changes to firewall rules do not follow change management requirements?
Which of the following BEST assists in justifying an investment in automated controls?
A business unit has implemented robotic process automation (RPA) for its
repetitive back-office tasks. Which of the following should be the risk
practitioner ' s GREATEST concern?
Which of the following is the BEST indication that key risk indicators (KRls) should be revised?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of an anti-virus program?
Several newly identified risk scenarios are being integrated into an organization ' s risk register. The MOST appropriate risk owner would be the individual who:
Which of the following is MOST important for an organization to consider when developing its IT strategy?
Which of the following would be a weakness in procedures for controlling the migration of changes to production libraries?
A risk practitioner discovers that an IT operations team manager bypassed web filtering controls by using a mobile device, in violation of the network security policy. Which of the following should the risk practitioner do FIRST?
Which of the following is the MOST important concern when assigning multiple risk owners for an identified risk?
A root because analysis indicates a major service disruption due to a lack of competency of newly hired IT system administrators Who should be accountable for resolving the situation?
The GREATEST benefit of introducing continuous monitoring to an IT control environment is that it:
Which of the following is the MOST important document regarding the treatment of sensitive data?
Which of the following should be of GREATEST concern when reviewing the results of an independent control assessment to determine the effectiveness of a vendor ' s control environment?
The MOST important characteristic of an organization s policies is to reflect the organization ' s:
Which of the following should be of MOST concern to a risk practitioner reviewing the system development life cycle (SDLC)?
A risk practitioner has established that a particular control is working as desired, but the annual cost of maintenance has increased and now exceeds the expected annual loss exposure. The result is that the control is:
Which of the following is a risk practitioner ' s MOST important action to reduce the likelihood of internal fraud?
Which of the following is the BEST control to detect an advanced persistent threat (APT)?
Which of the following is the MOST important requirement when implementing a data loss prevention (DLP) system?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
When establishing leading indicators for the information security incident response process it is MOST important to consider the percentage of reported incidents:
Which of the following should be the PRIMARY recipient of reports showing the
progress of a current IT risk mitigation project?
Warning banners on login screens for laptops provided by an organization to its employees are an example of which type of control?
An organization has outsourced its ERP application to an external SaaS provider. Which of the following provides the MOST useful information to identify risk scenarios involving data loss?
Which of the following will BEST help mitigate the risk associated with malicious functionality in outsourced application development?
When defining thresholds for control key performance indicators (KPIs). it is MOST helpful to align:
Which of the following is the BEST key control indicator (KCI) for a vulnerability management program?
Which of the following is the MOST important risk management activity during project initiation?
When of the following is the BEST key control indicator (KCI) to determine the effectiveness of en intrusion prevention system (IPS)?
A robotic process automation (RPA) project has implemented new robots to enhance the efficiency of a sales business process. Which of the following provides the BEST evidence that the new controls have been implemented successfully?
Which of the following is the MOST important characteristic of an effective risk management program?
Which of the following is BEST used to aggregate data from multiple systems to identify abnormal behavior?
Legal and regulatory risk associated with business conducted over the Internet is driven by:
An organization ' s senior management is considering whether to acquire cyber insurance. Which of the following is the BEST way for the risk practitioner to enable management’s decision?
A review of an organization s controls has determined its data loss prevention {DLP) system is currently failing to detect outgoing emails containing credit card data. Which of the following would be MOST impacted?
The analysis of which of the following will BEST help validate whether suspicious network activity is malicious?
Following the identification of a risk associated with a major organizational change, which of the following is MOST important to update in the IT risk register?
Which of the following is the BEST way to determine whether system settings are in alignment with control baselines?
IT stakeholders have asked a risk practitioner for IT risk profile reports associated with specific departments to allocate resources for risk mitigation. The BEST way to address this request would be to use:
Which of the following is the BEST way to reduce the likelihood of an individual performing a potentially harmful action as the result of unnecessary entitlement?
An organization has identified the need to implement an asset tiering model to establish the appropriate level of impact. Which of the following is the MOST effective risk assessment methodology for a risk practitioner to use for this initiative?
Which of the following is the MOST critical element to maximize the potential for a successful security implementation?
Which of the following indicators measures the performance of IT configuration management?
An organization ' s chief information officer (CIO) has proposed investing in a new. untested technology to take advantage of being first to market Senior management has concerns about the success of the project and has set a limit for expenditures before final approval. This conditional approval indicates the organization ' s risk:
Which of the following is the BEST approach for selecting controls to minimize risk?
Which of the following would be the BEST key performance indicator (KPI) for monitoring the effectiveness of the IT asset management process?
Which of the following should be considered FIRST when managing a risk event related to theft and disclosure of customer information?
A risk practitioner has been asked by executives to explain how existing risk treatment plans would affect risk posture at the end of the year. Which of the following is MOST helpful in responding to this request?
Which of the following would be MOST effective in monitoring changes in an organization ' s IT risk environment?
Which of the following is MOST important to add to the risk register for a remediated risk scenario?
Which of the following is the PRIMARY reason for sharing risk assessment reports with senior stakeholders?
Which of the following is MOST helpful to review when identifying risk scenarios associated with the adoption of Internet of Things (loT) technology in an organization?
An organization wants to transfer risk by purchasing cyber insurance. Which of the following would be MOST important for the risk practitioner to communicate to senior management for contract negotiation purposes?
Which of the following will BEST ensure that controls adequately support business goals and objectives?
An organization has outsourced its billing function to an external service provider. Who should own the risk of customer data leakage caused by the service provider?
After the implementation of a remediation plan, an assessment of associated control design and operating effectiveness can determine the level of:
Whether the results of risk analyses should be presented in quantitative or qualitative terms should be based PRIMARILY on the:
A chief risk officer (CRO) has asked to have the IT risk register integrated into the enterprise risk management (ERM) process. Which of the following will BEST facilitate the reporting of IT risk at the enterprise level?
An organization ' s risk profile indicates that residual risk levels have fallen significantly below management ' s risk appetite. Which of the following is the BEST course of action?
An organization has received notification that it is a potential victim of a cybercrime that may have compromised sensitive customer data. What should be The FIRST course of action?
After identifying new risk events during a project, the project manager s NEXT step should be to:
Print jobs containing confidential information are sent to a shared network printer located in a secure room. Which of the following is the BEST control to prevent the inappropriate disclosure of confidential information?
Which of the following is MOST essential for an effective change control environment?
Which of the following is the PRIMARY reason to use administrative controls in conjunction with technical controls?
A key risk indicator (KRI) that incorporates data from external open-source threat intelligence sources has shown changes in risk trend data. Which of the following is MOST important to update in the risk register?
An audit reveals that there are changes in the environment that are not reflected in the risk profile. Which of the following is the BEST course of action?
Of the following, who should be responsible for determining the inherent risk rating of an application?
Which of the following is the PRIMARY objective of the three lines model for risk management?
Which of the following BEST represents a critical threshold value for a key control indicator (KCI)?
Which of the following should be an element of the risk appetite of an organization?
Which of the following requirements is MOST important to include in an outsourcing contract to help ensure sensitive data stored with a service provider is secure?
A risk practitioner has been notified of a social engineering attack using artificial intelligence (AI) technology to impersonate senior management personnel. Which of the following would BEST mitigate the impact of such attacks?
Which of the following provides the MOST useful information when measuring the progress of risk response action plans?
Which of the following risk register updates is MOST important for senior management to review?
Which of the following should be the PRIMARY consideration when identifying and assigning ownership of IT-related risk?
A risk practitioner shares the results of a vulnerability assessment for a critical business application with the business manager. Which of the following is the NEXT step?
A new risk practitioner finds that decisions for implementing risk response plans are not being made. Which of the following would MOST likely explain this situation?
The PRIMARY reason for tracking the status of risk mitigation plans is to ensure:
Which of the following is the BEST approach for performing a business impact analysis (BIA) of a supply-chain management application?
Which of the following would BEST help an enterprise prioritize risk scenarios?
Which of the following is the MOST appropriate action when a tolerance threshold is exceeded?
Which of the following is the BEST way to address a board ' s concern about the organization ' s current cybersecurity posture?
Which of the following is the MOST important reason to communicate risk assessments to senior management?
Which of the following BEST prevents unauthorized access to customer personal data transmitted to third-party service providers?
During a control review, the control owner states that an existing control has deteriorated over time. What is the BEST recommendation to the control owner?
Which of the following is the MOST important course of action to foster an ethical, risk-aware culture?
A PRIMARY function of the risk register is to provide supporting information for the development of an organization ' s risk:
If preventive controls cannot be Implemented due to technology limitations, which of the following should be done FIRST to reduce risk7
Which of the following BEST facilities the alignment of IT risk management with enterprise risk management (ERM)?
During a data loss incident, which role in the RACI chart would be aligned to the risk practitioner?
Which of the following provides the BEST evidence that robust risk management practices are in place within an organization?
An organization has just implemented changes to close an identified vulnerability that impacted a critical business process. What should be the NEXT course of action?
Which of the following is the PRIMARY purpose of conducting risk and control self-assessments?
An organization is implementing encryption for data at rest to reduce the risk associated with unauthorized access. Which of the following MUST be considered to assess the residual risk?
In addition to the risk exposure, which of the following is MOST important for senior management to understand prior to approving the use of artificial intelligence (Al) solutions?
Which of the following is the MOST comprehensive resource for prioritizing the implementation of information systems controls?
Which of the following activities would BEST contribute to promoting an organization-wide risk-aware culture?
Which of the following is the MOST appropriate key risk indicator (KRI) for backup media that is recycled monthly?
Which of the following is the PRIMARY advantage of having a single integrated business continuity plan (BCP) rather than each business unit developing its own BCP?
Which of the following is the MOST important benefit of implementing a data classification program?
The BEST key performance indicator (KPI) to measure the effectiveness of the security patching process is the percentage of patches installed:
An organization is reviewing a contract for a Software as a Service (SaaS) sales application with a 99.9% uptime service level agreement (SLA). Which of the following BEST describes ownership of availability risk?
Which of the following BEST supports the communication of risk assessment results to stakeholders?
A risk practitioner is organizing a training session lo communicate risk assessment methodologies to ensure a consistent risk view within the organization Which of the following i < the MOST important topic to cover in this training?
Which of the following risk scenarios would be the GREATEST concern as a result of a single sign-on implementation?
A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?
An IT department has organized training sessions to improve user awareness of organizational information security policies. Which of the following is the BEST key performance indicator (KPI) to reflect effectiveness of the training?
An organization’s expense claim system allows users to split large transactions into smaller ones to bypass limits. What should the risk practitioner do?
Which of the following should an organization perform to forecast the effects of a disaster?
Which of the following provides The BEST information when determining whether to accept residual risk of a critical system to be implemented?
An organization is participating in an industry benchmarking study that involves providing customer transaction records for analysis Which of the following is the MOST important control to ensure the privacy of customer information?
A department has been granted an exception to bypass the existing approval process for purchase orders. The risk practitioner should verify the exception has been approved by which of the following?
Which of the following would BEST indicate to senior management that IT processes are improving?
Which of the following risk activities is BEST facilitated by enterprise architecture (EA)?
When developing a risk awareness training program, which of the following is the BEST way to promote a risk-aware culture?
Which of the following is MOST important to consider when determining a recovery time objective (RTO)?
Which of the following is the BEST way to mitigate the risk associated with fraudulent use of an enterprise ' s brand on Internet sites?
What is the BEST course of action when the business impact of a risk event is rated high, but the likelihood of risk materialization has decreased?
Which of the following would BEST help an enterprise define and communicate its risk appetite?
Which of the following is the GREATEST concern when establishing key risk indicators (KRIs)?
Which of the following is the BEST indication of an enhanced risk-aware culture?
A business impact analysis (BIA) enables an organization to determine appropriate IT risk mitigation actions by:
Which of the following is the MOST important topic to cover in a risk awareness training program for all staff?
Which of the following is the MOST useful information for a risk practitioner when planning response activities after risk identification?
Which of the following is MOST important to update following a change in organizational risk appetite and tolerance?
An organizations chief technology officer (CTO) has decided to accept the risk associated with the potential loss from a denial-of-service (DoS) attack. In this situation, the risk practitioner ' s BEST course of action is to:
The PRIMARY benefit of conducting a risk workshop using a top-down approach instead of a bottom-up approach is the ability to:
The PRIMARY benefit associated with key risk indicators (KRls) is that they:
An organization ' s IT team has proposed the adoption of cloud computing as a cost-saving measure for the business. Which of the following should be of GREATEST concern to the risk practitioner?
Which of the following information is MOST useful to a risk practitioner for developing IT risk scenarios?
A bank is experiencing an increasing incidence of customer identity theft. Which of the following is the BEST way to mitigate this risk?
A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?
Which of the following is the MOST important consideration when sharing risk management updates with executive management?
A recently purchased IT application does not meet project requirements. Of the following, who is accountable for the potential impact?
A risk practitioner has identified that the organization ' s secondary data center does not provide redundancy for a critical application. Who should have the authority to accept the associated risk?
Which of the following is the BEST way to determine software license compliance?
Which of the following should be a risk practitioner ' s NEXT action after identifying a high probability of data loss in a system?
Which of the following would BEST help to ensure that suspicious network activity is identified?
Which of the following is the PRIMARY advantage of aligning generic risk scenarios with business objectives?
Which of the following is the BEST evidence that a user account has been properly authorized?
Real-time monitoring of security cameras implemented within a retail store is an example of which type of control?
Which of the following is the FIRST step in managing the risk associated with the leakage of confidential data?
Which of the following is MOST helpful to facilitate the decision of recovery priorities in a disaster situation?
After a risk has been identified, who is in the BEST position to select the appropriate risk treatment option?
The PRIMARY reason a risk practitioner would be interested in an internal audit report is to:
Which of the following is MOST important for a risk practitioner to consider when analyzing the risk associated with migrating to a new cloud service provider?
Which of the following observations would be the GREATEST concern to a risk practitioner evaluating an organization ' s risk management practices?
Which of the following is the MOST essential characteristic of a good IT risk scenario?
Which of the following is the BEST method for assessing control effectiveness?
Technical controls affecting access permissions for systems should be implemented according to:
Which of the following issues found during the review of a newly created disaster recovery plan (DRP) should be of MOST concern?
The BEST way for management to validate whether risk response activities have been completed is to review:
Which of these documents is MOST important to request from a cloud service
provider during a vendor risk assessment?
Which of the following is MOST important to consider when determining the risk associated with re-identification of obfuscated personal data?
Which of the following provides the BEST evidence of the effectiveness of an organization ' s account provisioning process?
A failure in an organization s IT system build process has resulted in several computers on the network missing the corporate endpoint detection and response (EDR) software. Which of the following should be the risk practitioner’s IMMEDIATE concern?
Which of the following provides the MOST useful information when assessing whether an organization has appropriately managed its level of risk compared to its established risk appetite?
Which of the following will BEST ensure that information security risk factors are mitigated when developing in-house applications?
Which of the following key risk indicators (KRIs) provides the BEST insight into the risk associated with IT systems being unable to meet the required availability service level in the future?
Which of the following will BEST help an organization evaluate the control environment of several third-party vendors?
Which of the following is MOST important for a multinational organization to consider when developing its security policies and standards?
Which of the following would be a risk practitioner ' s BEST course of action when a project team has accepted a risk outside the established risk appetite?
Which of the following is the MOST important consideration when developing an organization ' s risk taxonomy?
Which of the following will BEST help to ensure that information system controls are effective?
An organization becomes aware that IT security failed to detect a coordinated
cyber attack on its data center. Which of the following is the BEST course of
action?
Performing a background check on a new employee candidate before hiring is an example of what type of control?
Which of the following BEST enables an organization to address risk associated with technical complexity?
Which of The following should be of GREATEST concern for an organization considering the adoption of a bring your own device (BYOD) initiative?
Which of the following is the MOST important consideration when selecting either a qualitative or quantitative risk analysis?
Which of the following is the MOST important component in a risk treatment plan?
Which of the following is the BEST indicator of the effectiveness of a control monitoring program?
A recent vulnerability assessment of a web-facing application revealed several weaknesses. Which of the following should be done NEXT to determine the risk exposure?
After an annual risk assessment is completed, which of the following would be MOST important to communicate to stakeholders?
Who is accountable for authorizing application access in a cloud Software as a Service (SaaS) solution?
Which of the following has the GREATEST impact on ensuring the alignment of the risk profile with business objectives?
When reviewing a business continuity plan (BCP). which of the following would be the MOST significant deficiency?
A new software package that could help mitigate risk in an organization has become available. Which of the following is the risk practitioner ' s BEST course of action?
A risk practitioner is defining metrics for security threats that were not identified by antivirus software. Which type of metric is being developed?
Senior leadership has set guidelines for the integration of a new acquisition. The guidelines allow for a variation in the level of risk-taking. The variation indicates which of the following risk management concepts?
Which of the following would MOST likely require a risk practitioner to update the risk register?
Which of the following is the PRIMARY objective of providing an aggregated view of IT risk to business management?
An organization is preparing to transfer a large number of customer service representatives to the sales department. Of the following, who is responsible for mitigating the risk associated with residual system access?
An organizational policy requires critical security patches to be deployed in production within three weeks of patch availability. Which of the following is the BEST metric to verify adherence to the policy?
Which of the following would be the result of a significant increase in the motivation of a malicious threat actor?
A key performance indicator (KPI) shows that a process is operating inefficiently, even though no control issues were noted during the most recent risk assessment. Which of the following should be done FIRST?
Once a risk owner has decided to implement a control to mitigate risk, it is MOST important to develop:
Which of the following describes the relationship between risk appetite and risk tolerance?
A risk practitioner observed Vial a high number of pokey exceptions were approved by senior management. Which of the following is the risk practitioner’s BEST course of action to determine root cause?
A business unit has decided to accept the risk of implementing an off-the-shelf, commercial software package that uses weak password controls. The BEST course of action would be to:
Which of the following is the BEST method to mitigate the risk of an unauthorized employee viewing confidential data in a database ' '
Which of the following is the PRIMARY objective of maintaining an information asset inventory?
Which of the following is the MOST important key performance indicator (KPI) to establish in the service level agreement (SLA) for an outsourced data center?
An organization ' s decision to remain noncompliant with certain laws or regulations is MOST likely influenced by:
Where should a risk practitioner document the current state and desired future state of organizational risk?
While reviewing an organization ' s monthly change management metrics, a risk practitioner notes that the number of emergency changes has increased substantially Which of the following would be the BEST approach for the risk practitioner to take?
Which of the following would be a risk practitioners’ BEST recommendation for preventing cyber intrusion?
Which of the following is the GREATEST risk associated with the use of data analytics?
Which of the following is the MOST significant benefit of using quantitative risk analysis instead of qualitative risk analysis?
A data center has recently been migrated to a jurisdiction where heavy fines will be imposed should leakage of customer personal data occur. Assuming no other changes to the operating environment, which factor should be updated to reflect this situation as an input to scenario development for this particular risk event?
An organization recently experienced a cyber attack that resulted in the loss of confidential customer data. Which of the following is the risk practitioner ' s BEST recommendation after recovery steps have been completed?
An organization has established a contract with a vendor that includes penalties for loss of availability. Which risk treatment has been adopted by the organization?
When establishing an enterprise IT risk management program, it is MOST important to:
Which element of an organization ' s risk register is MOST important to update following the commissioning of a new financial reporting system?
Where is the FIRST place a risk practitioner should look to identify accountability for a specific risk?
A risk practitioner notices a risk scenario associated with data loss at the organization ' s cloud provider is assigned to the provider who should the risk scenario be reassigned to.
An organization is increasingly concerned about loss of sensitive data and asks the risk practitioner to assess the current risk level. Which of the following should the risk practitioner do FIRST?
An organization outsources the processing of us payroll data A risk practitioner identifies a control weakness at the third party trial exposes the payroll data. Who should own this risk?
What should be the PRIMARY objective for a risk practitioner performing a post-implementation review of an IT risk mitigation project?
A newly incorporated enterprise needs to secure its information assets From a governance perspective which of the following should be done FIRST?
Which of the following would present the GREATEST challenge when assigning accountability for control ownership?
Which of the following is MOST likely to result in a major change to the overall risk profile of the organization?
Which of the following should be a risk practitioner ' s PRIMARY focus when tasked with ensuring organization records are being retained for a sufficient period of time to meet legal obligations?
Which of the following is the PRIMARY reason to engage business unit managers in risk management processes ' ?
Which of the following is MOST important to have in place to ensure the effectiveness of risk and security metrics reporting?
Which of the following provides a risk practitioner with the MOST reliable evidence of a third party ' s ability to protect the confidentiality of sensitive corporate information?
Which of the following is the MOST effective way to reduce potential losses due to ongoing expense fraud?
Reviewing which of the following BEST helps an organization gain insight into its overall risk profile?
A risk practitioner has observed that risk owners have approved a high number of exceptions to the information security policy. Which of the following should be the risk practitioner ' s GREATEST concern?
The BEST reason to classify IT assets during a risk assessment is to determine the:
Which of the following is MOST important to the effectiveness of a senior oversight committee for risk monitoring?
A risk practitioner has been asked to evaluate a new cloud-based service to enhance an organization ' s access management capabilities. When is the BEST time for the risk practitioner to provide opinions on control strength?
Which of the following is the MOST important reason for a risk practitioner to identify stakeholders for each IT risk scenario?
An organization ' s finance team is proposing the adoption of a blockchain technology to provide a secure method for moving funds. Which of the following should the risk practitioner do FIRST?
Which of the following should be the PRIMARY input when designing IT controls?
Which of the following would MOST effectively reduce risk associated with an increased volume of online transactions on a retailer website?
Which of the following is the MOST important input when developing risk scenarios?
Who is MOST important lo include in the assessment of existing IT risk scenarios?
Which of the following is the MOST important consideration for effectively maintaining a risk register?
An organization has provided legal text explaining the rights and expected behavior of users accessing a system from geographic locations that have strong privacy regulations. Which of the following control types has been applied?
The BEST way to mitigate the high cost of retrieving electronic evidence associated with potential litigation is to implement policies and procedures for:
Which of the following tasks should be completed prior to creating a disaster recovery plan (DRP)?
A risk assessment has identified increased losses associated with an IT risk scenario. It is MOST important for the risk practitioner to:
Which risk response strategy could management apply to both positive and negative risk that has been identified?
Which of the following is the MOST significant indicator of the need to perform a penetration test?
A company has located its computer center on a moderate earthquake fault. Which of the following is the MOST important consideration when establishing a contingency plan and an alternate processing site?
Which of the following is MOST useful input when developing risk scenarios?
Which of the following contributes MOST to the effective implementation of risk responses?
Which of the following is the MOST effective way to help ensure an organization ' s current risk scenarios are relevant?
In addition to the risk register, what should a risk practitioner review to develop an understanding of the organization ' s risk profile?
Which of the following should be initiated when a high number of noncompliant conditions are observed during review of a control procedure?
Which of the following is the GREATEST benefit of a three lines of defense structure?
Which of the following is MOST important for a risk practitioner to review during an IT risk assessment?
Which of the following is the FIRST consideration to reduce risk associated with the storage of personal data?
Which of the following BEST enables risk mitigation associated with software licensing noncompliance?
During which phase of the system development life cycle (SDLC) should information security requirements for the implementation of a new IT system be defined?
Which of the following is MOST important for a risk practitioner to update when a software upgrade renders an existing key control ineffective?
A risk practitioner has received an updated enterprise risk management (ERM) report showing that residual risk is now within the organization ' s defined appetite and tolerance levels. Which of the following is the risk practitioner ' s BEST course of action?
Which of the following is the BEST course of action to help reduce the probability of an incident recurring?
Which of the following proposed benefits is MOST likely to influence senior management approval to reallocate budget for a new security initiative?
Which of the following is the GREATEST risk associated with an environment that lacks documentation of the architecture?
Which of the following is the BEST key performance indicator (KPI) to measure the maturity of an organization ' s security incident handling process?
A small organization finds it difficult to implement separation of duties necessary to mitigate the likelihood of system misuse. Which of the following would be the BEST compensating control?
Which of the following is the GREATEST benefit to an organization when updates to the risk register are made promptly after the completion of a risk assessment?
What is the MOST important consideration when aligning IT risk management with the enterprise risk management (ERM) framework?
Which of the following is the MOST effective control to ensure user access is maintained on a least-privilege basis?
Which of the following elements of a risk register is MOST likely to change as a result of change in management ' s risk appetite?
Which of the following should be the risk practitioner s PRIMARY focus when determining whether controls are adequate to mitigate risk?
Which of the following would MOST effectively reduce the potential for inappropriate exposure of vulnerabilities documented in an organization ' s risk register?
A risk practitioner is involved in a comprehensive overhaul of the organizational risk management program. Which of the following should be reviewed FIRST to help identify relevant IT risk scenarios?
Which of the following is the MOST important foundational element of an effective three lines of defense model for an organization?
Senior management wants to increase investment in the organization ' s cybersecurity program in response to changes in the external threat landscape. Which of the following would BEST help to prioritize investment efforts?
Which of the following is the BEST way to validate the results of a vulnerability assessment?
Which of the following would MOST likely cause management to unknowingly accept excessive risk?
An organization has outsourced a critical process involving highly regulated data to a third party with servers located in a foreign country. Who is accountable for the confidentiality of this data?
Which of the following BEST indicates the effectiveness of anti-malware software?
Which of the following is the BEST method for determining an enterprise ' s current appetite for risk?
A key risk indicator (KRI) is reported to senior management on a periodic basis as exceeding thresholds, but each time senior management has decided to take no action to reduce the risk. Which of the following is the MOST likely reason for senior management ' s response?
Which of the following facilitates a completely independent review of test results for evaluating control effectiveness?
Which of the following helps ensure compliance with a nonrepudiation policy requirement for electronic transactions?
Which of the following practices would be MOST effective in protecting personality identifiable information (Ptl) from unauthorized access m a cloud environment?
Which of the following should be done FIRST when information is no longer required to support business objectives?
Which of the following would be MOST helpful when estimating the likelihood of negative events?
Which of the following is MOST important to enable well-informed cybersecurity risk decisions?
Which of the following should be the PRIMARY driver for the prioritization of risk responses?
Which of the following should be the MOST important consideration for senior management when developing a risk response strategy?
An updated report from a trusted research organization shows that attacks have increased in the organization ' s industry segment. What should be done FIRST to integrate this data into risk assessments?
Which of the following BEST enables effective risk-based decision making?
To implement the MOST effective monitoring of key risk indicators (KRIs), which of the following needs to be in place?
During a routine check, a system administrator identifies unusual activity indicating an intruder within a firewall. Which of the following controls has MOST likely been compromised?
Which of the following BEST enables a risk practitioner to enhance understanding of risk among stakeholders?
Which of the following is the MOST important reason for an organization to regularly assess the design of key risk indicators (KRIs)?
When a high number of approved exceptions are observed during a review of a control procedure, an organization should FIRST initiate a review of the:
A risk practitioner has observed that there is an increasing trend of users sending sensitive information by email without using encryption. Which of the following would be the MOST effective approach to mitigate the risk associated with data loss?
Which of the following stakeholders define risk tolerance for an enterprise?
A risk practitioner recently discovered that sensitive data from the production environment is required for testing purposes in non-production environments. Which of the following i the BEST recommendation to address this situation?
Which of the following will BEST help in communicating strategic risk priorities?
An organization has established a single enterprise-wide risk register that records high-level risk scenarios. The IT risk department has created its own register to record more granular scenarios applicable to IT. Which of the following is the BEST way to ensure alignment between these two registers?
Which of the following BEST enables the timely detection of changes in the security control environment?
Which of the following is the BEST way to protect sensitive data from administrators within a public cloud?
The PRIMARY reason for a risk practitioner to review business processes is to:
Which of the following should a risk practitioner recommend be done prior to disposal of server hardware containing confidential data?
Which of the following provides the MOST useful information to determine risk exposure following control implementations?
Which of the following provides the MOST insight regarding an organization ' s risk culture?
While conducting an organization-wide risk assessment, it is noted that many of the information security policies have not changed in the past three years. The BEST course of action is to:
The PRIMARY objective of collecting information and reviewing documentation when performing periodic risk analysis should be to:
Which of the following is MOST helpful in identifying gaps between the current and desired state of the IT risk environment?
Which of the following is MOST helpful in defining an early-warning threshold associated with insufficient network bandwidth’’?
Which of the following is MOST important to include in a Software as a Service (SaaS) vendor agreement?
A risk practitioner has been asked to mark an identified control deficiency as remediated, despite concerns that the risk level is still too high. Which of the following is the BEST way to address this concern?
Which of the following would provide the MOST useful information for communicating an organization’s risk level to senior management?
Which of the following is the MOST important factor to consider when determining whether to approve a policy exception request?
Which of the following would BEST help secure online financial transactions from improper users?
Which of the following is the BEST way to ensure ongoing control effectiveness?
Which of the following is MOST important to review when evaluating the ongoing effectiveness of the IT risk register?
An organization ' s IT department wants to complete a proof of concept (POC) for a security tool. The project lead has asked for approval to use the production data for testing purposes as it will yield the best results. Which of the following is the risk practitioner ' s BEST recommendation?
Which of the following is MOST important to consider when determining risk appetite?
An organization ' s recovery team is attempting to recover critical data backups following a major flood in its data center. However, key team members do not know exactly what steps should be taken to address this crisis. Which of the following is the MOST likely cause of this situation?
Which of the following is the PRIMARY objective of aggregating the impact of IT risk scenarios and reflecting the results in the enterprise risk register?
Which of the following key performance indicators (KPis) would BEST measure me risk of a service outage when using a Software as a Service (SaaS) vendors
Which of the following s MOST likely to deter an employee from engaging in inappropriate use of company owned IT systems?
The MAIN purpose of reviewing a control after implementation is to validate that the control:
Which of the following is MOST commonly compared against the risk appetite?
While reviewing the risk register, a risk practitioner notices that different business units have significant variances in inherent risk for the same risk scenario. Which of the following is the BEST course of action?
Which of the following is the MOST important responsibility of a risk owner?
An organization has been notified that a disgruntled, terminated IT administrator has tried to break into the corporate network. Which of the following discoveries should be of GREATEST concern to the organization?
Which of the following factors will have the GREATEST impact on the implementation of a risk mitigation strategy for an organization?
An organization has outsourced its backup and recovery procedures to a third-party cloud provider. Which of the following is the risk practitioner s BEST course of action?
Which of the following is MOST important for successful incident response?
A highly regulated organization acquired a medical technology startup company that processes sensitive personal information with weak data protection controls. Which of the following is the BEST way for the acquiring company to reduce its risk while still enabling the flexibility needed by the startup company?
An IT department originally planned to outsource the hosting of its data center at an overseas location to reduce operational expenses. After a risk assessment, the department has decided to keep the data center in-house. How should the risk treatment response be reflected in the risk register?
When creating a separate IT risk register for a large organization, which of the following is MOST important to consider with regard to the existing corporate risk ' register?
A legacy application used for a critical business function relies on software that has reached the end of extended support Which of the following is the MOST effective control to manage this application?
Which of the following is the MOST effective control to maintain the integrity of system configuration files?
Which organization is implementing a project to automate the purchasing process, including the modification of approval controls. Which of the following tasks is lie responsibility of the risk practitioner*?
Which of the following scenarios presents the GREATEST risk of noncompliance with data privacy best practices?
An IT control gap has been identified in a key process. Who would be the MOST appropriate owner of the risk associated with this gap?
Which of the following BEST enables a risk practitioner to identify the consequences of losing critical resources due to a disaster?
An organization has four different projects competing for funding to reduce overall IT risk. Which project should management defer?
Which of the following is the BEST evidence that risk management is driving business decisions in an organization?
An organization has experienced several incidents of extended network outages that have exceeded tolerance. Which of the following should be the risk practitioner ' s FIRST step to address this situation?
The MOST important reason to monitor key risk indicators (KRIs) is to help management:
From a risk management perspective, the PRIMARY objective of using maturity models is to enable:
What are the MOST essential attributes of an effective Key control indicator (KCI)?
Which of the following provides the BEST protection for Internet of Things (loT) devices that are accessed within an organization?
Which of the following is the PRIMARY risk management responsibility of the second line of defense?
Which of the following activities is a responsibility of the second line of defense?
Which of the following would be MOST relevant to stakeholders regarding ineffective control implementation?
An organization is moving its critical assets to the cloud. Which of the following is the MOST important key performance indicator (KPI) to include in the service level agreement (SLA)?
Which of the following is MOST important to ensure before using risk reports in decision making?
The BEST key performance indicator (KPI) to measure the effectiveness of a backup process would be the number of:
Which of the following is MOST important to consider when selecting and designing key control indicators (KCIs)?
Which of the following is the GREATEST concern associated with insufficient focus on addressing blockchain interoperability in the SDLC?
During testing, a risk practitioner finds the IT department ' s recovery time objective (RTO) for a key system does not align with the enterprise ' s business continuity plan (BCP). Which of the following should be done NEXT?
A risk practitioner is assisting with the preparation of a report on the organization s disaster recovery (DR) capabilities. Which information would have the MOST impact on the overall recovery profile?
A payroll manager discovers that fields in certain payroll reports have been modified without authorization. Which of the following control weaknesses could have contributed MOST to this problem?
Which of the following is the MOST effective key performance indicator (KPI) for change management?
A risk practitioner is asked to present the results of the most recent technology risk assessment to executive management in a concise manner. Which of the following is MOST important to include in the presentation?
Which of the following is the BEST indicator of the effectiveness of a control?
Which of the following BEST mitigates the risk of sensitive personal data leakage from a software development environment?
Which of the following is the PRIMARY reason for a risk practitioner to use global standards related to risk management?
When collecting information to identify IT-related risk, a risk practitioner should FIRST focus on IT:
During an acquisition, which of the following would provide the MOST useful input to the parent company ' s risk practitioner when developing risk scenarios for the post-acquisition phase?
Which of the following is the BEST success criterion for control implementation?
An organization striving to be on the leading edge in regard to risk monitoring would MOST likely implement:
An organization has recently updated its disaster recovery plan (DRP). Which of the following would be the GREATEST risk if the new plan is not tested?
it was determined that replication of a critical database used by two business units failed. Which of the following should be of GREATEST concern1?
An organization has asked an IT risk practitioner to conduct an operational risk assessment on an initiative to outsource the organization ' s customer service operations overseas. Which of the following would MOST significantly impact management ' s decision?
When of the following is the MOST significant exposure when an application uses individual user accounts to access the underlying database?
Business management is seeking assurance from the CIO that IT has a plan in place for early identification of potential issues that could impact the delivery of a new application Which of the following is the BEST way to increase the chances of a successful delivery ' ?
The head of a business operations department asks to review the entire IT risk register. Which of the following would be the risk manager s BEST approach to this request before sharing the register?
Which of the following is the PRIMARY goal of enterprise architecture (EA)?
Read " rights to application files in a controlled server environment should be approved by the:
Which of the following methods would BEST contribute to identifying obscure risk scenarios?
Which of the following is the GREATEST concern related to the monitoring of key risk indicators (KRIs)?
Which of the following should a risk practitioner do NEXT after learning that Internet of Things (IoT) devices installed in the production environment lack appropriate security controls for sensitive data?
A chief information officer (CIO) has identified risk associated with shadow systems being maintained by business units to address specific functionality gaps in the organization ' senterprise resource planning (ERP) system. What is the BEST way to reduce this risk going forward?
An organization has committed to a business initiative with the knowledge that the risk exposure is higher than the risk appetite. Which of the following is the risk practitioner ' s MOST important action related to this decision?
Which of the following is the GREATEST benefit of involving business owners in risk scenario development?
Which of the following should be a risk practitioner ' s NEXT step upon learning the impact of an organization ' s noncompliance with a specific legal regulation?
When updating a risk register with the results of an IT risk assessment, the risk practitioner should log:
Which of the following is the MOST important criteria for selecting key risk indicators (KRIs)?
Which of the following is the MOST important data source for monitoring key risk indicators (KRIs)?
An organization has decided to outsource a web application, and customer data will be stored in the vendor ' s public cloud. To protect customer data, it is MOST important to ensure which of the following?
Which of the following provides the MOST mitigation value for an organization implementing new Internet of Things (loT) devices?
Which of the following is the PRIMARY risk management responsibility of the second line in the three lines model?
Which of the following is the GREATEST benefit of updating the risk register to include outcomes from a risk assessment?
An organization operates in an environment where reduced time-to-market for new software products is a top business priority. Which of the following should be the risk practitioner ' s GREATEST concern?
Which of the following BEST enables an organization to increase the likelihood of identifying risk associated with unethical employee behavior?
Which of the following is the PRIMARY objective of engaging key stakeholders in the IT risk assessment process?
An assessment of information security controls has identified ineffective controls. Which of the following should be the risk practitioner ' s FIRST course of action?
Which of the following is the MOST important success factor when introducing risk management in an organization?
It is MOST important that security controls for a new system be documented in:
Upon learning that the number of failed back-up attempts continually exceeds the current risk threshold, the risk practitioner should:
Which of the following is the PRIMARY reason to compare the business impact analysis (BIA) against the organization ' s business continuity plan (BCP)?
Which of the following provides the MOST comprehensive information when developing a risk profile for a system?
An organization is increasingly concerned about loss of sensitive data and asks the risk practitioner to assess the current risk level. Which of the following should the risk practitioner do FIRST?
The PRIMARY objective of the board of directors periodically reviewing the risk profile is to help ensure:
Which of the following is the BEST approach when a risk treatment plan cannot be completed on time?
Which of the following is MOST helpful in preventing risk events from materializing?
During the control evaluation phase of a risk assessment, it is noted that multiple controls are ineffective. Which of the following should be the risk practitioner ' s FIRST course of action?
Which group has PRIMARY ownership of reputational risk stemming from unethical behavior within the organization?
The BEST way to test the operational effectiveness of a data backup procedure is to:
Which of the following is the BEST way for an organization to enable risk treatment decisions?
When reporting to senior management on changes in trends related to IT risk, which of the following is MOST important?
Which of the following is of GREATEST concern when uncontrolled changes are made to the control environment?
Which of the following functions independently reviews and provides feedback regarding the achievement of organizational objectives?
A risk practitioners PRIMARY focus when validating a risk response action plan should be that risk response:
During a risk treatment plan review, a risk practitioner finds the approved risk action plan has not been completed However, there were other risk mitigation actions implemented. Which of the fallowing is the BEST course of action?
A vendor ' s planned maintenance schedule will cause a critical application to temporarily lose failover capabilities. Of the following, who should approve this proposed schedule?
Which of the following is MOST important to consider before determining a response to a vulnerability?
An organization has initiated a project to launch an IT-based service to customers and take advantage of being the first to market. Which of the following should be of GREATEST concern to senior management?
An organization has an approved bring your own device (BYOD) policy. Which of the following would BEST mitigate the security risk associated with the inappropriate use of enterprise applications on the devices?
Owners of technical controls should be PRIMARILY accountable for ensuring the controls are:
A risk practitioner is evaluating policies defined by an organization as part of its IT security framework. Which of the following would be of GREATEST concern?
Which of the following would be MOST important for a risk practitioner to provide to the internal audit department during the audit planning process?
A key risk indicator (KRI) indicates a reduction in the percentage of appropriately patched servers. Which of the following is the risk practitioner ' s BEST course of action?
Which of the following offers the SIMPLEST overview of changes in an organization ' s risk profile?
What is the BEST information to present to business control owners when justifying costs related to controls?
The BEST way to demonstrate alignment of the risk profile with business objectives is through:
The GREATEST benefit of including low-probability, high-impact events in a risk assessment is the ability to:
An organization has decided to use an external auditor to review the control environment of an outsourced service provider. The BEST control criteria to evaluate the provider would be based on:
An organization planning to transfer and store its customer data with an offshore cloud service provider should be PRIMARILY concerned with:
To help ensure all applicable risk scenarios are incorporated into the risk register, it is MOST important to review the:
Which of the following is the BEST key control indicator (KCI) for measuring the security of a blockchain network?
Which of the following BEST ensures that the data feeds used by an organization are complete and accurate?
Which of the following will have the GREATEST influence when determining an organization ' s risk appetite?
After undertaking a risk assessment of a production system, the MOST appropriate action is fcr the risk manager to
Which of the following is the BEST time for an enterprise project management team to use risk analysis?
During a risk assessment, the risk practitioner finds a new risk scenario without controls has been entered into the risk register. Which of the following is the MOST appropriate action?
In order to efficiently execute a risk response action plan, it is MOST important for the emergency response team members to understand:
An organization is considering adopting artificial intelligence (AI). Which of the
following is the risk practitioner ' s MOST important course of action?
A key risk indicator (KRI) threshold has reached the alert level, indicating data leakage incidents are highly probable. What should be the risk practitioner ' s FIRST course of action?
An organization ' s risk management team wants to develop IT risk scenarios to show the impact of collecting and storing credit card information. Which of the following is the MOST comprehensive approach to capture this scenario?
The PRIMARY advantage of involving end users in continuity planning is that they:
An organization is revising its IT security policy. Which of the following should be done FIRST to help ensure the policy is followed?
The results of a risk assessment reveal risk scenarios with high impact and low likelihood of occurrence. Which of the following would be the BEST action to address these scenarios?
Which of the following is MOST important for an organization to continuously manage after implementing a Zero Trust security model?
Malware has recently affected an organization. The MOST effective way to resolve this situation and define a comprehensive risk treatment plan would be to perform:
A risk practitioner is organizing risk awareness training for senior management. Which of the following is the MOST important topic to cover in the training session?
Which of the following is the BEST indicator of the effectiveness of a control action plan ' s implementation?
In the three lines of defense model, a PRIMARY objective of the second line is to:
WhichT5f the following is the MOST effective way to promote organization-wide awareness of data security in response to an increase in regulatory penalties for data leakage?
A risk practitioner is performing a risk assessment of recent external advancements in quantum computing. Which of the following would pose the GREATEST concern for the risk practitioner?
A highly regulated enterprise is developing a new risk management plan to specifically address legal and regulatory risk scenarios What should be done FIRST by IT governance to support this effort?
Which of the following would be the GREATEST risk associated with a new implementation of single sign-on?
Which of the following is a risk practitioner ' s MOST appropriate course of action upon learning that an organization is not compliant with its patch management policy?
What is the MOST important consideration when selecting key performance indicators (KPIs) for control monitoring?
Which of the following would be MOST helpful to a risk owner when making risk-aware decisions?
Which of the following roles should be assigned accountability for monitoring risk levels?
A change management process has recently been updated with new testing procedures. What is the NEXT course of action?
Which of the following BEST enables a risk practitioner to understand management ' s approach to organizational risk?
Which of the following is the MOST effective way to identify changes in the performance of the control environment?
A risk practitioner is reviewing the status of an action plan to mitigate an emerging IT risk and finds the risk level has increased. The BEST course of action would be to:
Which of the following is the BEST approach for an organization in a heavily regulated industry to comprehensively test application functionality?
Which of The following is the MOST comprehensive input to the risk assessment process specific to the effects of system downtime?
Which risk analysis methodology uses diagrams to analyze causes and consequences of particular risk events?
Employees are repeatedly seen holding the door open for others, so that trailing employees do not have to stop and swipe their own ID badges. This behavior BEST represents:
An online retailer has decided to store its customer database with a cloud provider in an Infrastructure as a Service (laaS) configuration. During an initial review of preliminary risk scenarios, a risk practitioner identifies instances where sensitive customer information is stored unencrypted. Who is accountable for ensuring this encryption?
An organization has identified that terminated employee accounts are not disabled or deleted within the time required by corporate policy. Unsure of the reason, the organization has decided to monitor the situation for three months to obtain more information. As a result of this decision, the risk has been:
Which of the following is the BEST control to minimize the risk associated with scope creep in software development?
An organization ' s business gap analysis reveals the need for a robust IT risk strategy. Which of the following should be the risk practitioner ' s PRIMARY consideration when participating in development of the new strategy?
In an organization that allows employee use of social media accounts for work purposes, which of the following is the BEST way to protect company sensitive information from being exposed?
In a DevOps environment, a container does not pass dynamic application security testing (DAST). How should this situation be categorized?
Which of the following controls BEST helps to ensure that transaction data reaches its destination?
Which of the following should be management ' s PRIMARY consideration when approving risk response action plans?
Which of the following is the MOST important consideration when identifying stakeholders to review risk scenarios developed by a risk analyst? The reviewers are:
Which of the following is the BEST way to identify changes to the risk landscape?
Which of the following should be the PRIMARY goal of developing information security metrics?
Which of the following would be MOST helpful to a risk practitioner when ensuring that mitigated risk remains within acceptable limits?
An organization ' s risk practitioner learns a new third-party system on the corporate network has introduced vulnerabilities that could compromise corporate IT systems. What should the risk practitioner do FIRST?
Within the three lines of defense model, the PRIMARY responsibility for ensuring risk mitigation controls are properly configured belongs with:
Which of the following is the BEST way for a risk practitioner to present an annual risk management update to the board ' '
Which of the following is the MOST effective way to help ensure accountability for managing risk?
Which of the following would BEST help to address the risk associated with malicious outsiders modifying application data?
Which of the following is the GREATEST concern when using artificial intelligence (AI) language models?
Which of the following will BEST help to ensure key risk indicators (KRIs) provide value to risk owners?
When reviewing the business continuity plan (BCP) of an online sales order system, a risk practitioner notices that the recovery time objective (RTO) has a shorter lime than what is defined in the disaster recovery plan (DRP). Which of the following is the BEST way for the risk practitioner to address this concern?
Which of the following is the BEST method of creating risk awareness in an organization?
An organization has outsourced its customer management database to an external service provider. Of the following, who should be accountable for ensuring customer data privacy?
Which of the following is MOST important for a risk practitioner to consider when determining the control requirements for data privacy arising from emerging technologies?
A public online information security training course is available to an organization ' s staff. The online course contains free-form discussion fields. Which of the following should be of MOST concern to the organization ' s risk practitioner?
Which of the following MOST effectively limits the impact of a ransomware attack?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of IT policies? The number of:
Analyzing trends in key control indicators (KCIs) BEST enables a risk practitioner to proactively identify impacts on an organization ' s:
What should a risk practitioner do FIRST when an assessment reveals a control is not operating as intended?
Which of the following is the MOST important element of a successful risk awareness training program?
Which of the following risk management practices BEST facilitates the incorporation of IT risk scenarios into the enterprise-wide risk register?
Which of the following BEST indicates that risk management is embedded into the responsibilities of all employees?
When performing a risk assessment of a new service to support a ewe Business process. which of the following should be done FRST10 ensure continuity of operations?
An organization has established a policy prohibiting ransom payments if subjected to a ransomware attack. Which of the following is the MOST effective control to support this policy?
Which of the following is MOST important information to review when developing plans for using emerging technologies?
Which of the following BEST supports ethical IT risk management practices?
Which of the following should be considered FIRST when creating a comprehensive IT risk register?
When documenting a risk response, which of the following provides the STRONGEST evidence to support the decision?
Which of the following is the MOST important consideration when selecting digital signature software?
Which of the following should be done FIRST when developing an initial set of risk scenarios for an organization?
A newly enacted information privacy law significantly increases financial penalties for breaches of personally identifiable information (Pll). Which of the following will MOST likely outcome for an organization affected by the new law?
Which of the following should a risk practitioner review FIRST when evaluating risk events associated with the organization ' s data flow model?
Mitigating technology risk to acceptable levels should be based PRIMARILY upon:
All business units within an organization have the same risk response plan for creating local disaster recovery plans. In an effort to achieve cost effectiveness, the BEST course of action would be to:
Which of the following should be the risk practitioner s FIRST course of action when an organization has decided to expand into new product areas?
Which of the following controls would BEST mitigate the risk of user passwords being compromised by a man in the middle technique?
Which of the following should be the FIRST consideration when establishing a new risk governance program?
Which type of indicators should be developed to measure the effectiveness of an organization ' s firewall rule set?
Which of the following is the MOST important consideration for a risk practitioner when making a system implementation go-live recommendation?
Which of the following would BEST ensure that identified risk scenarios are addressed?
A management team is on an aggressive mission to launch a new product to penetrate new markets and overlooks IT risk factors, threats, and vulnerabilities. This scenario BEST demonstrates an organization ' s risk:
Which of the following is a risk practitioner ' s BEST course of action upon learning that a control under internal review may no longer be necessary?
The MOST important reason to aggregate results from multiple risk assessments on interdependent information systems is to:
Which of the following is MOST important for a project steering committee to consider when deciding to release a new system into production?
Which of the following is the PRIMARY reason to establish the root cause of an IT security incident?
Which of the following would BEST enable a risk practitioner to embed risk management within the organization?
An organization that has been the subject of multiple social engineering attacks is developing a risk awareness program. The PRIMARY goal of this program should be to:
A control owner has completed a year-long project To strengthen existing controls. It is MOST important for the risk practitioner to:
The BEST way to justify the risk mitigation actions recommended in a risk assessment would be to:
Which of the following would be a risk practitioner’s BEST recommendation upon learning of an updated cybersecurity regulation that could impact the organization?
An organization wants to develop a strategy to mitigate the risk associated with unethical actions by stakeholders. Which of the following should be done FIRST?
A risk manager has determined there is excessive risk with a particular technology. Who is the BEST person to own the unmitigated risk of the technology?
Which of me following is MOST helpful to mitigate the risk associated with an application under development not meeting business objectives?
Which of the following is MOST important to address for an organization looking to improve its IT asset management processes?
The PRIMARY reason for establishing various Threshold levels for a set of key risk indicators (KRIs) is to:
Which of the following is the MOST important requirement for monitoring key risk indicators (KRls) using log analysis?
Which of the following BEST enables risk-based decision making in support of a business continuity plan (BCP)?
The cost of maintaining a control has grown to exceed the potential loss. Which of the following BEST describes this situation?
What is the BEST recommendation to reduce the risk associated with potential system compromise when a vendor stops releasing security patches and updates for a business-critical legacy system?
It was discovered that a service provider ' s administrator was accessing sensitive information without the approval of the customer in an Infrastructure as a Service (laaS) model. Which of the following would BEST protect against a future recurrence?
Which of the following should be accountable for ensuring that media containing financial information are adequately destroyed per an organization ' s data disposal policy?
Which of the following will be MOST effective in uniquely identifying the originator of electronic transactions?
Which of the following is the BEST indication that key risk indicators (KRIs) should be revised?
Who is accountable for the process when an IT stakeholder operates a key control to address a risk scenario?
During a risk assessment, a key external technology supplier refuses to provide control design and effectiveness information, citing confidentiality concerns. What should the risk practitioner do NEXT?
An organization recently configured a new business division Which of the following is MOST likely to be affected?
What should a risk practitioner do FIRST upon learning a risk treatment owner has implemented a different control than what was specified in the IT risk action plan?
Which of the following is the BEST way to determine the value of information assets for risk management purposes?
An organization is making significant changes to an application. At what point should the application risk profile be updated?
Which of the following is MOST likely to be impacted when a global organization is required by law to implement a new data protection regulation across its operations?
An organization allows programmers to change production systems in emergency situations. Which of the following is the BEST control?
Which of the following is the GREATEST benefit for an organization with a strong risk awareness culture?
Which of the following will provide the BEST measure of compliance with IT policies?
The patch management process is MOST effectively monitored through which of the following key control indicators (KCIs)?
Which of the following should management consider when selecting a risk mitigation option?
Which of the following is the MOST important characteristic of a key risk indicator (KRI) to enable decision-making?
An organization is developing a risk awareness program for contractors and consultants. Which of the following is MOST important for the organization to keep confidential?