What is the MOST important consideration when selecting key performance indicators (KPIs) for control monitoring?
Which of the following is the MOST important consideration when developing risk strategies?
Calculation of the recovery time objective (RTO) is necessary to determine the:
A large organization recently restructured the IT department and has decided to outsource certain functions. What action should the control owners in the IT department take?
Implementing which of the following will BEST help ensure that systems comply with an established baseline before deployment?
Which of the following BEST helps to identify significant events that could impact an organization?
Vulnerability analysis
An organization operates in an environment where the impact of ransomware attacks is high, with a low likelihood. After quantifying the impact of the risk associated with ransomware attacks exceeds the organization's risk appetite and tolerance, which of the following is the risk practitioner's BEST recommendation?
Which of the following is the BEST way to identify changes in the risk profile of an organization?
Which of the following will BEST help mitigate the risk associated with malicious functionality in outsourced application development?
When an organization is having new software implemented under contract, which of the following is key to controlling escalating costs?
Which of the following BEST indicates the risk appetite and tolerance level (or the risk associated with business interruption caused by IT system failures?
Which of the following would MOST likely result in updates to an IT risk appetite statement?
A risk practitioner observes that the fraud detection controls in an online payment system do not perform as expected. Which of the following will MOST likely change as a result?
Which of the following BEST enables risk mitigation associated with software licensing noncompliance?
A new international data privacy regulation requires personal data to be
disposed after the specified retention period, which is different from the local
regulatory requirement. Which of the following is the risk practitioner's
BEST course of action?
Which of the following is the PRIMARY role of the board of directors in corporate risk governance?
An organization has implemented a policy requiring staff members to take a minimum of five consecutive days' leave per year to mitigate the risk of malicious insider activities. Which of the following is the BEST key performance indicator (KPI) of the effectiveness of this policy?
What is the MOST important consideration when aligning IT risk management with the enterprise risk management (ERM) framework?
Which of the following BEST mitigates reputational risk associated with disinformation campaigns against an organization?
Which of the following is the GREATEST concern when an organization uses a managed security service provider as a firewall administrator?
A risk owner has identified a risk with high impact and very low likelihood. The potential loss is covered by insurance. Which of the following should the risk practitioner do NEXT?
Which of the following is MOST important for effective communication of a risk profile to relevant stakeholders?
Which of the following should be the FIRST step when a company is made aware of new regulatory requirements impacting IT?
Which of the following is MOST important to determine as a result of a risk assessment?
Which of the following provides the BEST evidence that risk responses have been executed according to their risk action plans?
Which of the following provides the MOST insight into an organization's IT threat exposure?
Which of the following is the MOST important information to be communicated during security awareness training?
A multinational organization is considering implementing standard background checks to' all new employees A KEY concern regarding this approach
Which of the following is the BEST metric to measure the effectiveness of an organization's disaster recovery program?
Which of the following is the MAIN benefit to an organization using key risk indicators (KRIs)?
A cloud service provider has completed upgrades to its cloud infrastructure to enhance service availability. Which of the following is the MOST important key risk indicator (KRI) for management to monitor?
Which of the following functions can be performed by any of the three lines of defense?
Of the following, who should be responsible for determining the inherent risk rating of an application?
Which of the following is the PRIMARY reason to perform ongoing risk assessments?
An organization retains footage from its data center security camera for 30 days when the policy requires 90-day retention The business owner challenges whether the situation is worth remediating Which of the following is the risk manager s BEST response'
Which of the following is the BEST indicator of the effectiveness of a control?
Which of the following should a risk practitioner do FIRST when an organization decides to use a cloud service?
Which stakeholders are PRIMARILY responsible for determining enterprise IT risk appetite?
An organization's IT department wants to complete a proof of concept (POC) for a security tool. The project lead has asked for approval to use the production data for testing purposes as it will yield the best results. Which of the following is the risk practitioner's BEST recommendation?
When using a third party to perform penetration testing, which of the following is the MOST important control to minimize operational impact?
Which of the following is the BEST key performance indicator (KPI) to measure how effectively risk management practices are embedded in the project management office (PMO)?
Which of the following is the MOST effective way to help ensure future risk levels do not exceed the organization's risk appetite?
An IT risk practitioner has determined that mitigation activities differ from an approved risk action plan. Which of the following is the risk practitioner's BEST course of action?
A large organization is replacing its enterprise resource planning (ERP) system and has decided not to deploy the payroll module of the new system. Instead, the current payroll system will continue to be
used. Of the following, who should own the risk if the ERP and payroll system fail to operate as expected?
An organization is reviewing a contract for a Software as a Service (SaaS) sales application with a 99.9% uptime service level agreement (SLA). Which of the following BEST describes ownership of availability risk?
Which of the following BEST assists in justifying an investment in automated controls?
Which of the following is the PRIMARY benefit of using a risk map with stakeholders?
When is the BEST to identify risk associated with major project to determine a mitigation plan?
A risk practitioner has recently become aware of unauthorized use of confidential personal information within the organization. Which of the following should the risk practitioner do FIRST?
When communicating changes in the IT risk profile, which of the following should be included to BEST enable stakeholder decision making?
Which of the following would BEST facilitate the implementation of data classification requirements?
When reviewing a risk response strategy, senior management's PRIMARY focus should be placed on the:
Which of the following BEST represents a critical threshold value for a key control indicator (KCI)?
Which of the following would be MOST helpful to an information security management team when allocating resources to mitigate exposures?
Which of the following would prompt changes in key risk indicator {KRI) thresholds?
The PRIMARY reason for tracking the status of risk mitigation plans is to ensure:
A risk practitioner wants to identify potential risk events that affect the continuity of a critical business process. Which of the following should the risk practitioner do FIRST?
Which of the following is MOST important for successful incident response?
Which of the following BEST measures the efficiency of an incident response process?
Which of the following is a risk practitioner's BEST recommendation upon learning that an employee inadvertently disclosed sensitive data to a vendor?
An organization is concerned that its employees may be unintentionally disclosing data through the use of social media sites. Which of the following will MOST effectively mitigate tins risk?
Which of the following should be the PRIMARY objective of promoting a risk-aware culture within an organization?
Senior leadership has set guidelines for the integration of a new acquisition. The guidelines allow for a variation in the level of risk-taking. The variation indicates which of the following risk management concepts?
A control owner has completed a year-long project To strengthen existing controls. It is MOST important for the risk practitioner to:
Which of the following should be the PRIMARY driver for an organization on a multi-year cloud implementation to publish a cloud security policy?
Which of the following is MOST helpful in identifying new risk exposures due to changes in the business environment?
An organization is planning to move its application infrastructure from on-premises to the cloud. Which of the following is the BEST course of the actin to address the risk associated with data transfer if the relationship is terminated with the vendor?
Which of the following BEST enables an organization to address risk associated with technical complexity?
Which of the following should be the GREATEST concern for an organization that uses open source software applications?
it was determined that replication of a critical database used by two business units failed. Which of the following should be of GREATEST concern1?
Which of the following is the MOST important objective of regularly presenting the project risk register to the project steering committee?
Which of the following is the BEST control to detect an advanced persistent threat (APT)?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of IT policies? The number of:
After the review of a risk record, internal audit questioned why the risk was lowered from medium to low. Which of the following is the BEST course of action in responding to this inquiry?
To communicate the risk associated with IT in business terms, which of the following MUST be defined?
Which of the following would MOST effectively reduce the potential for inappropriate exposure of vulnerabilities documented in an organization's risk register?
Which of the following is the BEST course of action to reduce risk impact?
Who should be responsible (of evaluating the residual risk after a compensating control has been
Which of the following is of GREATEST concern when uncontrolled changes are made to the control environment?
Which of the following is the BEST source for identifying key control indicators (KCIs)?
Which of the following is MOST important for a risk practitioner to consider when evaluating plans for changes to IT services?
Which of the following is the MOST effective way to incorporate stakeholder concerns when developing risk scenarios?
Which of the following would MOST likely require a risk practitioner to update the risk register?
A risk practitioner discovers that an IT operations team manager bypassed web filtering controls by using a mobile device, in violation of the network security policy. Which of the following should the risk practitioner do FIRST?
The operational risk associated with attacks on a web application should be owned by the individual in charge of:
Which of the following is MOST important to ensure before using risk reports in decision making?
An organization has completed a project to implement encryption on all databases that host customer data. Which of the following elements of the risk register should be updated the reflect this change?
As part of an overall IT risk management plan, an IT risk register BEST helps management:
An external security audit has reported multiple findings related to control noncompliance. Which of the following would be MOST important for the risk practitioner to communicate to senior management?
The MAIN purpose of reviewing a control after implementation is to validate that the control:
The PRIMARY benefit of selecting an appropriate set of key risk indicators (KRIs) is that they:
Which of the following is MOST important to have in place to ensure the effectiveness of risk and security metrics reporting?
Which of the following is the GREATEST benefit of using IT risk scenarios?
Which of the following is the BEST metric to demonstrate the effectiveness of an organization's change management process?
To reduce costs, an organization is combining the second and third tines of defense in a new department that reports to a recently appointed C-level executive. Which of the following is the GREATEST concern with this situation?
An organization's stakeholders are unable to agree on appropriate risk responses. Which of the following would be the BEST course of action?
An organization is implementing internet of Things (loT) technology to control temperature and lighting in its headquarters. Which of the following should be of GREATEST concern?
Following an acquisition, the acquiring company's risk practitioner has been asked to update the organization's IT risk profile What is the MOST important information to review from the acquired company to facilitate this task?
An organization has outsourced its customer management database to an external service provider. Of the following, who should be accountable for ensuring customer data privacy?
Which of the following should be the PRIMARY input to determine risk tolerance?
When assessing the maturity level of an organization's risk management framework, which of the following deficiencies should be of GREATEST concern to a risk practitioner?
Which of the following should be a risk practitioner's NEXT step after learning of an incident that has affected a competitor?
Which of the following should be of MOST concern to a risk practitioner reviewing an organization risk register after the completion of a series of risk assessments?
Which of the following is MOST effective against external threats to an organizations confidential information?
An organization has operations in a location that regularly experiences severe weather events. Which of the following would BEST help to mitigate the risk to operations?
An organization recently implemented an extensive risk awareness program after a cybersecurity incident. Which of the following is MOST likely to be affected by the implementation of the program?
Which of the following is MOST important to sustainable development of secure IT services?
To mitigate the risk of using a spreadsheet to analyze financial data, IT has engaged a third-party vendor to deploy a standard application to automate the process. Which of the following parties should own the risk associated with calculation errors?
An organization has outsourced its backup and recovery procedures to a cloud service provider. The provider's controls are inadequate for the organization's level of risk tolerance. As a result, the organization has internally implemented additional backup and recovery controls. Which risk response has been adopted?
Which of the following is the BEST key performance indicator (KPI) to measure the ability to deliver uninterrupted IT services?
An IT operations team implements disaster recovery controls based on decisions from application owners regarding the level of resiliency needed. Who is the risk owner in this scenario?
Which of the following is the BEST way to ensure adequate resources will be allocated to manage identified risk?
The BEST way to mitigate the high cost of retrieving electronic evidence associated with potential litigation is to implement policies and procedures for.
The cost of maintaining a control has grown to exceed the potential loss. Which of the following BEST describes this situation?
Which of the following is MOST important to consider when determining risk appetite?
What is the BEST information to present to business control owners when justifying costs related to controls?
Which of the following is the PRIMARY purpose for ensuring senior management understands the organization’s risk universe in relation to the IT risk management program?
A poster has been displayed in a data center that reads. "Anyone caught taking photographs in the data center may be subject to disciplinary action." Which of the following control types has been implemented?
A risk practitioner is defining metrics for security threats that were not identified by antivirus software. Which type of metric is being developed?
During a post-implementation review for a new system, users voiced concerns about missing functionality. Which of the following is the BEST way for the organization to avoid this situation in the future?
The PRIMARY objective of collecting information and reviewing documentation when performing periodic risk analysis should be to:
From a risk management perspective, which of the following is the PRIMARY benefit of using automated system configuration validation tools?
An organization has outsourced a critical process involving highly regulated data to a third party with servers located in a foreign country. Who is accountable for the confidentiality of this data?
A global organization is considering the transfer of its customer information systems to an overseas cloud service provider in the event of a disaster. Which of the following should be the MOST important risk consideration?
Which of the following is a PRIMARY benefit of engaging the risk owner during the risk assessment process?
An organization has engaged a third party to provide an Internet gateway encryption service that protects sensitive data uploaded to a cloud service. This is an example of risk:
A risk practitioner is developing a set of bottom-up IT risk scenarios. The MOST important time to involve business stakeholders is when:
Which of the following is the PRIMARY advantage of having a single integrated business continuity plan (BCP) rather than each business unit developing its own BCP?
Of the following, who is responsible for approval when a change in an application system is ready for release to production?
A new software package that could help mitigate risk in an organization has become available. Which of the following is the risk practitioner's BEST course of action?
Which of the following would BEST assist in reconstructing the sequence of events following a security incident across multiple IT systems in the organization's network?
Which of the following analyses is MOST useful for prioritizing risk scenarios associated with loss of IT assets?
Which of the following is the MOST important factor when deciding on a control to mitigate risk exposure?
Which of the following would be a risk practitioner's MOST important action upon learning that an IT control has failed?
Which of the following criteria associated with key risk indicators (KRIs) BEST enables effective risk monitoring?
An organizational policy requires critical security patches to be deployed in production within three weeks of patch availability. Which of the following is the BEST metric to verify adherence to the policy?
A risk practitioner recently discovered that sensitive data from the production environment is required for testing purposes in non-production environments. Which of the following i the BEST recommendation to address this situation?
Which of the following is the MOST important factor to consider when determining whether to approve a policy exception request?
Which of the following will BEST help to ensure implementation of corrective action plans?
Which of the following is the MOST relevant information to include in a risk management strategy?
An organization has committed to a business initiative with the knowledge that the risk exposure is higher than the risk appetite. Which of the following is the risk practitioner's MOST important action related to this decision?
An organization has updated its acceptable use policy to mitigate the risk of employees disclosing confidential information. Which of the following is the BEST way to reinforce the effectiveness of this policy?
When reviewing a business continuity plan (BCP). which of the following would be the MOST significant deficiency?
Which of the following is the ULTIMATE goal of conducting a privacy impact analysis (PIA)?
A robotic process automation (RPA) project has implemented new robots to enhance the efficiency of a sales business process. Which of the following provides the BEST evidence that the new controls have been implemented successfully?
Which of the following is MOST helpful in defining an early-warning threshold associated with insufficient network bandwidth’’?
Which of the following would BEST facilitate the maintenance of data classification requirements?
When determining the accuracy of a key risk indicator (KRI), it is MOST important that the indicator:
Which organization is implementing a project to automate the purchasing process, including the modification of approval controls. Which of the following tasks is lie responsibility of the risk practitioner*?
A root because analysis indicates a major service disruption due to a lack of competency of newly hired IT system administrators Who should be accountable for resolving the situation?
Which of the following is the MOST effective way to mitigate identified risk scenarios?
Which of the following is the PRIMARY consideration when establishing an organization's risk management methodology?
Which of the following provides the BEST evidence that a selected risk treatment plan is effective?
After undertaking a risk assessment of a production system, the MOST appropriate action is fcr the risk manager to
Which of the following activities is a responsibility of the second line of defense?
Which of the following is the BEST way to ensure data is properly sanitized while in cloud storage?
Which of the following should be the FIRST consideration when a business unit wants to use personal information for a purpose other than for which it was originally collected?
Which of the following is the BEST way to confirm whether appropriate automated controls are in place within a recently implemented system?
An application development team has a backlog of user requirements for a new system that will process insurance claim payments for customers. Which of the following should be the MOST important consideration for a risk-based review of the user requirements?
Which of the following MOST effectively limits the impact of a ransomware attack?
The risk associated with inadvertent disclosure of database records from a public cloud service provider (CSP) would MOST effectively be reduced by:
Which of the following is the PRIMARY reason for a risk practitioner to review an organization's IT asset inventory?
Which of the following is the GREATEST risk associated with inappropriate classification of data?
A deficient control has been identified which could result in great harm to an organization should a low frequency threat event occur. When communicating the associated risk to senior management the risk practitioner should explain:
Which of the following is the MOST effective key performance indicator (KPI) for change management?
Due to a change in business processes, an identified risk scenario no longer requires mitigation. Which of the following is the MOST important reason the risk should remain in the risk register?
Which of the following BEST provides an early warning that network access of terminated employees is not being revoked in accordance with the service level agreement (SLA)?
Which of the following is MOST important for an organization to update following a change in legislation requiring notification to individuals impacted by data breaches?
Which of the following is the BEST way to determine the ongoing efficiency of control processes?
Which of the following situations presents the GREATEST challenge to creating a comprehensive IT risk profile of an organization?
Which of the following should be the PRIMARY basis for deciding whether to disclose information related to risk events that impact external stakeholders?
Which of the following has the GREATEST positive impact on ethical compliance within the risk management process?
Which of the following is the MOST important key performance indicator (KPI) to monitor the effectiveness of disaster recovery processes?
Which of the following is the MOST important objective of an enterprise risk management (ERM) program?
A risk practitioner is involved in a comprehensive overhaul of the organizational risk management program. Which of the following should be reviewed FIRST to help identify relevant IT risk scenarios?
Which of the following is necessary to enable an IT risk register to be consolidated with the rest of the organization’s risk register?
Which of the following presents the GREATEST challenge for an IT risk practitioner who wants to report on trends in historical IT risk levels?
Which of the following BEST protects organizational data within a production cloud environment?
Which of the following cloud service models is MOST appropriate for client organizations that want to maximize their control over management of the data life cycle?
Which of the following should be the MOST important consideration when determining controls necessary for a highly critical information system?
Which key performance indicator (KPI) BEST measures the effectiveness of an organization's disaster recovery program?
Participants in a risk workshop have become focused on the financial cost to mitigate risk rather than choosing the most appropriate response. Which of the following is the BEST way to address this type of issue in the long term?
An organization is planning to outsource its payroll function to an external service provider Which of the following should be the MOST important consideration when selecting the provider?
A highly regulated enterprise is developing a new risk management plan to specifically address legal and regulatory risk scenarios What should be done FIRST by IT governance to support this effort?
Which of the following should be the MOST important consideration for senior management when developing a risk response strategy?
Which of the following should be the HIGHEST priority when developing a risk response?
Which of the following is the BEST way to reduce the likelihood of an individual performing a potentially harmful action as the result of unnecessary entitlement?
A recently purchased IT application does not meet project requirements. Of the following, who is accountable for the potential impact?
Which of the following should be a risk practitioner’s MOST important consideration when developing IT risk scenarios?
Which of the following is the BEST indicator of the effectiveness of a control monitoring program?
A bank has outsourced its statement printing function to an external service provider. Which of the following is the MOST critical requirement to include in the contract?
Which of the following is the BEST evidence that risk management is driving business decisions in an organization?
Which of We following is the MOST effective control to address the risk associated with compromising data privacy within the cloud?
Which of the following stakeholders define risk tolerance for an enterprise?
Which of the following is the MOST critical element to maximize the potential for a successful security implementation?
Which of the following is the MOST important consideration for protecting data assets m a Business application system?
The BEST key performance indicator (KPI) for monitoring adherence to an organization's user accounts provisioning practices is the percentage of:
Which of the following is the MOST important consideration when sharing risk management updates with executive management?
Which of the following is the BEST recommendation to senior management when the results of a risk and control assessment indicate a risk scenario can only be partially mitigated?
Which of the following is the BEST way to assess the effectiveness of an access management process?
An organization uses one centralized single sign-on (SSO) control to cover many applications. Which of the following is the BEST course of action when a new application is added to the environment after testing of the SSO control has been completed?
Which of the following will BEST help to ensure key risk indicators (KRIs) provide value to risk owners?
Which of the following is MOST important to the successful development of IT risk scenarios?
Which of the following is the MOST useful information for prioritizing risk mitigation?
A monthly payment report is generated from the enterprise resource planning (ERP) software to validate data against the old and new payroll systems. What is the BEST way to mitigate the risk associated with data integrity loss in the new payroll system after data migration?
Which of the following would be MOST useful to management when allocating resources to mitigate risk to the organization?
When of the following 15 MOST important when developing a business case for a proposed security investment?
The purpose of requiring source code escrow in a contractual agreement is to:
Which of the following criteria is MOST important when developing a response to an attack that would compromise data?
Which of the following is MOST useful input when developing risk scenarios?
A risk practitioner learns that a risk owner has been accepting gifts from a supplier of IT products. Some of these IT products are used to implement controls and to mitigate risk to acceptable levels. Which of the following should the risk practitioner do FIRST?
Which of the following BEST indicates that an organization's disaster recovery plan (DRP) will mitigate the risk of the organization failing to recover from a major service disruption?
A recent vulnerability assessment of a web-facing application revealed several weaknesses. Which of the following should be done NEXT to determine the risk exposure?
An internal audit report reveals that a legacy system is no longer supported Which of the following is the risk practitioner's MOST important action before recommending a risk response'
Which of the following will provide the BEST measure of compliance with IT policies?
Which of the following issues found during the review of a newly created disaster recovery plan (DRP) should be of MOST concern?
Quantifying the value of a single asset helps the organization to understand the:
Which of the following is a PRIMARY objective of privacy impact assessments (PIAs)?
Which of the following BEST helps to mitigate risk associated with excessive access by authorized users?
Deviation from a mitigation action plan's completion date should be determined by which of the following?
Which of the following is MOST important for management to consider when deciding whether to invest in an IT initiative that exceeds management's risk appetite?
Which of the following presents the GREATEST concern associated with the
use of artificial intelligence (Al) systems?
Which of the following is the MOST efficient method for monitoring control effectiveness?
Which of the following practices BEST mitigates risk related to enterprise-wide ethical decision making in a multi-national organization?
Which of the following is the MOST important element of a successful risk awareness training program?
Which of the following would be a risk practitioner’s BEST recommendation upon learning of an updated cybersecurity regulation that could impact the organization?
Which of the following is the GREATEST benefit of centralizing IT systems?
Which of the following is the MOST effective way to integrate risk and compliance management?
During an IT department reorganization, the manager of a risk mitigation action plan was replaced. The new manager has begun implementing a new control after identifying a more effective option. Which of the following is the risk practitioner's BEST course of action?
An organization's capability to implement a risk management framework is PRIMARILY influenced by the:
Which of the following is the PRIMARY benefit of stakeholder involvement in risk scenario development?
A risk heat map is MOST commonly used as part of an IT risk analysis to facilitate risk:
Which of the following management action will MOST likely change the likelihood rating of a risk scenario related to remote network access?
Which of the following is the PRIMARY accountability for a control owner?
An IT control gap has been identified in a key process. Who would be the MOST appropriate owner of the risk associated with this gap?
Which of the following data would be used when performing a business impact analysis (BIA)?
While evaluating control costs, management discovers that the annual cost exceeds the annual loss expectancy (ALE) of the risk. This indicates the:
Which of the following is the MOST important for an organization to have in place to ensure IT asset protection?
Which of the following is the BEST way to maintain a current list of organizational risk scenarios?
Which of the following is the MOST important characteristic of an effective risk management program?
Which of the following is the ULTIMATE objective of utilizing key control indicators (KCIs) in the risk management process?
The PRIMARY reason a risk practitioner would be interested in an internal audit report is to:
An organization's Internet-facing server was successfully attacked because the server did not have the latest security patches. The risk associated with poor patch management had been documented in the risk register and accepted. Who should be accountable for any related losses to the organization?
A bank is experiencing an increasing incidence of customer identity theft. Which of the following is the BEST way to mitigate this risk?
An organization has implemented a cloud-based backup solution to help prevent loss of transactional data from offices in an earthquake zone. This strategy demonstrates risk:
Which of the following is the MOST important information to cover a business continuity awareness Ira nine, program for all employees of the organization?
Which of the following is the BEST method for determining an enterprise's current appetite for risk?
Which of the following is the BEST way to determine whether new controls mitigate security gaps in a business system?
A vendor's planned maintenance schedule will cause a critical application to temporarily lose failover capabilities. Of the following, who should approve this proposed schedule?
Which of the following should be implemented to BEST mitigate the risk associated with infrastructure updates?
Reviewing which of the following BEST helps an organization gain insight into its overall risk profile?
Which of the following provides the MOST helpful reference point when communicating the results of a risk assessment to stakeholders?
Who is PRIMARILY accountable for identifying risk on a daily basis and ensuring adherence to the organization's policies?
Which of the following is the BEST indication of the effectiveness of a business continuity program?
A risk practitioner implemented a process to notify management of emergency changes that may not be approved. Which of the following is the BEST way to provide this information to management?
During implementation of an intrusion detection system (IDS) to monitor network traffic, a high number of alerts is reported. The risk practitioner should recommend to:
An organization has allowed several employees to retire early in order to avoid layoffs Many of these employees have been subject matter experts for critical assets Which type of risk is MOST likely to materialize?
Which of the following is the MOST important objective of establishing an enterprise risk management (ERM) function within an organization?
Which of the following BEST helps to ensure disaster recovery staff members
are able to complete their assigned tasks effectively during a disaster?
Which of the following is the BEST way to detect zero-day malware on an end user's workstation?
After the announcement of a new IT regulatory requirement, it is MOST important for a risk practitioner to;
The PRIMARY benefit of using a maturity model is that it helps to evaluate the:
The acceptance of control costs that exceed risk exposure MOST likely demonstrates:
Which of the following is the MAIN benefit to an organization using key risk indicators (KRIs)?
A PRIMARY advantage of involving business management in evaluating and managing risk is that management:
Which of the following should be the risk practitioner s PRIMARY focus when determining whether controls are adequate to mitigate risk?
Which of the following is the MOST important characteristic of a key risk indicator (KRI) to enable decision-making?
A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?
Which of the following would be a risk practitioners’ BEST recommendation for preventing cyber intrusion?
Which of the following is the GREATEST concern when using artificial intelligence (AI) language models?
Which of the following is the MAIN reason to continuously monitor IT-related risk?
Which of the following is MOST important to consider when determining the risk associated with re-identification of obfuscated personal data?
Which of the following is the MOST important reason to validate that risk responses have been executed as outlined in the risk response plan''
Which of the following BEST indicates that an organization has implemented IT performance requirements?
Which of the following practices would be MOST effective in protecting personality identifiable information (Ptl) from unauthorized access m a cloud environment?
Which of the following will be the GREATEST concern when assessing the risk profile of an organization?
An organization has decided to outsource a web application, and customer data will be stored in the vendor's public cloud. To protect customer data, it is MOST important to ensure which of the following?
Which of the following is the GREATEST benefit of analyzing logs collected from different systems?
Which of the following is the FIRST step when conducting a business impact analysis (BIA)?
Which of the following BEST helps to identify significant events that could impact an organization?
The BEST way to obtain senior management support for investment in a control implementation would be to articulate the reduction in:
Which of the following should be the PRIMARY focus of an IT risk awareness program?
An organization uses a biometric access control system for authentication and access to its server room. Which control type has been implemented?
During the control evaluation phase of a risk assessment, it is noted that multiple controls are ineffective. Which of the following should be the risk practitioner's FIRST course of action?
An organization's IT team has proposed the adoption of cloud computing as a cost-saving measure for the business. Which of the following should be of GREATEST concern to the risk practitioner?
Senior management has asked the risk practitioner for the overall residual risk level for a process that contains numerous risk scenarios. Which of the following should be provided?
Which of the following should be the PRIMARY concern when changes to firewall rules do not follow change management requirements?
Which of the following is a risk practitioner's BEST course of action after identifying risk scenarios related to noncompliance with new industry regulations?
A risk practitioner shares the results of a vulnerability assessment for a critical business application with the business manager. Which of the following is the NEXT step?
An organization wants to grant remote access to a system containing sensitive data to an overseas third party. Which of the following should be of GREATEST concern to management?
An organization is subject to a new regulation that requires nearly real-time recovery of its services following a disruption. Which of the following is the BEST way to manage the risk in this situation?
Which of the following should a risk practitioner do FIRST to support the implementation of governance around organizational assets within an enterprise risk management (ERM) program?
Which of the following is the BEST way to determine the value of information assets for risk management purposes?
Which of the following should be determined FIRST when a new security vulnerability is made public?
Which of the following should be the risk practitioner s FIRST course of action when an organization has decided to expand into new product areas?
An IT risk practitioner is evaluating an organization's change management controls over the last six months. The GREATEST concern would be an increase in:
Which of the following is PRIMARILY a risk management responsibly of the first line of defense?
Which of the following is the PRIMARY benefit when senior management periodically reviews and updates risk appetite and tolerance levels?
Which of the following approaches MOST effectively enables accountability for data protection?
Which of the following would MOST effectively reduce risk associated with an increased volume of online transactions on a retailer website?
Which of the following would be a risk practitioner's BEST course of action when a project team has accepted a risk outside the established risk appetite?
Which of the following would be MOST useful when measuring the progress of a risk response action plan?
Winch of the following key control indicators (KCIs) BEST indicates whether security requirements are identified and managed throughout a project He cycle?
Which of the following would be MOST helpful to a risk practitioner when ensuring that mitigated risk remains within acceptable limits?
Which of the following is the BEST approach when a risk treatment plan cannot be completed on time?
What is the PRIMARY role of the application owner when changes are being introduced into an existing environment?
Which of the following is MOST important to consider before determining a response to a vulnerability?
Which of the following is MOST important for an organization to consider when developing its IT strategy?
A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?
An organization striving to be on the leading edge in regard to risk monitoring would MOST likely implement:
Which of the following is the BEST approach for selecting controls to minimize risk?
Which of the following would BEST help minimize the risk associated with social engineering threats?
Which of the following controls will BEST detect unauthorized modification of data by a database administrator?
Which of the following is MOST important for senior management to review during an acquisition?
When establishing an enterprise IT risk management program, it is MOST important to:
Which of the following information is MOST useful to a risk practitioner for developing IT risk scenarios?
An organization has raised the risk appetite for technology risk. The MOST likely result would be:
Which of the following should be the PRIMARY focus of an independent review of a risk management process?
An organization has initiated a project to launch an IT-based service to customers and take advantage of being the first to market. Which of the following should be of GREATEST concern to senior management?
When formulating a social media policy lo address information leakage, which of the following is the MOST important concern to address?
Which of the following is the PRIMARY reason to use key control indicators (KCIs) to evaluate control operating effectiveness?
Which of the following is the MOST effective way to integrate business risk management with IT operations?
Which of the following will BEST help to ensure new IT policies address the enterprise's requirements?
Which of the following BEST mitigates the risk associated with inadvertent data leakage by users who work remotely?
Which of The following BEST represents the desired risk posture for an organization?
An organization recently received an independent security audit report of its cloud service provider that indicates significant control weaknesses. What should be done NEXT in response to this report?
A recent internal risk review reveals the majority of core IT application recovery time objectives (RTOs) have exceeded the maximum time defined by the business application owners. Which of the following is MOST likely to change as a result?
Which of the following is the GREATEST risk of relying on artificial intelligence (Al) within heuristic security systems?
Sensitive data has been lost after an employee inadvertently removed a file from the premises, in violation of organizational policy. Which of the following controls MOST likely failed?
Which of the following metrics is BEST used to communicate to senior management that the control environment manages risk within appetite and tolerance?
When developing a new risk register, a risk practitioner should focus on which of the following risk management activities?
Which of the following is the BEST criterion to determine whether higher residual risk ratings in the risk register should be accepted?
A risk practitioner is performing a risk assessment of recent external advancements in quantum computing. Which of the following would pose the GREATEST concern for the risk practitioner?
Which of the following is the GREATEST risk associated with the use of data analytics?
Which of the following is the MOST important consideration for the board and senior leadership
regarding the organization's approach to risk management for emerging technologies?
A business unit has implemented robotic process automation (RPA) for its
repetitive back-office tasks. Which of the following should be the risk
practitioner's GREATEST concern?
A risk practitioner has been made aware of a problem in an IT system that was missed during a routine risk assessment. Which of the following is the practitioner's BEST course of action?
When updating a risk register with the results of an IT risk assessment, the risk practitioner should log:
The risk associated with data loss from a website which contains sensitive customer information is BEST owned by:
Which of the following would have the GREATEST impact on reducing the risk associated with the implementation of a big data project?
Which of the following would provide the MOST comprehensive information for communicating current levels of IT-related risk to executive management?
The BEST key performance indicator (KPI) to measure the effectiveness of a backup process would be the number of:
Which of the following is a risk practitioner's MOST important responsibility in managing risk acceptance that exceeds risk tolerance?
The risk associated with an asset before controls are applied can be expressed as:
Which risk response strategy could management apply to both positive and negative risk that has been identified?
Which of the following is the MOST effective way for a large and diversified organization to minimize risk associated with unauthorized software on company devices?
Which of the following BEST measures the impact of business interruptions caused by an IT service outage?
Which of the following is a risk practitioner's MOST important course of action when the level of risk has exceeded risk tolerance?
An IT department originally planned to outsource the hosting of its data center at an overseas location to reduce operational expenses. After a risk assessment, the department has decided to keep the data center in-house. How should the risk treatment response be reflected in the risk register?
Which of the following is MOST important to include when reporting the effectiveness of risk management to senior management?
Which of the following factors will have the GREATEST impact on the implementation of a risk mitigation strategy for an organization?
Which of the following would be MOST useful to senior management when determining an appropriate risk response?
Which key performance efficiency IKPI) BEST measures the effectiveness of an organization's disaster recovery program?
The PRIMARY reason for periodically monitoring key risk indicators (KRIs) is to:
An organization is implementing Zero Trust architecture to improve its security posture. Which of the following is the MOST important input to develop the architecture?
Which of the following is a risk practitioner's BEST course of action upon learning that regulatory authorities have concerns with an emerging technology the organization is considering?
A global organization is planning to collect customer behavior data through social media advertising. Which of the following is the MOST important business risk to be considered?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a vulnerability management process?
Which strategy employed by risk management would BEST help to prevent internal fraud?
Legal and regulatory risk associated with business conducted over the Internet is driven by:
Which of the following is MOST important when developing key risk indicators (KRIs)?
Which of the following is MOST important for a risk practitioner to verify when evaluating the effectiveness of an organization's existing controls?
Performing a background check on a new employee candidate before hiring is an example of what type of control?
Which of the following provides the BEST measurement of an organization's risk management maturity level?
Which of the following is the BEST metric to measure employee adherence to organizational security policies?
Which of the following is MOST important to the effectiveness of a senior oversight committee for risk monitoring?
An IT organization is replacing the customer relationship management (CRM) system. Who should own the risk associated with customer data leakage caused by insufficient IT security controls for the new system?
An organization has outsourced its IT security operations to a third party. Who is ULTIMATELY accountable for the risk associated with the outsourced operations?
An organization has established a policy prohibiting ransom payments if subjected to a ransomware attack. Which of the following is the MOST effective control to support this policy?
A recent risk workshop has identified risk owners and responses for newly identified risk scenarios. Which of the following should be the risk practitioner s NEXT step? r
Which of the following would be of GREATEST assistance when justifying investment in risk response strategies?
An organization is planning to engage a cloud-based service provider for some of its data-intensive business processes. Which of the following is MOST important to help define the IT risk associated with this outsourcing activity?
Which of the following is MOST important to ensure when continuously monitoring the performance of a client-facing application?
An organization's internal audit department is considering the implementation of robotics process automation (RPA) to automate certain continuous auditing tasks. Who would own the risk associated with ineffective design of the software bots?
Who should be responsible for implementing and maintaining security controls?
An organization's finance team is proposing the adoption of a blockchain technology to provide a secure method for moving funds. Which of the following should the risk practitioner do FIRST?
A risk practitioner has identified that the agreed recovery time objective (RTO) with a Software as a Service (SaaS) provider is longer than the business expectation. Which ot the following is the risk practitioner's BEST course of action?
Which of the following is MOST influential when management makes risk response decisions?
Which of the following is the BEST way to determine the value of information assets for risk management purposes?
Establishing and organizational code of conduct is an example of which type of control?
Which of the following BEST enables the development of a successful IT strategy focused on business risk mitigation?
An organization recently implemented new technologies that enable the use of robotic process automation. Which of the following is MOST important to reassess?
An organization is implementing robotic process automation (RPA) to streamline business processes. Given that implementation of this technology is expected to impact existing controls, which of the following is the risk practitioner's BEST course of action?
The MOST important reason for implementing change control procedures is to ensure:
A risk assessment has identified increased losses associated with an IT risk scenario. It is MOST important for the risk practitioner to:
Who is ULTIMATELY accountable for the confidentiality of data in the event of a data breach within a Software as a Service (SaaS) environment?
Which of the following is the BEST measure of the effectiveness of an employee deprovisioning process?
An organization's recovery team is attempting to recover critical data backups following a major flood in its data center. However, key team members do not know exactly what steps should be taken to address this crisis. Which of the following is the MOST likely cause of this situation?
Which of the following would MOST likely cause a risk practitioner to reassess risk scenarios?
An organization has four different projects competing for funding to reduce overall IT risk. Which project should management defer?
A risk practitioner identifies an increasing trend of employees copying company information unrelated to their job functions to USB drives. Which of the following elements of the risk register should be updated to reflect this observation?
A penetration test reveals several vulnerabilities in a web-facing application. Which of the following should be the FIRST step in selecting a risk response?
Reviewing which of the following provides the BEST indication of an organizations risk tolerance?
What is the PRIMARY reason to periodically review key performance indicators (KPIs)?
An organization has recently hired a large number of part-time employees. During the annual audit, it was discovered that many user IDs and passwords were documented in procedure manuals for use by the part-time employees. Which of the following BEST describes this situation?
Which of the following provides the MOST useful information to senior management about risk mitigation status?
When developing a risk awareness training program, which of the following is the BEST way to promote a risk-aware culture?
Business management is seeking assurance from the CIO that IT has a plan in place for early identification of potential issues that could impact the delivery of a new application Which of the following is the BEST way to increase the chances of a successful delivery'?
Reviewing which of the following would provide the MOST useful information when preparing to evaluate the effectiveness of existing controls?
A new risk practitioner finds that decisions for implementing risk response plans are not being made. Which of the following would MOST likely explain this situation?
Where is the FIRST place a risk practitioner should look to identify accountability for a specific risk?
During the creation of an organization's IT risk management program, the BEST time to identify key risk indicators (KRIs) is while:
Which of the following BEST enables a risk practitioner to understand management's approach to organizational risk?
An identified high probability risk scenario involving a critical, proprietary business function has an annualized cost of control higher than the annual loss expectancy. Which of the following is the BEST risk response?
Which process is MOST effective to determine relevance of threats for risk scenarios?
Which of the following is MOST important to consider when assessing the likelihood that a recently discovered software vulnerability will be exploited?
Which of the following risk register elements is MOST likely to be updated if the attack surface or exposure of an asset is reduced?
The PRIMARY benefit of conducting a risk workshop using a top-down approach instead of a bottom-up approach is the ability to:
Which of the following provides the MOST useful information for developing key risk indicators (KRIs)?
Which of the following would be MOST helpful to a risk owner when making risk-aware decisions?
Which of the following risk scenarios would be the GREATEST concern as a result of a single sign-on implementation?
Which of the following is the BEST method for assessing control effectiveness against technical vulnerabilities that could be exploited to compromise an information system?
A change management process has recently been updated with new testing procedures. What is the NEXT course of action?
In an organization where each division manages risk independently, which of the following would BEST enable management of risk at the enterprise level?
A risk practitioner has observed that there is an increasing trend of users sending sensitive information by email without using encryption. Which of the following would be the MOST effective approach to mitigate the risk associated with data loss?
Which of the following is the MOST effective control to ensure user access is maintained on a least-privilege basis?
Which of the following BEST mitigates the risk of violating privacy laws when transferring personal information lo a supplier?
A company has located its computer center on a moderate earthquake fault. Which of the following is the MOST important consideration when establishing a contingency plan and an alternate processing site?
In an organization that allows employee use of social media accounts for work purposes, which of the following is the BEST way to protect company sensitive information from being exposed?
Which of the following will be MOST effective to mitigate the risk associated with the loss of company data stored on personal devices?
A global company s business continuity plan (BCP) requires the transfer of its customer information….
event of a disaster. Which of the following should be the MOST important risk consideration?
A risk practitioner is summarizing the results of a high-profile risk assessment sponsored by senior management. The BEST way to support risk-based decisions by senior management would be to:
A penetration testing team discovered an ineffectively designed access control. Who is responsible for ensuring the control design gap is remediated?
Which of the following will BEST help an organization select a recovery strategy for critical systems?
Which of the following should be of GREATEST concern when reviewing the results of an independent control assessment to determine the effectiveness of a vendor's control environment?
An unauthorized individual has socially engineered entry into an organization's secured physical premises. Which of the following is the BEST way to prevent future occurrences?
Which of the following would be MOST beneficial as a key risk indicator (KRI)?
An organization recently configured a new business division Which of the following is MOST likely to be affected?
Which of the following would be a weakness in procedures for controlling the migration of changes to production libraries?
Management has noticed storage costs have increased exponentially over the last 10 years because most users do not delete their emails. Which of the following can BEST alleviate this issue while not sacrificing security?
Which of the following emerging technologies is frequently used for botnet distributed denial of service (DDoS) attacks?
Which of the following is the BEST way for an organization to enable risk treatment decisions?
Which of the following is the BEST indication that an organization's risk management program has not reached the desired maturity level?
Which of the following changes would be reflected in an organization's risk profile after the failure of a critical patch implementation?
Which of the following key risk indicators (KRIs) is MOST effective for monitoring risk related to a bring your own device (BYOD) program?
Which of the following is the GREATEST concern related to the monitoring of key risk indicators (KRIs)?
Which of the following is MOST important to include in a Software as a Service (SaaS) vendor agreement?
Which of the following is the MOST useful information an organization can obtain from external sources about emerging threats?
An organization recently experienced a cyber attack that resulted in the loss of confidential customer data. Which of the following is the risk practitioner's BEST recommendation after recovery steps have been completed?
Which of the following is the MOST important characteristic when designing a key risk indicator (KRI)?
Which of the following risk management practices BEST facilitates the incorporation of IT risk scenarios into the enterprise-wide risk register?
Before implementing instant messaging within an organization using a public solution, which of the following should be in place to mitigate data leakage risk?
A risk practitioner is reporting on an increasing trend of ransomware attacks in the industry. Which of the following information is MOST important to include to enable an informed response decision by key stakeholders?
A risk practitioner is performing a risk assessment of recent external advancements in quantum computing. Which of the following would pose the GREATEST concern for the risk practitioner?
Which of the following would provide the MOST helpful input to develop risk scenarios associated with hosting an organization's key IT applications in a cloud environment?
Which of the following is the MOST common concern associated with outsourcing to a service provider?
In addition to the risk exposure, which of the following is MOST important for senior management to understand prior to approving the use of artificial intelligence (Al) solutions?
The BEST way for management to validate whether risk response activities have been completed is to review:
An organization has completed a risk assessment of one of its service providers. Who should be accountable for ensuring that risk responses are implemented?
Which of the following is MOST important to update when an organization's risk appetite changes?
Which of the following is the PRIMARY advantage of aligning generic risk scenarios with business objectives?
Who should be accountable for monitoring the control environment to ensure controls are effective?
Which of the following BEST enables effective risk-based decision making?
An organization has introduced risk ownership to establish clear accountability for each process. To ensure effective risk ownership, it is MOST important that:
A control process has been implemented in response to a new regulatory requirement, but has significantly reduced productivity. Which of the following is the BEST way to resolve this concern?
Following the implementation of an Internet of Things (loT) solution, a risk practitioner identifies new risk factors with impact to existing controls. Which of the following is MOST important to include in a report to stakeholders?
An organization has outsourced its backup and recovery procedures to a third-party cloud provider. Which of the following should be the risk practitioner's NEXT course of action?
The BEST way for an organization to ensure that servers are compliant to security policy is
to review:
Which of the following is MOST important when discussing risk within an organization?
Which of the following would be the result of a significant increase in the motivation of a malicious threat actor?
A risk practitioner has received an updated enterprise risk management (ERM) report showing that residual risk is now within the organization's defined appetite and tolerance levels. Which of the following is the risk practitioner's BEST course of action?
A risk assessment has identified that departments have installed their own WiFi access points on the enterprise network. Which of the following would be MOST important to include in a report to senior management?
An organization has experienced a cyber-attack that exposed customer personally identifiable information (Pll) and caused extended outages of network services. Which of the following stakeholders are MOST important to include in the cyber response team to determine response actions?
Which of the following should be the FIRST consideration when establishing a new risk governance program?
A zero-day vulnerability has been discovered in a globally used brand of hardware server that allows hackers to gain
access to affected IT systems. Which of the following is MOST likely to change as a result of this situation?
An incentive program is MOST likely implemented to manage the risk associated with loss of which organizational asset?
Which of the following provides the MOST useful input to the development of realistic risk scenarios?
Who should be accountable for authorizing information system access to internal users?
While conducting an organization-wide risk assessment, it is noted that many of the information security policies have not changed in the past three years. The BEST course of action is to:
Senior management has requested a risk practitioner's guidance on whether
a new technical control requested by a business unit is worth the investment.
Which of the following should be the MOST important consideration before
providing input?
Which of the following key performance indicators (KPis) would BEST measure me risk of a service outage when using a Software as a Service (SaaS) vendors
A business is conducting a proof of concept on a vendor’s AI technology. Which of the following is the MOST important consideration for managing risk?
A risk practitioner notes control design changes when comparing risk response to a previously approved action plan. Which of the following is MOST important for the practitioner to confirm?
To implement the MOST effective monitoring of key risk indicators (KRIs), which of the following needs to be in place?
Which of the following controls BEST helps to ensure that transaction data reaches its destination?
An organization has initiated a project to implement an IT risk management program for the first time. The BEST time for the risk practitioner to start populating the risk register is when:
A company has recently acquired a customer relationship management (CRM) application from a certified software vendor. Which of the following will BE ST help lo prevent technical vulnerabilities from being exploded?
Which of the following MUST be assessed before considering risk treatment options for a scenario with significant impact?
Key risk indicators (KRIs) are MOST useful during which of the following risk management phases?
Controls should be defined during the design phase of system development because: