Weekend Sale - Special 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: 70dumps

CRISC Questions and Answers

Question # 6

What is the MOST important consideration when selecting key performance indicators (KPIs) for control monitoring?

A.

Source information is acquired at stable cost.

B.

Source information is tailored by removing outliers.

C.

Source information is readily quantifiable.

D.

Source information is consistently available.

Full Access
Question # 7

Which of the following is the MOST important consideration when developing risk strategies?

A.

Organization's industry sector

B.

Long-term organizational goals

C.

Concerns of the business process owners

D.

History of risk events

Full Access
Question # 8

Calculation of the recovery time objective (RTO) is necessary to determine the:

A.

time required to restore files.

B.

point of synchronization

C.

priority of restoration.

D.

annual loss expectancy (ALE).

Full Access
Question # 9

A large organization recently restructured the IT department and has decided to outsource certain functions. What action should the control owners in the IT department take?

A.

Conduct risk classification for associated IT controls.

B.

Determine whether risk responses still effectively address risk.

C.

Perform vulnerability and threat assessments.

D.

Analyze and update IT control assessments.

Full Access
Question # 10

Implementing which of the following will BEST help ensure that systems comply with an established baseline before deployment?

A.

Vulnerability scanning

B.

Continuous monitoring and alerting

C.

Configuration management

D.

Access controls and active logging

Full Access
Question # 11

Which of the following BEST helps to identify significant events that could impact an organization?

Vulnerability analysis

A.

Control analysis

B.

Scenario analysis

C.

Heat map analysis

Full Access
Question # 12

An organization operates in an environment where the impact of ransomware attacks is high, with a low likelihood. After quantifying the impact of the risk associated with ransomware attacks exceeds the organization's risk appetite and tolerance, which of the following is the risk practitioner's BEST recommendation?

A.

Obtain adequate cybersecurity insurance coverage.

B.

Ensure business continuity assessments are up to date.

C.

Adjust the organization's risk appetite and tolerance.

D.

Obtain certification to a global information security standard.

Full Access
Question # 13

Which of the following is the BEST way to identify changes in the risk profile of an organization?

A.

Monitor key risk indicators (KRIs).

B.

Monitor key performance indicators (KPIs).

C.

Interview the risk owner.

D.

Conduct a gap analysis

Full Access
Question # 14

Which of the following will BEST help mitigate the risk associated with malicious functionality in outsourced application development?

A.

Perform an m-depth code review with an expert

B.

Validate functionality by running in a test environment

C.

Implement a service level agreement.

D.

Utilize the change management process.

Full Access
Question # 15

When an organization is having new software implemented under contract, which of the following is key to controlling escalating costs?

A.

Risk management

B.

Change management

C.

Problem management

D.

Quality management

Full Access
Question # 16

Which of the following is MOST important for managing ethical risk?

A.

Involving senior management in resolving ethical disputes

B.

Developing metrics to trend reported ethics violations

C.

Identifying the ethical concerns of each stakeholder

D.

Establishing a code of conduct for employee behavior

Full Access
Question # 17

Which of the following BEST indicates the risk appetite and tolerance level (or the risk associated with business interruption caused by IT system failures?

A.

Mean time to recover (MTTR)

B.

IT system criticality classification

C.

Incident management service level agreement (SLA)

D.

Recovery time objective (RTO)

Full Access
Question # 18

A maturity model will BEST indicate:

A.

confidentiality and integrity.

B.

effectiveness and efficiency.

C.

availability and reliability.

D.

certification and accreditation.

Full Access
Question # 19

Which of the following would MOST likely result in updates to an IT risk appetite statement?

A.

External audit findings

B.

Feedback from focus groups

C.

Self-assessment reports

D.

Changes in senior management

Full Access
Question # 20

A risk practitioner observes that the fraud detection controls in an online payment system do not perform as expected. Which of the following will MOST likely change as a result?

A.

Impact

B.

Residual risk

C.

Inherent risk

D.

Risk appetite

Full Access
Question # 21

Which of the following BEST enables risk mitigation associated with software licensing noncompliance?

A.

Document IT inventory management procedures.

B.

Conduct annual reviews of license expiration dates.

C.

Perform automated vulnerability scans.

D.

Implement automated IT asset management controls.

Full Access
Question # 22

A new international data privacy regulation requires personal data to be

disposed after the specified retention period, which is different from the local

regulatory requirement. Which of the following is the risk practitioner's

BEST course of action?

A.

The application code has not been version controlled.

B.

Knowledge of the applications is limited to few employees.

C.

An IT project manager is not assigned to oversee development.

D.

Controls are not applied to the applications.

Full Access
Question # 23

Which of the following is the PRIMARY role of the board of directors in corporate risk governance?

A.

Approving operational strategies and objectives

B.

Monitoring the results of actions taken to mitigate risk

C.

Ensuring the effectiveness of the risk management program

D.

Ensuring risk scenarios are identified and recorded in the risk register

Full Access
Question # 24

An organization has implemented a policy requiring staff members to take a minimum of five consecutive days' leave per year to mitigate the risk of malicious insider activities. Which of the following is the BEST key performance indicator (KPI) of the effectiveness of this policy?

A.

Percentage of staff turnover following five consecutive days of leave

B.

Average number of consecutive days of leave per staff member

C.

Number of suspected malicious activities reported since policy implementation

D.

Financial loss incurred due to malicious activities since policy implementation

Full Access
Question # 25

What is the MOST important consideration when aligning IT risk management with the enterprise risk management (ERM) framework?

A.

Risk and control ownership

B.

Senior management participation

C.

Business unit support

D.

Risk nomenclature and taxonomy

Full Access
Question # 26

Which of the following BEST mitigates reputational risk associated with disinformation campaigns against an organization?

A.

Monitoring digital platforms that disseminate inaccurate or misleading news stories

B.

Engaging public relations personnel to debunk false stories and publications

C.

Restricting the use of social media on corporate networks during specific hours

D.

Providing awareness training to understand and manage these types of attacks

Full Access
Question # 27

Which of the following BEST enables effective IT control implementation?

A.

Key risk indicators (KRIs)

B.

Documented procedures

C.

Information security policies

D.

Information security standards

Full Access
Question # 28

Which of the following is the GREATEST concern when an organization uses a managed security service provider as a firewall administrator?

A.

Exposure of log data

B.

Lack of governance

C.

Increased number of firewall rules

D.

Lack of agreed-upon standards

Full Access
Question # 29

A risk owner has identified a risk with high impact and very low likelihood. The potential loss is covered by insurance. Which of the following should the risk practitioner do NEXT?

A.

Recommend avoiding the risk.

B.

Validate the risk response with internal audit.

C.

Update the risk register.

D.

Evaluate outsourcing the process.

Full Access
Question # 30

Which of the following is MOST important for effective communication of a risk profile to relevant stakeholders?

A.

Emphasizing risk in the risk profile that is related to critical business activities

B.

Customizing the presentation of the risk profile to the intended audience

C.

Including details of risk with high deviation from the risk appetite

D.

Providing information on the efficiency of controls for risk mitigation

Full Access
Question # 31

Which of the following should be the FIRST step when a company is made aware of new regulatory requirements impacting IT?

A.

Perform a gap analysis.

B.

Prioritize impact to the business units.

C.

Perform a risk assessment.

D.

Review the risk tolerance and appetite.

Full Access
Question # 32

Which of the following is MOST important to determine as a result of a risk assessment?

A.

Process ownership

B.

Risk appetite statement

C.

Risk tolerance levels

D.

Risk response options

Full Access
Question # 33

Which of the following provides the BEST evidence that risk responses have been executed according to their risk action plans?

A.

Risk policy review

B.

Business impact analysis (B1A)

C.

Control catalog

D.

Risk register

Full Access
Question # 34

Which of the following provides the MOST insight into an organization's IT threat exposure?

A.

Industry benchmarks

B.

Risk assessment reports

C.

External audit results

D.

Tabletop exercises

Full Access
Question # 35

Which of the following is the MOST important information to be communicated during security awareness training?

A.

Management's expectations

B.

Corporate risk profile

C.

Recent security incidents

D.

The current risk management capability

Full Access
Question # 36

A multinational organization is considering implementing standard background checks to' all new employees A KEY concern regarding this approach

A.

fail to identity all relevant issues.

B.

be too costly

C.

violate laws in other countries

D.

be too line consuming

Full Access
Question # 37

Which of the following is the BEST metric to measure the effectiveness of an organization's disaster recovery program?

A.

Percentage of applications subject to disaster recovery tests

B.

Number of personnel dedicated to the disaster recovery program

C.

Number of disaster recovery tests performed per year

D.

Percentage of systems meeting defined recovery objectives

Full Access
Question # 38

Which of the following is the MAIN benefit to an organization using key risk indicators (KRIs)?

A.

KRIs assist in the preparation of the organization's risk profile.

B.

KRIs signal that a change in the control environment has occurred.

C.

KRIs provide a basis to set the risk appetite for an organization

D.

KRIs provide an early warning that a risk threshold is about to be reached.

Full Access
Question # 39

A cloud service provider has completed upgrades to its cloud infrastructure to enhance service availability. Which of the following is the MOST important key risk indicator (KRI) for management to monitor?

A.

Peak demand on the cloud service during business hours

B.

Percentage of technology upgrades resulting in security breaches

C.

Number of incidents with downtime exceeding contract threshold

D.

Percentage of servers not patched per policy

Full Access
Question # 40

Which of the following functions can be performed by any of the three lines of defense?

A.

Monitoring control effectiveness

B.

Operating control activities

C.

Designing control functions

D.

Assuring control processes

Full Access
Question # 41

Of the following, who should be responsible for determining the inherent risk rating of an application?

A.

Application owner

B.

Senior management

C.

Risk practitioner

D.

Business process owner

Full Access
Question # 42

Which of the following is the PRIMARY reason to perform ongoing risk assessments?

A.

Emerging risk must be continuously reported to management.

B.

New system vulnerabilities emerge at frequent intervals.

C.

The risk environment is subject to change.

D.

The information security budget must be justified.

Full Access
Question # 43

An organization retains footage from its data center security camera for 30 days when the policy requires 90-day retention The business owner challenges whether the situation is worth remediating Which of the following is the risk manager s BEST response'

A.

Identify the regulatory bodies that may highlight this gap

B.

Highlight news articles about data breaches

C.

Evaluate the risk as a measure of probable loss

D.

Verify if competitors comply with a similar policy

Full Access
Question # 44

Which of the following is the BEST indicator of the effectiveness of a control?

A.

Scope of the control coverage

B.

The number of exceptions granted

C.

Number of steps necessary to operate process

D.

Number of control deviations detected

Full Access
Question # 45

Which of the following should a risk practitioner do FIRST when an organization decides to use a cloud service?

A.

Review the vendor selection process and vetting criteria.

B.

Assess whether use of service falls within risk tolerance thresholds.

C.

Establish service level agreements (SLAs) with the vendor.

D.

Check the contract for appropriate security risk and control provisions.

Full Access
Question # 46

Which stakeholders are PRIMARILY responsible for determining enterprise IT risk appetite?

A.

Audit and compliance management

B.

The chief information officer (CIO) and the chief financial officer (CFO)

C.

Enterprise risk management and business process owners

D.

Executive management and the board of directors

Full Access
Question # 47

An organization's IT department wants to complete a proof of concept (POC) for a security tool. The project lead has asked for approval to use the production data for testing purposes as it will yield the best results. Which of the following is the risk practitioner's BEST recommendation?

A.

Accept the risk of using the production data to ensure accurate results.

B.

Assess the risk of using production data for testing before making a decision.

C.

Benchmark against what peer organizations are doing with POC testing environments.

D.

Deny the request, as production data should not be used for testing purposes.

Full Access
Question # 48

When using a third party to perform penetration testing, which of the following is the MOST important control to minimize operational impact?

A.

Perform a background check on the vendor.

B.

Require the vendor to sign a nondisclosure agreement.

C.

Require the vendor to have liability insurance.

D.

Clearly define the project scope

Full Access
Question # 49

Which of the following is the BEST key performance indicator (KPI) to measure how effectively risk management practices are embedded in the project management office (PMO)?

A.

Percentage of projects with key risk accepted by the project steering committee

B.

Reduction in risk policy noncompliance findings

C.

Percentage of projects with developed controls on scope creep

D.

Reduction in audits involving external risk consultants

Full Access
Question # 50

Which of the following is the MOST effective way to help ensure future risk levels do not exceed the organization's risk appetite?

A.

Developing contingency plans for key processes

B.

Implementing key performance indicators (KPIs)

C.

Adding risk triggers to entries in the risk register

D.

Establishing a series of key risk indicators (KRIs)

Full Access
Question # 51

An IT risk practitioner has determined that mitigation activities differ from an approved risk action plan. Which of the following is the risk practitioner's BEST course of action?

A.

Report the observation to the chief risk officer (CRO).

B.

Validate the adequacy of the implemented risk mitigation measures.

C.

Update the risk register with the implemented risk mitigation actions.

D.

Revert the implemented mitigation measures until approval is obtained

Full Access
Question # 52

A large organization is replacing its enterprise resource planning (ERP) system and has decided not to deploy the payroll module of the new system. Instead, the current payroll system will continue to be

used. Of the following, who should own the risk if the ERP and payroll system fail to operate as expected?

A.

The business owner

B.

The ERP administrator

C.

The project steering committee

D.

The IT project manager

Full Access
Question # 53

An organization is reviewing a contract for a Software as a Service (SaaS) sales application with a 99.9% uptime service level agreement (SLA). Which of the following BEST describes ownership of availability risk?

A.

The risk is shared by both organizations.

B.

The liability for the risk is owned by the cloud provider.

C.

The risk is transferred to the cloud provider.

D.

The liability for the risk is owned by the sales department.

Full Access
Question # 54

Which of the following BEST assists in justifying an investment in automated controls?

A.

Cost-benefit analysis

B.

Alignment of investment with risk appetite

C.

Elimination of compensating controls

D.

Reduction in personnel costs

Full Access
Question # 55

Which of the following is the PRIMARY benefit of using a risk map with stakeholders?

A.

Consolidates risk response options by severity

B.

Aligns risk appetite with business objectives

C.

Correlates risk scenarios to risk appetite

D.

Defines an organizational risk taxonomy

Full Access
Question # 56

When is the BEST to identify risk associated with major project to determine a mitigation plan?

A.

Project execution phase

B.

Project initiation phase

C.

Project closing phase

D.

Project planning phase

Full Access
Question # 57

A risk practitioner has recently become aware of unauthorized use of confidential personal information within the organization. Which of the following should the risk practitioner do FIRST?

A.

Establish database activity monitoring

B.

Report the incident to the chief privacy officer (CPO)

C.

Invoke the incident response plan

D.

Escalate the issue to the data owner

Full Access
Question # 58

When communicating changes in the IT risk profile, which of the following should be included to BEST enable stakeholder decision making?

A.

List of recent incidents affecting industry peers

B.

Results of external attacks and related compensating controls

C.

Gaps between current and desired states of the control environment

D.

Review of leading IT risk management practices within the industry

Full Access
Question # 59

Which of the following would BEST facilitate the implementation of data classification requirements?

A.

Implementing a data toss prevention (DLP) solution

B.

Assigning a data owner

C.

Scheduling periodic audits

D.

Implementing technical controls over the assets

Full Access
Question # 60

When reviewing a risk response strategy, senior management's PRIMARY focus should be placed on the:

A.

cost-benefit analysis.

B.

investment portfolio.

C.

key performance indicators (KPIs).

D.

alignment with risk appetite.

Full Access
Question # 61

Which of the following BEST represents a critical threshold value for a key control indicator (KCI)?

A.

The value at which control effectiveness would fail

B.

Thresholds benchmarked to peer organizations

C.

A typical operational value

D.

A value that represents the intended control state

Full Access
Question # 62

Which of the following would be MOST helpful to an information security management team when allocating resources to mitigate exposures?

A.

Relevant risk case studies

B.

Internal audit findings

C.

Risk assessment results

D.

Penetration testing results

Full Access
Question # 63

A risk owner should be the person accountable for:

A.

the risk management process

B.

managing controls.

C.

implementing actions.

D.

the business process.

Full Access
Question # 64

Which of the following would prompt changes in key risk indicator {KRI) thresholds?

A.

Changes to the risk register

B.

Changes in risk appetite or tolerance

C.

Modification to risk categories

D.

Knowledge of new and emerging threats

Full Access
Question # 65

The PRIMARY reason for tracking the status of risk mitigation plans is to ensure:

A.

the proposed controls are implemented as scheduled.

B.

security controls are tested prior to implementation.

C.

compliance with corporate policies.

D.

the risk response strategy has been decided.

Full Access
Question # 66

A risk practitioner wants to identify potential risk events that affect the continuity of a critical business process. Which of the following should the risk practitioner do FIRST?

A.

Evaluate current risk management alignment with relevant regulations

B.

Determine if business continuity procedures are reviewed and updated on a regular basis

C.

Conduct a benchmarking exercise against industry peers

D.

Review the methodology used to conduct the business impact analysis (BIA)

Full Access
Question # 67

Which of the following is MOST important for successful incident response?

A.

The quantity of data logged by the attack control tools

B.

Blocking the attack route immediately

C.

The ability to trace the source of the attack

D.

The timeliness of attack recognition

Full Access
Question # 68

Which of the following BEST measures the efficiency of an incident response process?

A.

Number of incidents escalated to management

B.

Average time between changes and updating of escalation matrix

C.

Average gap between actual and agreed response times

D.

Number of incidents lacking responses

Full Access
Question # 69

Which of the following is a risk practitioner's BEST recommendation upon learning that an employee inadvertently disclosed sensitive data to a vendor?

A.

Enroll the employee in additional security training.

B.

Invoke the incident response plan.

C.

Conduct an internal audit.

D.

Instruct the vendor to delete the data.

Full Access
Question # 70

An organization is concerned that its employees may be unintentionally disclosing data through the use of social media sites. Which of the following will MOST effectively mitigate tins risk?

A.

Requiring the use of virtual private networks (VPNs)

B.

Establishing a data classification policy

C.

Conducting user awareness training

D.

Requiring employee agreement of the acceptable use policy

Full Access
Question # 71

Which of the following should be the PRIMARY objective of promoting a risk-aware culture within an organization?

A.

Better understanding of the risk appetite

B.

Improving audit results

C.

Enabling risk-based decision making

D.

Increasing process control efficiencies

Full Access
Question # 72

Senior leadership has set guidelines for the integration of a new acquisition. The guidelines allow for a variation in the level of risk-taking. The variation indicates which of the following risk management concepts?

A.

Risk tolerance

B.

Risk appetite

C.

Risk sensitivity

D.

Risk velocity

Full Access
Question # 73

A control owner has completed a year-long project To strengthen existing controls. It is MOST important for the risk practitioner to:

A.

update the risk register to reflect the correct level of residual risk.

B.

ensure risk monitoring for the project is initiated.

C.

conduct and document a business impact analysis (BIA).

D.

verify cost-benefit of the new controls being implemented.

Full Access
Question # 74

Which of the following should be the PRIMARY driver for an organization on a multi-year cloud implementation to publish a cloud security policy?

A.

Evaluating gaps in the on-premise and cloud security profiles

B.

Establishing minimum cloud security requirements

C.

Enforcing compliance with cloud security parameters

D.

Educating IT staff on variances between on premise and cloud security

Full Access
Question # 75

Which of the following is MOST helpful in identifying new risk exposures due to changes in the business environment?

A.

Standard operating procedures

B.

SWOT analysis

C.

Industry benchmarking

D.

Control gap analysis

Full Access
Question # 76

An organization is planning to move its application infrastructure from on-premises to the cloud. Which of the following is the BEST course of the actin to address the risk associated with data transfer if the relationship is terminated with the vendor?

A.

Meet with the business leaders to ensure the classification of their transferred data is in place

B.

Ensure the language in the contract explicitly states who is accountable for each step of the data transfer process

C.

Collect requirements for the environment to ensure the infrastructure as a service (IaaS) is configured appropriately.

D.

Work closely with the information security officer to ensure the company has the proper security controls in place.

Full Access
Question # 77

Which of the following BEST enables an organization to address risk associated with technical complexity?

A.

Documenting system hardening requirements

B.

Minimizing dependency on technology

C.

Aligning with a security architecture

D.

Establishing configuration guidelines

Full Access
Question # 78

Which of the following should be the GREATEST concern for an organization that uses open source software applications?

A.

Lack of organizational policy regarding open source software

B.

Lack of reliability associated with the use of open source software

C.

Lack of monitoring over installation of open source software in the organization

D.

Lack of professional support for open source software

Full Access
Question # 79

it was determined that replication of a critical database used by two business units failed. Which of the following should be of GREATEST concern1?

A.

The underutilization of the replicated Iink

B.

The cost of recovering the data

C.

The lack of integrity of data

D.

The loss of data confidentiality

Full Access
Question # 80

Which of the following is the MOST important objective of regularly presenting the project risk register to the project steering committee?

A.

To allocate budget for resolution of risk issues

B.

To determine if new risk scenarios have been identified

C.

To ensure the project timeline is on target

D.

To track the status of risk mitigation actions

Full Access
Question # 81

Which of the following is the BEST control to detect an advanced persistent threat (APT)?

A.

Utilizing antivirus systems and firewalls

B.

Conducting regular penetration tests

C.

Monitoring social media activities

D.

Implementing automated log monitoring

Full Access
Question # 82

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of IT policies? The number of:

A.

IT policy exceptions granted.

B.

Senior management approvals.

C.

Key technology controls covered by IT policies.

D.

Processes covered by IT policies.

Full Access
Question # 83

After the review of a risk record, internal audit questioned why the risk was lowered from medium to low. Which of the following is the BEST course of action in responding to this inquiry?

A.

Obtain industry benchmarks related to the specific risk.

B.

Provide justification for the lower risk rating.

C.

Notify the business at the next risk briefing.

D.

Reopen the risk issue and complete a full assessment.

Full Access
Question # 84

To communicate the risk associated with IT in business terms, which of the following MUST be defined?

A.

Compliance objectives

B.

Risk appetite of the organization

C.

Organizational objectives

D.

Inherent and residual risk

Full Access
Question # 85

Which of the following would MOST effectively reduce the potential for inappropriate exposure of vulnerabilities documented in an organization's risk register?

A.

Limit access to senior management only.

B.

Encrypt the risk register.

C.

Implement role-based access.

D.

Require users to sign a confidentiality agreement.

Full Access
Question # 86

Which of the following is the BEST course of action to reduce risk impact?

A.

Create an IT security policy.

B.

Implement corrective measures.

C.

Implement detective controls.

D.

Leverage existing technology

Full Access
Question # 87

Who should be responsible (of evaluating the residual risk after a compensating control has been

A.

Compliance manager

B.

Risk owner

C.

Control owner

D.

Risk practitioner

Full Access
Question # 88

Which of the following is of GREATEST concern when uncontrolled changes are made to the control environment?

A.

A decrease in control layering effectiveness

B.

An increase in inherent risk

C.

An increase in control vulnerabilities

D.

An increase in the level of residual risk

Full Access
Question # 89

Which of the following is the BEST source for identifying key control indicators (KCIs)?

A.

Privileged user activity monitoring controls

B.

Controls mapped to organizational risk scenarios

C.

Recent audit findings of control weaknesses

D.

A list of critical security processes

Full Access
Question # 90

Which of the following is MOST important for a risk practitioner to consider when evaluating plans for changes to IT services?

A.

Change testing schedule

B.

Impact assessment of the change

C.

Change communication plan

D.

User acceptance testing (UAT)

Full Access
Question # 91

Which of the following is the MOST effective way to incorporate stakeholder concerns when developing risk scenarios?

A.

Evaluating risk impact

B.

Establishing key performance indicators (KPIs)

C.

Conducting internal audits

D.

Creating quarterly risk reports

Full Access
Question # 92

Which of the following would MOST likely require a risk practitioner to update the risk register?

A.

An alert being reported by the security operations center.

B.

Development of a project schedule for implementing a risk response

C.

Completion of a project for implementing a new control

D.

Engagement of a third party to conduct a vulnerability scan

Full Access
Question # 93

A risk practitioner discovers that an IT operations team manager bypassed web filtering controls by using a mobile device, in violation of the network security policy. Which of the following should the risk practitioner do FIRST?

A.

Report the incident.

B.

Plan a security awareness session.

C.

Assess the new risk.

D.

Update the risk register.

Full Access
Question # 94

The operational risk associated with attacks on a web application should be owned by the individual in charge of:

A.

network operations.

B.

the cybersecurity function.

C.

application development.

D.

the business function.

Full Access
Question # 95

Which of the following is MOST important to ensure before using risk reports in decision making?

A.

Root cause analysis is included.

B.

Risk analysis results are validated.

C.

Real-time risk information is provided.

D.

Quantitative risk data is provided.

Full Access
Question # 96

An organization has completed a project to implement encryption on all databases that host customer data. Which of the following elements of the risk register should be updated the reflect this change?

A.

Risk likelihood

B.

Inherent risk

C.

Risk appetite

D.

Risk tolerance

Full Access
Question # 97

Which of the following can be used to assign a monetary value to risk?

A.

Annual loss expectancy (ALE)

B.

Business impact analysis

C.

Cost-benefit analysis

D.

Inherent vulnerabilities

Full Access
Question # 98

As part of an overall IT risk management plan, an IT risk register BEST helps management:

A.

align IT processes with business objectives.

B.

communicate the enterprise risk management policy.

C.

stay current with existing control status.

D.

understand the organizational risk profile.

Full Access
Question # 99

An external security audit has reported multiple findings related to control noncompliance. Which of the following would be MOST important for the risk practitioner to communicate to senior management?

A.

A recommendation for internal audit validation

B.

Plans for mitigating the associated risk

C.

Suggestions for improving risk awareness training

D.

The impact to the organization’s risk profile

Full Access
Question # 100

The MAIN purpose of reviewing a control after implementation is to validate that the control:

A.

operates as intended.

B.

is being monitored.

C.

meets regulatory requirements.

D.

operates efficiently.

Full Access
Question # 101

The PRIMARY benefit of selecting an appropriate set of key risk indicators (KRIs) is that they:

A.

serve as a basis for measuring risk appetite.

B.

align with the organization's risk profile.

C.

provide a warning of emerging high-risk conditions.

D.

provide data for updating the risk register.

Full Access
Question # 102

Which of the following is MOST important to have in place to ensure the effectiveness of risk and security metrics reporting?

A.

Organizational reporting process

B.

Incident reporting procedures

C.

Regularly scheduled audits

D.

Incident management policy

Full Access
Question # 103

Which of the following is the GREATEST benefit of using IT risk scenarios?

A.

They support compliance with regulations.

B.

They provide evidence of risk assessment.

C.

They facilitate communication of risk.

D.

They enable the use of key risk indicators (KRls)

Full Access
Question # 104

Which of the following is the BEST metric to demonstrate the effectiveness of an organization's change management process?

A.

Increase in the frequency of changes

B.

Percent of unauthorized changes

C.

Increase in the number of emergency changes

D.

Average time to complete changes

Full Access
Question # 105

Who is the BEST person to the employee personal data?

A.

Human resources (HR) manager

B.

System administrator

C.

Data privacy manager

D.

Compliance manager

Full Access
Question # 106

To reduce costs, an organization is combining the second and third tines of defense in a new department that reports to a recently appointed C-level executive. Which of the following is the GREATEST concern with this situation?

A.

The risk governance approach of the second and third lines of defense may differ.

B.

The independence of the internal third line of defense may be compromised.

C.

Cost reductions may negatively impact the productivity of other departments.

D.

The new structure is not aligned to the organization's internal control framework.

Full Access
Question # 107

An organization's stakeholders are unable to agree on appropriate risk responses. Which of the following would be the BEST course of action?

A.

Escalate to senior management.

B.

Identify a risk transfer option.

C.

Reassess risk scenarios.

D.

Benchmark with similar industries.

Full Access
Question # 108

An organization is implementing internet of Things (loT) technology to control temperature and lighting in its headquarters. Which of the following should be of GREATEST concern?

A.

Insufficient network isolation

B.

impact on network performance

C.

insecure data transmission protocols

D.

Lack of interoperability between sensors

Full Access
Question # 109

Following an acquisition, the acquiring company's risk practitioner has been asked to update the organization's IT risk profile What is the MOST important information to review from the acquired company to facilitate this task?

A.

Internal and external audit reports

B.

Risk disclosures in financial statements

C.

Risk assessment and risk register

D.

Business objectives and strategies

Full Access
Question # 110

An organization has outsourced its customer management database to an external service provider. Of the following, who should be accountable for ensuring customer data privacy?

A.

The organization's business process owner

B.

The organization's information security manager

C.

The organization's vendor management officer

D.

The vendor's risk manager

Full Access
Question # 111

Which of the following should be the PRIMARY input to determine risk tolerance?

A.

Regulatory requirements

B.

Organizational objectives

C.

Annual loss expectancy (ALE)

D.

Risk management costs

Full Access
Question # 112

When assessing the maturity level of an organization's risk management framework, which of the following deficiencies should be of GREATEST concern to a risk practitioner?

A.

Unclear organizational risk appetite

B.

Lack of senior management participation

C.

Use of highly customized control frameworks

D.

Reliance on qualitative analysis methods

Full Access
Question # 113

Which of the following should be a risk practitioner's NEXT step after learning of an incident that has affected a competitor?

A.

Activate the incident response plan.

B.

Implement compensating controls.

C.

Update the risk register.

D.

Develop risk scenarios.

Full Access
Question # 114
A.

Key performance indicators (KPIs)

B.

Key risk indicator (KRI) thresholds

C.

Risk trends

D.

Risk objectives

Full Access
Question # 115

Which of the following should be of MOST concern to a risk practitioner reviewing an organization risk register after the completion of a series of risk assessments?

A.

Several risk action plans have missed target completion dates.

B.

Senior management has accepted more risk than usual.

C.

Risk associated with many assets is only expressed in qualitative terms.

D.

Many risk scenarios are owned by the same senior manager.

Full Access
Question # 116

Which of the following is MOST effective against external threats to an organizations confidential information?

A.

Single sign-on

B.

Data integrity checking

C.

Strong authentication

D.

Intrusion detection system

Full Access
Question # 117

An organization has operations in a location that regularly experiences severe weather events. Which of the following would BEST help to mitigate the risk to operations?

A.

Prepare a cost-benefit analysis to evaluate relocation.

B.

Prepare a disaster recovery plan (DRP).

C.

Conduct a business impact analysis (BIA) for an alternate location.

D.

Develop a business continuity plan (BCP).

Full Access
Question # 118

An organization recently implemented an extensive risk awareness program after a cybersecurity incident. Which of the following is MOST likely to be affected by the implementation of the program?

A.

Inherent risk

B.

Risk appetite

C.

Threat landscape

D.

Residual risk

Full Access
Question # 119

Which of the following is MOST important to sustainable development of secure IT services?

A.

Security training for systems development staff

B.

\Well-documented business cases

C.

Security architecture principles

D.

Secure coding practices

Full Access
Question # 120

To mitigate the risk of using a spreadsheet to analyze financial data, IT has engaged a third-party vendor to deploy a standard application to automate the process. Which of the following parties should own the risk associated with calculation errors?

A.

business owner

B.

IT department

C.

Risk manager

D.

Third-party provider

Full Access
Question # 121

An organization has outsourced its backup and recovery procedures to a cloud service provider. The provider's controls are inadequate for the organization's level of risk tolerance. As a result, the organization has internally implemented additional backup and recovery controls. Which risk response has been adopted?

A.

Mitigation

B.

Acceptance

C.

Transfer

D.

Avoidance

Full Access
Question # 122

Which of the following is the BEST key performance indicator (KPI) to measure the ability to deliver uninterrupted IT services?

A.

Mean time between failures (MTBF)

B.

Mean time to recover (MTTR)

C.

Planned downtime

D.

Unplanned downtime

Full Access
Question # 123

An IT operations team implements disaster recovery controls based on decisions from application owners regarding the level of resiliency needed. Who is the risk owner in this scenario?

A.

Business resilience manager

B.

Disaster recovery team lead

C.

Application owner

D.

IT operations manager

Full Access
Question # 124

Which of the following is the BEST way to ensure adequate resources will be allocated to manage identified risk?

A.

Prioritizing risk within each business unit

B.

Reviewing risk ranking methodology

C.

Promoting an organizational culture of risk awareness

D.

Assigning risk ownership to appropriate roles

Full Access
Question # 125

The BEST way to mitigate the high cost of retrieving electronic evidence associated with potential litigation is to implement policies and procedures for.

A.

data logging and monitoring

B.

data mining and analytics

C.

data classification and labeling

D.

data retention and destruction

Full Access
Question # 126

The cost of maintaining a control has grown to exceed the potential loss. Which of the following BEST describes this situation?

A.

Insufficient risk tolerance

B.

Optimized control management

C.

Effective risk management

D.

Over-controlled environment

Full Access
Question # 127

Which of the following is MOST important to consider when determining risk appetite?

A.

Service level agreements (SLAs)

B.

Risk heat map

C.

IT capacity

D.

Risk culture

Full Access
Question # 128

What is the BEST information to present to business control owners when justifying costs related to controls?

A.

Loss event frequency and magnitude

B.

The previous year's budget and actuals

C.

Industry benchmarks and standards

D.

Return on IT security-related investments

Full Access
Question # 129

Which of the following is the PRIMARY purpose for ensuring senior management understands the organization’s risk universe in relation to the IT risk management program?

A.

To define effective enterprise IT risk appetite and tolerance levels

B.

To execute the IT risk management strategy in support of business objectives

C.

To establish business-aligned IT risk management organizational structures

D.

To assess the capabilities and maturity of the organization’s IT risk management efforts

Full Access
Question # 130

The GREATEST concern when maintaining a risk register is that:

A.

impacts are recorded in qualitative terms.

B.

executive management does not perform periodic reviews.

C.

IT risk is not linked with IT assets.

D.

significant changes in risk factors are excluded.

Full Access
Question # 131

A poster has been displayed in a data center that reads. "Anyone caught taking photographs in the data center may be subject to disciplinary action." Which of the following control types has been implemented?

A.

Corrective

B.

Detective

C.

Deterrent

D.

Preventative

Full Access
Question # 132

A risk practitioner is defining metrics for security threats that were not identified by antivirus software. Which type of metric is being developed?

A.

Key control indicator (KCI)

B.

Key risk indicator (KRI)

C.

Operational level agreement (OLA)

D.

Service level agreement (SLA)

Full Access
Question # 133

Who should be responsible for strategic decisions on risk management?

A.

Chief information officer (CIO)

B.

Executive management team

C.

Audit committee

D.

Business process owner

Full Access
Question # 134

During a post-implementation review for a new system, users voiced concerns about missing functionality. Which of the following is the BEST way for the organization to avoid this situation in the future?

A.

Test system reliability and performance.

B.

Adopt an Agile development approach.

C.

Conduct user acceptance testing (UAT).

D.

Adopt a phased changeover approach.

Full Access
Question # 135

The PRIMARY objective of collecting information and reviewing documentation when performing periodic risk analysis should be to:

A.

Identify new or emerging risk issues.

B.

Satisfy audit requirements.

C.

Survey and analyze historical risk data.

D.

Understand internal and external threat agents.

Full Access
Question # 136

From a risk management perspective, which of the following is the PRIMARY benefit of using automated system configuration validation tools?

A.

Residual risk is reduced.

B.

Staff costs are reduced.

C.

Operational costs are reduced.

D.

Inherent risk is reduced.

Full Access
Question # 137

An organization has outsourced a critical process involving highly regulated data to a third party with servers located in a foreign country. Who is accountable for the confidentiality of this data?

A.

Third-party data custodian

B.

Data custodian

C.

Regional office executive

D.

Data owner

Full Access
Question # 138

A global organization is considering the transfer of its customer information systems to an overseas cloud service provider in the event of a disaster. Which of the following should be the MOST important risk consideration?

A.

Regulatory restrictions for cross-border data transfer

B.

Service level objectives in the vendor contract

C.

Organizational culture differences between each country

D.

Management practices within each company

Full Access
Question # 139

Which of the following is a PRIMARY benefit of engaging the risk owner during the risk assessment process?

A.

Identification of controls gaps that may lead to noncompliance

B.

Prioritization of risk action plans across departments

C.

Early detection of emerging threats

D.

Accurate measurement of loss impact

Full Access
Question # 140

An organization has engaged a third party to provide an Internet gateway encryption service that protects sensitive data uploaded to a cloud service. This is an example of risk:

A.

mitigation.

B.

avoidance.

C.

transfer.

D.

acceptance.

Full Access
Question # 141

A risk practitioner is developing a set of bottom-up IT risk scenarios. The MOST important time to involve business stakeholders is when:

A.

updating the risk register

B.

documenting the risk scenarios.

C.

validating the risk scenarios

D.

identifying risk mitigation controls.

Full Access
Question # 142

Which of the following is the PRIMARY advantage of having a single integrated business continuity plan (BCP) rather than each business unit developing its own BCP?

A.

It provides assurance of timely business process response and effectiveness.

B.

It supports effective use of resources and provides reasonable confidence of recoverability.

C.

It enables effective BCP maintenance and updates to reflect organizational changes.

D.

It decreases the risk of downtime and operational losses in the event of a disruption.

Full Access
Question # 143

Of the following, who is responsible for approval when a change in an application system is ready for release to production?

A.

Information security officer

B.

IT risk manager

C.

Business owner

D.

Chief risk officer (CRO)

Full Access
Question # 144

A new software package that could help mitigate risk in an organization has become available. Which of the following is the risk practitioner's BEST course of action?

A.

Perform a business impact analysis (BIA).

B.

Perform a cost-benefit analysis.

C.

Review industry best practice.

D.

Review risk governance policies.

Full Access
Question # 145

Which of the following would BEST assist in reconstructing the sequence of events following a security incident across multiple IT systems in the organization's network?

A.

Network monitoring infrastructure

B.

Centralized vulnerability management

C.

Incident management process

D.

Centralized log management

Full Access
Question # 146

Which of the following analyses is MOST useful for prioritizing risk scenarios associated with loss of IT assets?

A.

SWOT analysis

B.

Business impact analysis (BIA)

C.

Cost-benefit analysis

D.

Root cause analysis

Full Access
Question # 147

Which of the following is the MOST important factor when deciding on a control to mitigate risk exposure?

A.

Relevance to the business process

B.

Regulatory compliance requirements

C.

Cost-benefit analysis

D.

Comparison against best practice

Full Access
Question # 148

Which of the following would be a risk practitioner's MOST important action upon learning that an IT control has failed?

A.

Implement a replacement control.

B.

Adjust residual risk rating.

C.

Escalate to senior management.

D.

Review compensating controls.

Full Access
Question # 149

Which of the following is the PRIMARY objective for automating controls?

A.

Reducing the need for audit reviews

B.

Facilitating continuous control monitoring

C.

Improving control process efficiency

D.

Complying with functional requirements

Full Access
Question # 150

Which of the following criteria associated with key risk indicators (KRIs) BEST enables effective risk monitoring?

A.

Approval by senior management

B.

Low cost of development and maintenance

C.

Sensitivity to changes in risk levels

D.

Use of industry risk data sources

Full Access
Question # 151

An organizational policy requires critical security patches to be deployed in production within three weeks of patch availability. Which of the following is the BEST metric to verify adherence to the policy?

A.

Maximum time gap between patch availability and deployment

B.

Percentage of critical patches deployed within three weeks

C.

Minimum time gap between patch availability and deployment

D.

Number of critical patches deployed within three weeks

Full Access
Question # 152

A risk practitioner recently discovered that sensitive data from the production environment is required for testing purposes in non-production environments. Which of the following i the BEST recommendation to address this situation?

A.

Enable data encryption in the test environment

B.

Implement equivalent security in the test environment.

C.

Prevent the use of production data for test purposes

D.

Mask data before being transferred to the test environment.

Full Access
Question # 153

Which of the following is the MOST important factor to consider when determining whether to approve a policy exception request?

A.

Volume of exceptions

B.

Lack of technical resources

C.

Cost of noncompliance

D.

Time required to implement controls

Full Access
Question # 154

Which of the following will BEST help to ensure implementation of corrective action plans?

A.

Establishing employee awareness training

B.

Assigning accountability to risk owners

C.

Selling target dates to complete actions

D.

Contracting to third parties

Full Access
Question # 155

Which of the following is the MOST relevant information to include in a risk management strategy?

A.

Quantified risk triggers

B.

Cost of controls

C.

Regulatory requirements

D.

Organizational goals

Full Access
Question # 156

An organization has committed to a business initiative with the knowledge that the risk exposure is higher than the risk appetite. Which of the following is the risk practitioner's MOST important action related to this decision?

A.

Recommend rejection of the initiative.

B.

Change the level of risk appetite.

C.

Document formal acceptance of the risk.

D.

Initiate a reassessment of the risk.

Full Access
Question # 157

An organization has updated its acceptable use policy to mitigate the risk of employees disclosing confidential information. Which of the following is the BEST way to reinforce the effectiveness of this policy?

A.

Communicate sanctions for policy violations to all staff.

B.

Obtain signed acceptance of the new policy from employees.

C.

Train all staff on relevant information security best practices.

D.

Implement data loss prevention (DLP) within the corporate network.

Full Access
Question # 158

When reviewing a business continuity plan (BCP). which of the following would be the MOST significant deficiency?

A.

BCP testing is net in conjunction with the disaster recovery plan (DRP)

B.

Recovery time objectives (RTOs) do not meet business requirements.

C.

BCP is often tested using the walk-through method.

D.

Each business location has separate, inconsistent BCPs.

Full Access
Question # 159

Which of the following is the ULTIMATE goal of conducting a privacy impact analysis (PIA)?

A.

To identify gaps in data protection controls

B.

To develop a customer notification plan

C.

To identify personally identifiable information (Pll)

D.

To determine gaps in data identification processes

Full Access
Question # 160

A robotic process automation (RPA) project has implemented new robots to enhance the efficiency of a sales business process. Which of the following provides the BEST evidence that the new controls have been implemented successfully?

A.

A post-implementation review has been conducted by key personnel.

B.

A qualified independent party assessed the new controls as effective.

C.

Senior management has signed off on the design of the controls.

D.

Robots have operated without human interference on a daily basis.

Full Access
Question # 161

Which of the following is MOST helpful in defining an early-warning threshold associated with insufficient network bandwidth’’?

A.

Average bandwidth usage

B.

Peak bandwidth usage

C.

Total bandwidth usage

D.

Bandwidth used during business hours

Full Access
Question # 162
A.

Conduct targeted risk assessments.

B.

Recommend management accept the low risk scenarios.

C.

Assess management's risk tolerance.

D.

Propose mitigating controls.

Full Access
Question # 163

Which of the following would BEST facilitate the maintenance of data classification requirements?

A.

Scheduling periodic audits

B.

Assigning a data custodian

C.

Implementing technical controls over the assets

D.

Establishing a data loss prevention (DLP) solution

Full Access
Question # 164

When determining the accuracy of a key risk indicator (KRI), it is MOST important that the indicator:

A.

is correlated to risk and tracks variances in the risk.

B.

is assigned to IT processes and projects with a low level of risk.

C.

has a high correlation with the process outcome.

D.

triggers response based on risk thresholds.

Full Access
Question # 165

Which organization is implementing a project to automate the purchasing process, including the modification of approval controls. Which of the following tasks is lie responsibility of the risk practitioner*?

A.

Verify that existing controls continue to properly mitigate defined risk

B.

Test approval process controls once the project is completed

C.

Update the existing controls for changes in approval processes from this project

D.

Perform a gap analysis of the impacted control processes

Full Access
Question # 166

A root because analysis indicates a major service disruption due to a lack of competency of newly hired IT system administrators Who should be accountable for resolving the situation?

A.

HR training director

B.

Business process owner

C.

HR recruitment manager

D.

Chief information officer (CIO)

Full Access
Question # 167

Which of the following is the MOST effective way to mitigate identified risk scenarios?

A.

Assign ownership of the risk response plan

B.

Provide awareness in early detection of risk.

C.

Perform periodic audits on identified risk.

D.

areas Document the risk tolerance of the organization.

Full Access
Question # 168
A.

Implement a new risk assessment process.

B.

Revalidate the corporate risk appetite.

C.

Review and adjust key risk indicators (KRIs).

D.

Communicate the new risk profile.

Full Access
Question # 169

Which of the following is the PRIMARY consideration when establishing an organization's risk management methodology?

A.

Business context

B.

Risk tolerance level

C.

Resource requirements

D.

Benchmarking information

Full Access
Question # 170

Which of the following provides the BEST evidence that a selected risk treatment plan is effective?

A.

Identifying key risk indicators (KRIs)

B.

Evaluating the return on investment (ROI)

C.

Evaluating the residual risk level

D.

Performing a cost-benefit analysis

Full Access
Question # 171

After undertaking a risk assessment of a production system, the MOST appropriate action is fcr the risk manager to

A.

recommend a program that minimizes the concerns of that production system.

B.

inform the process owner of the concerns and propose measures to reduce them.

C.

inform the IT manager of the concerns and propose measures to reduce them.

D.

inform the development team of the concerns and together formulate risk reduction measures.

Full Access
Question # 172

Which of the following activities is a responsibility of the second line of defense?

A.

Challenging risk decision making

B.

Developing controls to manage risk scenarios

C.

Implementing risk response plans

D.

Establishing organizational risk appetite

Full Access
Question # 173

Which of the following is the BEST way to ensure data is properly sanitized while in cloud storage?

A.

Deleting the data from the file system

B.

Cryptographically scrambling the data

C.

Formatting the cloud storage at the block level

D.

Degaussing the cloud storage media

Full Access
Question # 174

Which of the following should be the FIRST consideration when a business unit wants to use personal information for a purpose other than for which it was originally collected?

A.

Informed consent

B.

Cross border controls

C.

Business impact analysis (BIA)

D.

Data breach protection

Full Access
Question # 175

Which of the following is the BEST way to confirm whether appropriate automated controls are in place within a recently implemented system?

A.

Perform a post-implementation review.

B.

Conduct user acceptance testing.

C.

Review the key performance indicators (KPIs).

D.

Interview process owners.

Full Access
Question # 176
A.

To gain stakeholder support for the implementation of controls

B.

To address multiple risk scenarios mitigated by technical controls

C.

To comply with industry best practices by balancing multiple types of controls

D.

To improve the effectiveness of controls that mitigate risk

Full Access
Question # 177

An application development team has a backlog of user requirements for a new system that will process insurance claim payments for customers. Which of the following should be the MOST important consideration for a risk-based review of the user requirements?

A.

Number of claims affected by the user requirements

B.

Number of customers impacted

C.

Impact to the accuracy of claim calculation

D.

Level of resources required to implement the user requirements

Full Access
Question # 178

Which of the following MOST effectively limits the impact of a ransomware attack?

A.

Cyber insurance

B.

Cryptocurrency reserve

C.

Data backups

D.

End user training

Full Access
Question # 179

The risk associated with inadvertent disclosure of database records from a public cloud service provider (CSP) would MOST effectively be reduced by:

A.

encrypting the data

B.

including a nondisclosure clause in the CSP contract

C.

assessing the data classification scheme

D.

reviewing CSP access privileges

Full Access
Question # 180

Which of the following is the PRIMARY reason for a risk practitioner to review an organization's IT asset inventory?

A.

To plan for the replacement of assets at the end of their life cycles

B.

To assess requirements for reducing duplicate assets

C.

To understand vulnerabilities associated with the use of the assets

D.

To calculate mean time between failures (MTBF) for the assets

Full Access
Question # 181

Which of the following is the GREATEST risk associated with inappropriate classification of data?

A.

Inaccurate record management data

B.

Inaccurate recovery time objectives (RTOs)

C.

Lack of accountability for data ownership

D.

Users having unauthorized access to data

Full Access
Question # 182

A deficient control has been identified which could result in great harm to an organization should a low frequency threat event occur. When communicating the associated risk to senior management the risk practitioner should explain:

A.

mitigation plans for threat events should be prepared in the current planning period.

B.

this risk scenario is equivalent to more frequent but lower impact risk scenarios.

C.

the current level of risk is within tolerance.

D.

an increase in threat events could cause a loss sooner than anticipated.

Full Access
Question # 183

Which of the following is the MOST effective key performance indicator (KPI) for change management?

A.

Percentage of changes with a fallback plan

B.

Number of changes implemented

C.

Percentage of successful changes

D.

Average time required to implement a change

Full Access
Question # 184

Due to a change in business processes, an identified risk scenario no longer requires mitigation. Which of the following is the MOST important reason the risk should remain in the risk register?

A.

To support regulatory requirements

B.

To prevent the risk scenario in the current environment

C.

To monitor for potential changes to the risk scenario

D.

To track historical risk assessment results

Full Access
Question # 185
A.

Implement project status checks to avoid financial risk.

B.

Support the project team in identifying and responding to risk.

C.

Update and publish the project risk register on a regular basis.

D.

Reduce project cost by eliminating risk to the project.

Full Access
Question # 186

Which of the following BEST provides an early warning that network access of terminated employees is not being revoked in accordance with the service level agreement (SLA)?

A.

Updating multi-factor authentication

B.

Monitoring key access control performance indicators

C.

Analyzing access control logs for suspicious activity

D.

Revising the service level agreement (SLA)

Full Access
Question # 187

Which of the following is MOST important for an organization to update following a change in legislation requiring notification to individuals impacted by data breaches?

A.

Insurance coverage

B.

Security awareness training

C.

Policies and standards

D.

Risk appetite and tolerance

Full Access
Question # 188

Which of the following is the BEST way to determine the ongoing efficiency of control processes?

A.

Perform annual risk assessments.

B.

Interview process owners.

C.

Review the risk register.

D.

Analyze key performance indicators (KPIs).

Full Access
Question # 189

Which of the following situations presents the GREATEST challenge to creating a comprehensive IT risk profile of an organization?

A.

Manual vulnerability scanning processes

B.

Organizational reliance on third-party service providers

C.

Inaccurate documentation of enterprise architecture (EA)

D.

Risk-averse organizational risk appetite

Full Access
Question # 190

Which of the following should be the PRIMARY basis for deciding whether to disclose information related to risk events that impact external stakeholders?

A.

Stakeholder preferences

B.

Contractual requirements

C.

Regulatory requirements

D.

Management assertions

Full Access
Question # 191

Which of the following has the GREATEST positive impact on ethical compliance within the risk management process?

A.

Senior management demonstrates ethics in their day-to-day decision making.

B.

An independent ethics investigation team has been established.

C.

Employees are required to complete ethics training courses annually.

D.

The risk practitioner is required to consult with the ethics committee.

Full Access
Question # 192

Which of the following is the MOST important key performance indicator (KPI) to monitor the effectiveness of disaster recovery processes?

A.

Percentage of IT systems recovered within the mean time to restore (MTTR) during the disaster recovery test

B.

Percentage of issues arising from the disaster recovery test resolved on time

C.

Percentage of IT systems included in the disaster recovery test scope

D.

Percentage of IT systems meeting the recovery time objective (RTO) during the disaster recovery test

Full Access
Question # 193

Which of the following is the MOST important objective of an enterprise risk management (ERM) program?

A.

To create a complete repository of risk to the organization

B.

To create a comprehensive view of critical risk to the organization

C.

To provide a bottom-up view of the most significant risk scenarios

D.

To optimize costs of managing risk scenarios in the organization

Full Access
Question # 194

A risk practitioner is involved in a comprehensive overhaul of the organizational risk management program. Which of the following should be reviewed FIRST to help identify relevant IT risk scenarios?

A.

Technology threats

B.

IT assets

C.

Security vulnerabilities

D.

IT risk register

Full Access
Question # 195

Which of the following is necessary to enable an IT risk register to be consolidated with the rest of the organization’s risk register?

A.

Risk taxonomy

B.

Risk response

C.

Risk appetite

D.

Risk ranking

Full Access
Question # 196

Which of the following presents the GREATEST challenge for an IT risk practitioner who wants to report on trends in historical IT risk levels?

A.

Qualitative measures for potential loss events

B.

Changes in owners for identified IT risk scenarios

C.

Changes in methods used to calculate probability

D.

Frequent use of risk acceptance as a treatment option

Full Access
Question # 197
A.

Develop policies with less restrictive requirements to ensure consistency across the organization.

B.

Develop a global policy to be applied uniformly by each country.

C.

Develop country-specific policies to address local regulations.

D.

Develop a global policy that accommodates country-specific requirements.

Full Access
Question # 198

Which of the following BEST protects organizational data within a production cloud environment?

A.

Data encryption

B.

Continuous log monitoring

C.

Right to audit

D.

Data obfuscation

Full Access
Question # 199

Which of the following cloud service models is MOST appropriate for client organizations that want to maximize their control over management of the data life cycle?

A.

Data as a Service (DaaS)

B.

Infrastructure as a Service (IaaS)

C.

Platform as a Service (PaaS)

D.

Software as a Service (SaaS)

Full Access
Question # 200

Which of the following should be the MOST important consideration when determining controls necessary for a highly critical information system?

A.

The number of threats to the system

B.

The organization's available budget

C.

The number of vulnerabilities to the system

D.

The level of acceptable risk to the organization

Full Access
Question # 201

Which key performance indicator (KPI) BEST measures the effectiveness of an organization's disaster recovery program?

A.

Number of disaster recovery scenarios identified

B.

Percentage of employees involved in the disaster recovery exercise

C.

Number of total systems recovered within the recovery point objective (RPO)

D.

Percentage of critical systems recovered within the recovery time objective (RTO)

Full Access
Question # 202

Participants in a risk workshop have become focused on the financial cost to mitigate risk rather than choosing the most appropriate response. Which of the following is the BEST way to address this type of issue in the long term?

A.

Perform a return on investment analysis.

B.

Review the risk register and risk scenarios.

C.

Calculate annualized loss expectancy of risk scenarios.

D.

Raise the maturity of organizational risk management.

Full Access
Question # 203

An organization is planning to outsource its payroll function to an external service provider Which of the following should be the MOST important consideration when selecting the provider?

A.

Disaster recovery plan (DRP) of the system

B.

Right to audit the provider

C.

Internal controls to ensure data privacy

D.

Transparency of key performance indicators (KPIs)

Full Access
Question # 204

A highly regulated enterprise is developing a new risk management plan to specifically address legal and regulatory risk scenarios What should be done FIRST by IT governance to support this effort?

A.

Request a regulatory risk reporting methodology

B.

Require critical success factors (CSFs) for IT risks.

C.

Establish IT-specific compliance objectives

D.

Communicate IT key risk indicators (KRIs) and triggers

Full Access
Question # 205

Which of the following should be the MOST important consideration for senior management when developing a risk response strategy?

A.

Cost of controls

B.

Risk tolerance

C.

Risk appetite

D.

Probability definition

Full Access
Question # 206

Which of the following should be the HIGHEST priority when developing a risk response?

A.

The risk response addresses the risk with a holistic view.

B.

The risk response is based on a cost-benefit analysis.

C.

The risk response is accounted for in the budget.

D.

The risk response aligns with the organization's risk appetite.

Full Access
Question # 207

Which of the following is the BEST way to reduce the likelihood of an individual performing a potentially harmful action as the result of unnecessary entitlement?

A.

Application monitoring

B.

Separation of duty

C.

Least privilege

D.

Nonrepudiation

Full Access
Question # 208

A recently purchased IT application does not meet project requirements. Of the following, who is accountable for the potential impact?

A.

Business analyst

B.

Project sponsor

C.

IT project team

D.

IT project management office (PMO)

Full Access
Question # 209

Which of the following should be a risk practitioner’s MOST important consideration when developing IT risk scenarios?

A.

The impact of controls on the efficiency of the business in delivering services

B.

Linkage of identified risk scenarios with enterprise risk management

C.

Potential threats and vulnerabilities that may have an impact on the business

D.

Results of network vulnerability scanning and penetration testing

Full Access
Question # 210

Which of the following is the BEST indicator of the effectiveness of a control monitoring program?

A.

Time between control failure and failure detection

B.

Number of key controls as a percentage of total control count

C.

Time spent on internal control assessment reviews

D.

Number of internal control failures within the measurement period

Full Access
Question # 211

A bank has outsourced its statement printing function to an external service provider. Which of the following is the MOST critical requirement to include in the contract?

A.

Monitoring of service costs

B.

Provision of internal audit reports

C.

Notification of sub-contracting arrangements

D.

Confidentiality of customer data

Full Access
Question # 212

Which of the following is the BEST evidence that risk management is driving business decisions in an organization?

A.

Compliance breaches are addressed in a timely manner.

B.

Risk ownership is identified and assigned.

C.

Risk treatment options receive adequate funding.

D.

Residual risk is within risk tolerance.

Full Access
Question # 213

Which of We following is the MOST effective control to address the risk associated with compromising data privacy within the cloud?

A.

Establish baseline security configurations with the cloud service provider.

B.

Require the cloud prowler 10 disclose past data privacy breaches.

C.

Ensure the cloud service provider performs an annual risk assessment.

D.

Specify cloud service provider liability for data privacy breaches in the contract

Full Access
Question # 214

Which of the following stakeholders define risk tolerance for an enterprise?

A.

IT compliance and IT audit

B.

Regulators and shareholders

C.

The board and executive management

D.

Enterprise risk management (ERM)

Full Access
Question # 215

Which of the following is the MOST critical element to maximize the potential for a successful security implementation?

A.

The organization's knowledge

B.

Ease of implementation

C.

The organization's culture

D.

industry-leading security tools

Full Access
Question # 216

Which of the following is the MOST important consideration for protecting data assets m a Business application system?

A.

Application controls are aligned with data classification lutes

B.

Application users are periodically trained on proper data handling practices

C.

Encrypted communication is established between applications and data servers

D.

Offsite encrypted backups are automatically created by the application

Full Access
Question # 217

The BEST key performance indicator (KPI) for monitoring adherence to an organization's user accounts provisioning practices is the percentage of:

A.

accounts without documented approval

B.

user accounts with default passwords

C.

active accounts belonging to former personnel

D.

accounts with dormant activity.

Full Access
Question # 218

Which of the following is the MOST important consideration when sharing risk management updates with executive management?

A.

Including trend analysis of risk metrics

B.

Using an aggregated view of organizational risk

C.

Relying on key risk indicator (KRI) data

D.

Ensuring relevance to organizational goals

Full Access
Question # 219

Which of the following is the BEST recommendation to senior management when the results of a risk and control assessment indicate a risk scenario can only be partially mitigated?

A.

Implement controls to bring the risk to a level within appetite and accept the residual risk.

B.

Implement a key performance indicator (KPI) to monitor the existing control performance.

C.

Accept the residual risk in its entirety and obtain executive management approval.

D.

Separate the risk into multiple components and avoid the risk components that cannot be mitigated.

Full Access
Question # 220

Which of the following is the BEST way to assess the effectiveness of an access management process?

A.

Comparing the actual process with the documented process

B.

Reviewing access logs for user activity

C.

Reconciling a list of accounts belonging to terminated employees

D.

Reviewing for compliance with acceptable use policy

Full Access
Question # 221

An organization uses one centralized single sign-on (SSO) control to cover many applications. Which of the following is the BEST course of action when a new application is added to the environment after testing of the SSO control has been completed?

A.

Initiate a retest of the full control

B.

Retest the control using the new application as the only sample.

C.

Review the corresponding change control documentation

D.

Re-evaluate the control during (he next assessment

Full Access
Question # 222

Which of the following will BEST help to ensure key risk indicators (KRIs) provide value to risk owners?

A.

Ongoing training

B.

Timely notification

C.

Return on investment (ROI)

D.

Cost minimization

Full Access
Question # 223

Which of the following is MOST important to the successful development of IT risk scenarios?

A.

Cost-benefit analysis

B.

Internal and external audit reports

C.

Threat and vulnerability analysis

D.

Control effectiveness assessment

Full Access
Question # 224

Which of the following is the MOST useful information for prioritizing risk mitigation?

A.

Cost of risk mitigation

B.

Asset criticality

C.

Acceptable risk level

D.

Business impact assessment

Full Access
Question # 225

An organization control environment is MOST effective when:

A.

control designs are reviewed periodically

B.

controls perform as intended.

C.

controls are implemented consistently.

D.

controls operate efficiently

Full Access
Question # 226

A monthly payment report is generated from the enterprise resource planning (ERP) software to validate data against the old and new payroll systems. What is the BEST way to mitigate the risk associated with data integrity loss in the new payroll system after data migration?

A.

Compare new system reports with functional requirements.

B.

Compare encrypted data with checksums.

C.

Compare results of user acceptance testing (UAT) with the testing criteria.

D.

Compare processing output from both systems using the previous month's data.

Full Access
Question # 227

Which of the following would be MOST useful to management when allocating resources to mitigate risk to the organization?

A.

Risk assessments

B.

Control self-assessments (CSAs)

C.

Risk-based audits

D.

Vulnerability analysis

Full Access
Question # 228

When of the following 15 MOST important when developing a business case for a proposed security investment?

A.

identification of control requirements

B.

Alignment to business objectives

C.

Consideration of new business strategies

D.

inclusion of strategy for regulatory compliance

Full Access
Question # 229
A.

Sensitive information classification and handling policies

B.

Anti-malware controls on endpoint devices

C.

Regular employee security awareness training

D.

An egress intrusion detection system (IDS)

Full Access
Question # 230

The purpose of requiring source code escrow in a contractual agreement is to:

A.

ensure that the source code is valid and exists.

B.

ensure that the source code is available if the vendor ceases to exist.

C.

review the source code for adequacy of controls.

D.

ensure the source code is available when bugs occur.

Full Access
Question # 231

Which of the following criteria is MOST important when developing a response to an attack that would compromise data?

A.

The recovery time objective (RTO)

B.

The likelihood of a recurring attack

C.

The organization's risk tolerance

D.

The business significance of the information

Full Access
Question # 232

Which of the following is MOST useful input when developing risk scenarios?

A.

Common attacks in other industries.

B.

Identification of risk events.

C.

Impact on critical assets.

D.

Probability of disruptive risk events.

Full Access
Question # 233

A risk practitioner learns that a risk owner has been accepting gifts from a supplier of IT products. Some of these IT products are used to implement controls and to mitigate risk to acceptable levels. Which of the following should the risk practitioner do FIRST?

A.

Initiate disciplinary action against the risk owner.

B.

Reassess the risk and review the underlying controls.

C.

Review organizational ethics policies.

D.

Report the activity to the supervisor.

Full Access
Question # 234

Which of the following BEST indicates that an organization's disaster recovery plan (DRP) will mitigate the risk of the organization failing to recover from a major service disruption?

A.

An experienced and certified disaster recovery team

B.

A record of quarterly disaster recovery tests

C.

A comprehensive list of critical applications

D.

A defined recovery point objective (RPO)

Full Access
Question # 235

A recent vulnerability assessment of a web-facing application revealed several weaknesses. Which of the following should be done NEXT to determine the risk exposure?

A.

Code review

B.

Penetration test

C.

Gap assessment

D.

Business impact analysis (BIA)

Full Access
Question # 236

An internal audit report reveals that a legacy system is no longer supported Which of the following is the risk practitioner's MOST important action before recommending a risk response'

A.

Review historical application down me and frequency

B.

Assess the potential impact and cost of mitigation

C.

identify other legacy systems within the organization

D.

Explore the feasibility of replacing the legacy system

Full Access
Question # 237

Which of the following will provide the BEST measure of compliance with IT policies?

A.

Evaluate past policy review reports.

B.

Conduct regular independent reviews.

C.

Perform penetration testing.

D.

Test staff on their compliance responsibilities.

Full Access
Question # 238

Which of the following issues found during the review of a newly created disaster recovery plan (DRP) should be of MOST concern?

A.

Some critical business applications are not included in the plan

B.

Several recovery activities will be outsourced

C.

The plan is not based on an internationally recognized framework

D.

The chief information security officer (CISO) has not approved the plan

Full Access
Question # 239

The PRIMARY purpose of using a framework for risk analysis is to:

A.

improve accountability

B.

improve consistency

C.

help define risk tolerance

D.

help develop risk scenarios.

Full Access
Question # 240

Quantifying the value of a single asset helps the organization to understand the:

A.

overall effectiveness of risk management

B.

consequences of risk materializing

C.

necessity of developing a risk strategy,

D.

organization s risk threshold.

Full Access
Question # 241

Which of the following is a PRIMARY objective of privacy impact assessments (PIAs)?

A.

To identify threats introduced by business processes

B.

To identify risk when personal information is collected

C.

To ensure senior management has approved the use of personal information

D.

To ensure compliance with data privacy laws and regulations

Full Access
Question # 242

Which of the following BEST helps to mitigate risk associated with excessive access by authorized users?

A.

Monitoring user activity using security logs

B.

Revoking access for users changing roles

C.

Granting access based on least privilege

D.

Conducting periodic reviews of authorizations granted

Full Access
Question # 243

Deviation from a mitigation action plan's completion date should be determined by which of the following?

A.

Change management as determined by a change control board

B.

Benchmarking analysis with similar completed projects

C.

Project governance criteria as determined by the project office

D.

The risk owner as determined by risk management processes

Full Access
Question # 244

Which of the following is MOST important for management to consider when deciding whether to invest in an IT initiative that exceeds management's risk appetite?

A.

Risk management budget

B.

Risk management industry trends

C.

Risk tolerance

D.

Risk capacity

Full Access
Question # 245

Which of the following presents the GREATEST concern associated with the

use of artificial intelligence (Al) systems?

A.

Al systems need to be available continuously.

B.

Al systems can be affected by bias.

C.

Al systems are expensive to maintain.

D.

Al systems can provide false positives.

Full Access
Question # 246

Which of the following is the MOST efficient method for monitoring control effectiveness?

A.

Conduct control self-assessments (CSAs)

B.

Review system performance logs

C.

Compare controls to business metrics

D.

Perform independent periodic control testing

Full Access
Question # 247

Which of the following practices BEST mitigates risk related to enterprise-wide ethical decision making in a multi-national organization?

A.

Customized regional training on local laws and regulations

B.

Policies requiring central reporting of potential procedure exceptions

C.

Ongoing awareness training to support a common risk culture

D.

Zero-tolerance policies for risk taking by middle-level managers

Full Access
Question # 248

Which of the following is the MOST important element of a successful risk awareness training program?

A.

Customizing content for the audience

B.

Providing incentives to participants

C.

Mapping to a recognized standard

D.

Providing metrics for measurement

Full Access
Question # 249

Which of the following would be a risk practitioner’s BEST recommendation upon learning of an updated cybersecurity regulation that could impact the organization?

A.

Perform a gap analysis

B.

Conduct system testing

C.

Implement compensating controls

D.

Update security policies

Full Access
Question # 250

Which of the following is the GREATEST benefit of centralizing IT systems?

A.

Risk reporting

B.

Risk classification

C.

Risk monitoring

D.

Risk identification

Full Access
Question # 251

Which of the following is the MOST effective way to integrate risk and compliance management?

A.

Embedding risk management into compliance decision-making

B.

Designing corrective actions to improve risk response capabilities

C.

Embedding risk management into processes that are aligned with business drivers

D.

Conducting regular self-assessments to verify compliance

Full Access
Question # 252

During an IT department reorganization, the manager of a risk mitigation action plan was replaced. The new manager has begun implementing a new control after identifying a more effective option. Which of the following is the risk practitioner's BEST course of action?

A.

Communicate the decision to the risk owner for approval

B.

Seek approval from the previous action plan manager.

C.

Identify an owner for the new control.

D.

Modify the action plan in the risk register.

Full Access
Question # 253

An organization's capability to implement a risk management framework is PRIMARILY influenced by the:

A.

guidance of the risk practitioner.

B.

competence of the staff involved.

C.

approval of senior management.

D.

maturity of its risk culture.

Full Access
Question # 254

Which of the following is the PRIMARY benefit of stakeholder involvement in risk scenario development?

A.

Ability to determine business impact

B.

Up-to-date knowledge on risk responses

C.

Decision-making authority for risk treatment

D.

Awareness of emerging business threats

Full Access
Question # 255

A risk heat map is MOST commonly used as part of an IT risk analysis to facilitate risk:

A.

communication

B.

identification.

C.

treatment.

D.

assessment.

Full Access
Question # 256

Which of the following management action will MOST likely change the likelihood rating of a risk scenario related to remote network access?

A.

Updating the organizational policy for remote access

B.

Creating metrics to track remote connections

C.

Implementing multi-factor authentication

D.

Updating remote desktop software

Full Access
Question # 257

Which of the following is the PRIMARY accountability for a control owner?

A.

Communicate risk to senior management.

B.

Own the associated risk the control is mitigating.

C.

Ensure the control operates effectively.

D.

Identify and assess control weaknesses.

Full Access
Question # 258

An IT control gap has been identified in a key process. Who would be the MOST appropriate owner of the risk associated with this gap?

A.

Key control owner

B.

Operational risk manager

C.

Business process owner

D.

Chief information security officer (CISO)

Full Access
Question # 259

Optimized risk management is achieved when risk is reduced:

A.

with strategic initiatives.

B.

to meet risk appetite.

C.

within resource availability.

D.

below risk appetite.

Full Access
Question # 260

Which of the following data would be used when performing a business impact analysis (BIA)?

A.

Cost-benefit analysis of running the current business

B.

Cost of regulatory compliance

C.

Projected impact of current business on future business

D.

Expected costs for recovering the business

Full Access
Question # 261

While evaluating control costs, management discovers that the annual cost exceeds the annual loss expectancy (ALE) of the risk. This indicates the:

A.

control is ineffective and should be strengthened

B.

risk is inefficiently controlled.

C.

risk is efficiently controlled.

D.

control is weak and should be removed.

Full Access
Question # 262

Which of the following is the MOST important for an organization to have in place to ensure IT asset protection?

A.

Procedures for risk assessments on IT assets

B.

An IT asset management checklist

C.

An IT asset inventory populated by an automated scanning tool

D.

A plan that includes processes for the recovery of IT assets

Full Access
Question # 263

The PRIMARY reason for prioritizing risk scenarios is to:

A.

provide an enterprise-wide view of risk

B.

support risk response tracking

C.

assign risk ownership

D.

facilitate risk response decisions.

Full Access
Question # 264

Which of the following is the BEST way to maintain a current list of organizational risk scenarios?

A.

Automate workflow for risk status updates.

B.

Perform regular reviews of key controls.

C.

Conduct periodic risk reviews with stakeholders.

D.

Conduct compliance reviews.

Full Access
Question # 265

Which of the following is the MOST important characteristic of an effective risk management program?

A.

Risk response plans are documented

B.

Controls are mapped to key risk scenarios.

C.

Key risk indicators are defined.

D.

Risk ownership is assigned

Full Access
Question # 266

Which of the following is the ULTIMATE objective of utilizing key control indicators (KCIs) in the risk management process?

A.

To provide insight into the effectiveness of the internal control environment

B.

To provide a basis for determining the criticality of risk mitigation controls

C.

To provide benchmarks for assessing control design effectiveness against industry peers

D.

To provide early warning signs of a potential change in risk level

Full Access
Question # 267

The PRIMARY reason a risk practitioner would be interested in an internal audit report is to:

A.

plan awareness programs for business managers.

B.

evaluate maturity of the risk management process.

C.

assist in the development of a risk profile.

D.

maintain a risk register based on noncompliance.

Full Access
Question # 268

An organization's Internet-facing server was successfully attacked because the server did not have the latest security patches. The risk associated with poor patch management had been documented in the risk register and accepted. Who should be accountable for any related losses to the organization?

A.

Risk owner

B.

IT risk manager

C.

Server administrator

D.

Risk practitioner

Full Access
Question # 269

A bank is experiencing an increasing incidence of customer identity theft. Which of the following is the BEST way to mitigate this risk?

A.

Implement monitoring techniques.

B.

Implement layered security.

C.

Outsource to a local processor.

D.

Conduct an awareness campaign.

Full Access
Question # 270

An organization has implemented a cloud-based backup solution to help prevent loss of transactional data from offices in an earthquake zone. This strategy demonstrates risk:

A.

Avoidance

B.

Mitigation

C.

Transfer

D.

Acceptance

Full Access
Question # 271

Which of the following is the MOST important information to cover a business continuity awareness Ira nine, program for all employees of the organization?

A.

Recovery time objectives (RTOs)

B.

Segregation of duties

C.

Communication plan

D.

Critical asset inventory

Full Access
Question # 272

Which of the following is the BEST method for determining an enterprise's current appetite for risk?

A.

Comparative analysis of peer companies

B.

Reviews of brokerage firm assessments

C.

Interviews with senior management

D.

Trend analysis using prior annual reports

Full Access
Question # 273

Which of the following is the BEST way to determine whether new controls mitigate security gaps in a business system?

A.

Complete an offsite business continuity exercise.

B.

Conduct a compliance check against standards.

C.

Perform a vulnerability assessment.

D.

Measure the change in inherent risk.

Full Access
Question # 274

A vendor's planned maintenance schedule will cause a critical application to temporarily lose failover capabilities. Of the following, who should approve this proposed schedule?

A.

IT infrastructure manager

B.

Chief Risk Officer (CRO)

C.

Business continuity manager

D.

Business application owner

Full Access
Question # 275

Which of the following should be implemented to BEST mitigate the risk associated with infrastructure updates?

A.

Role-specific technical training

B.

Change management audit

C.

Change control process

D.

Risk assessment

Full Access
Question # 276

Reviewing which of the following BEST helps an organization gain insight into its overall risk profile?

A.

Threat landscape

B.

Risk appetite

C.

Risk register

D.

Risk metrics

Full Access
Question # 277

Which of the following provides the MOST helpful reference point when communicating the results of a risk assessment to stakeholders?

A.

Risk tolerance

B.

Risk appetite

C.

Risk awareness

D.

Risk policy

Full Access
Question # 278

Who is PRIMARILY accountable for identifying risk on a daily basis and ensuring adherence to the organization's policies?

A.

Third line of defense

B.

Line of defense subject matter experts

C.

Second line of defense

D.

First line of defense

Full Access
Question # 279

Which of the following is the BEST indication of the effectiveness of a business continuity program?

A.

Business continuity tests are performed successfully and issues are addressed.

B.

Business impact analyses are reviewed and updated in a timely manner.

C.

Business continuity and disaster recovery plans are regularly updated.

D.

Business units are familiar with the business continuity plans and process.

Full Access
Question # 280

A risk practitioner implemented a process to notify management of emergency changes that may not be approved. Which of the following is the BEST way to provide this information to management?

A.

Change logs

B.

Change management meeting minutes

C.

Key control indicators (KCIs)

D.

Key risk indicators (KRIs)

Full Access
Question # 281

During implementation of an intrusion detection system (IDS) to monitor network traffic, a high number of alerts is reported. The risk practitioner should recommend to:

A.

reset the alert threshold based on peak traffic

B.

analyze the traffic to minimize the false negatives

C.

analyze the alerts to minimize the false positives

D.

sniff the traffic using a network analyzer

Full Access
Question # 282

An organization has allowed several employees to retire early in order to avoid layoffs Many of these employees have been subject matter experts for critical assets Which type of risk is MOST likely to materialize?

A.

Confidentiality breach

B.

Institutional knowledge loss

C.

Intellectual property loss

D.

Unauthorized access

Full Access
Question # 283

Which of the following is the MOST important objective of establishing an enterprise risk management (ERM) function within an organization?

A.

To have a unified approach to risk management across the organization

B.

To have a standard risk management process for complying with regulations

C.

To optimize risk management resources across the organization

D.

To ensure risk profiles are presented in a consistent format within the organization

Full Access
Question # 284

Recovery the objectives (RTOs) should be based on

A.

minimum tolerable downtime

B.

minimum tolerable loss of data.

C.

maximum tolerable downtime.

D.

maximum tolerable loss of data

Full Access
Question # 285

Which of the following BEST helps to ensure disaster recovery staff members

are able to complete their assigned tasks effectively during a disaster?

A.

Performing parallel disaster recovery testing

B.

Documenting the order of system and application restoration

C.

Involving disaster recovery staff members in risk assessments

D.

Conducting regular tabletop exercises and scenario analysis

Full Access
Question # 286

Which of the following is the BEST way to detect zero-day malware on an end user's workstation?

A.

An antivirus program

B.

Database activity monitoring

C.

Firewall log monitoring

D.

File integrity monitoring

Full Access
Question # 287

After the announcement of a new IT regulatory requirement, it is MOST important for a risk practitioner to;

A.

prepare an IT risk mitigation strategy.

B.

escalate to senior management.

C.

perform a cost-benefit analysis.

D.

review the impact to the IT environment.

Full Access
Question # 288

The PRIMARY benefit of using a maturity model is that it helps to evaluate the:

A.

capability to implement new processes

B.

evolution of process improvements

C.

degree of compliance with policies and procedures

D.

control requirements.

Full Access
Question # 289

The acceptance of control costs that exceed risk exposure MOST likely demonstrates:

A.

corporate culture alignment

B.

low risk tolerance

C.

high risk tolerance

D.

corporate culture misalignment.

Full Access
Question # 290

Which of the following is the MAIN benefit to an organization using key risk indicators (KRIs)?

A.

KRIs provide an early warning that a risk threshold is about to be reached.

B.

KRIs signal that a change in the control environment has occurred.

C.

KRIs provide a basis to set the risk appetite for an organization.

D.

KRIs assist in the preparation of the organization's risk profile.

Full Access
Question # 291

A PRIMARY advantage of involving business management in evaluating and managing risk is that management:

A.

better understands the system architecture.

B.

is more objective than risk management.

C.

can balance technical and business risk.

D.

can make better-informed business decisions.

Full Access
Question # 292

Which of the following should be the risk practitioner s PRIMARY focus when determining whether controls are adequate to mitigate risk?

A.

Sensitivity analysis

B.

Level of residual risk

C.

Cost-benefit analysis

D.

Risk appetite

Full Access
Question # 293

Which of the following is the MOST important characteristic of a key risk indicator (KRI) to enable decision-making?

A.

Monitoring the risk until the exposure is reduced

B.

Setting minimum sample sizes to ensure accuracy

C.

Listing alternative causes for risk events

D.

Illustrating changes in risk trends

Full Access
Question # 294

A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?

A.

The team that performed the risk assessment

B.

An assigned risk manager to provide oversight

C.

Action plans to address risk scenarios requiring treatment

D.

The methodology used to perform the risk assessment

Full Access
Question # 295

Which of the following would be a risk practitioners’ BEST recommendation for preventing cyber intrusion?

A.

Establish a cyber response plan

B.

Implement data loss prevention (DLP) tools.

C.

Implement network segregation.

D.

Strengthen vulnerability remediation efforts.

Full Access
Question # 296

Which of the following is the GREATEST concern when using artificial intelligence (AI) language models?

A.

The model could be hacked or exploited.

B.

The model could be used to generate inaccurate content.

C.

Staff could become overly reliant on the model.

D.

It could lead to biased recommendations.

Full Access
Question # 297

Which of the following is the MAIN reason to continuously monitor IT-related risk?

A.

To redefine the risk appetite and risk tolerance levels based on changes in risk factors

B.

To update the risk register to reflect changes in levels of identified and new IT-related risk

C.

To ensure risk levels are within acceptable limits of the organization's risk appetite and risk tolerance

D.

To help identify root causes of incidents and recommend suitable long-term solutions

Full Access
Question # 298

Which of the following is MOST important to consider when determining the risk associated with re-identification of obfuscated personal data?

A.

The type of shared data

B.

The level of residual risk after data loss prevention (DLP) controls are implemented

C.

The monetary value of the unique records that could be re-identified

D.

The impact to affected stakeholders

Full Access
Question # 299

Which of the following is the MOST important reason to validate that risk responses have been executed as outlined in the risk response plan''

A.

To ensure completion of the risk assessment cycle

B.

To ensure controls arc operating effectively

C.

To ensure residual risk Is at an acceptable level

D.

To ensure control costs do not exceed benefits

Full Access
Question # 300

Which of the following BEST indicates that an organization has implemented IT performance requirements?

A.

Service level agreements(SLA)

B.

Vendor references

C.

Benchmarking data

D.

Accountability matrix

Full Access
Question # 301

Which of the following practices would be MOST effective in protecting personality identifiable information (Ptl) from unauthorized access m a cloud environment?

A.

Apply data classification policy

B.

Utilize encryption with logical access controls

C.

Require logical separation of company data

D.

Obtain the right to audit

Full Access
Question # 302

Which of the following will be the GREATEST concern when assessing the risk profile of an organization?

A.

The risk profile was not updated after a recent incident

B.

The risk profile was developed without using industry standards.

C.

The risk profile was last reviewed two years ago.

D.

The risk profile does not contain historical loss data.

Full Access
Question # 303

An organization has decided to outsource a web application, and customer data will be stored in the vendor's public cloud. To protect customer data, it is MOST important to ensure which of the following?

A.

The organization's incident response procedures have been updated.

B.

The vendor stores the data in the same jurisdiction.

C.

Administrative access is only held by the vendor.

D.

The vendor's responsibilities are defined in the contract.

Full Access
Question # 304

Which of the following is the GREATEST benefit of analyzing logs collected from different systems?

A.

A record of incidents is maintained.

B.

Forensic investigations are facilitated.

C.

Security violations can be identified.

D.

Developing threats are detected earlier.

Full Access
Question # 305

Which of the following is the FIRST step when conducting a business impact analysis (BIA)?

A.

Identifying critical information assets

B.

Identifying events impacting continuity of operations.

C.

Creating a data classification scheme

D.

Analyzing previous risk assessment results

Full Access
Question # 306

Which of the following BEST helps to identify significant events that could impact an organization?

A.

Control analysis

B.

Vulnerability analysis

C.

Scenario analysis

D.

Heat map analysis

Full Access
Question # 307

The BEST way to obtain senior management support for investment in a control implementation would be to articulate the reduction in:

A.

detected incidents.

B.

residual risk.

C.

vulnerabilities.

D.

inherent risk.

Full Access
Question # 308

Which of the following should be the PRIMARY focus of an IT risk awareness program?

A.

Ensure compliance with the organization's internal policies

B.

Cultivate long-term behavioral change.

C.

Communicate IT risk policy to the participants.

D.

Demonstrate regulatory compliance.

Full Access
Question # 309

An organization uses a biometric access control system for authentication and access to its server room. Which control type has been implemented?

A.

Detective

B.

Deterrent

C.

Preventive

D.

Corrective

Full Access
Question # 310

During the control evaluation phase of a risk assessment, it is noted that multiple controls are ineffective. Which of the following should be the risk practitioner's FIRST course of action?

A.

Compare the residual risk to the current risk appetite.

B.

Recommend risk remediation of the ineffective controls.

C.

Implement key control indicators (KCIs).

D.

Escalate the control failures to senior management.

Full Access
Question # 311

When developing IT risk scenarios, it is MOST important to consider:

A.

The industry's threat profile.

B.

Incidents occurring at similar organizations.

C.

System performance thresholds.

D.

Organizational objectives.

Full Access
Question # 312

An organization's IT team has proposed the adoption of cloud computing as a cost-saving measure for the business. Which of the following should be of GREATEST concern to the risk practitioner?

A.

Due diligence for the recommended cloud vendor has not been performed.

B.

The business can introduce new Software as a Service (SaaS) solutions without IT approval.

C.

The maintenance of IT infrastructure has been outsourced to an Infrastructure as a Service (laaS) provider.

D.

Architecture responsibilities may not be clearly defined.

Full Access
Question # 313

Senior management has asked the risk practitioner for the overall residual risk level for a process that contains numerous risk scenarios. Which of the following should be provided?

A.

The sum of residual risk levels for each scenario

B.

The loss expectancy for aggregated risk scenarios

C.

The highest loss expectancy among the risk scenarios

D.

The average of anticipated residual risk levels

Full Access
Question # 314

Which of the following should be the PRIMARY concern when changes to firewall rules do not follow change management requirements?

A.

Potential audit findings

B.

Insufficient risk governance

C.

Potential business impact

D.

Inaccurate documentation

Full Access
Question # 315

Which of the following is a risk practitioner's BEST course of action after identifying risk scenarios related to noncompliance with new industry regulations?

A.

Escalate to senior management.

B.

Transfer the risk.

C.

Implement monitoring controls.

D.

Recalculate the risk.

Full Access
Question # 316

A risk practitioner shares the results of a vulnerability assessment for a critical business application with the business manager. Which of the following is the NEXT step?

A.

Develop a risk action plan to address the findings.

B.

Evaluate the impact of the vulnerabilities to the business application.

C.

Escalate the findings to senior management and internal audit.

D.

Conduct a penetration test to validate the vulnerabilities from the findings.

Full Access
Question # 317

An organization wants to grant remote access to a system containing sensitive data to an overseas third party. Which of the following should be of GREATEST concern to management?

A.

Transborder data transfer restrictions

B.

Differences in regional standards

C.

Lack of monitoring over vendor activities

D.

Lack of after-hours incident management support

Full Access
Question # 318

An organization is subject to a new regulation that requires nearly real-time recovery of its services following a disruption. Which of the following is the BEST way to manage the risk in this situation?

A.

Move redundant IT infrastructure to a closer location.

B.

Obtain insurance and ensure sufficient funds are available for disaster recovery.

C.

Review the business continuity plan (BCP) and align it with the new business needs.

D.

Outsource disaster recovery services to a third-party IT service provider.

Full Access
Question # 319

Which of the following should a risk practitioner do FIRST to support the implementation of governance around organizational assets within an enterprise risk management (ERM) program?

A.

Develop a detailed risk profile.

B.

Hire experienced and knowledgeable resources.

C.

Schedule internal audits across the business.

D.

Conduct risk assessments across the business.

Full Access
Question # 320

Which of the following is the BEST way to determine the value of information assets for risk management purposes?

A.

Assess the loss impact if the information is inadvertently disclosed

B.

Calculate the overhead required to keep the information secure throughout its life cycle

C.

Calculate the replacement cost of obtaining the information from alternate sources

D.

Assess the market value offered by consumers of the information

Full Access
Question # 321

Which of the following should be determined FIRST when a new security vulnerability is made public?

A.

Whether the affected technology is used within the organization

B.

Whether the affected technology is Internet-facing

C.

What mitigating controls are currently in place

D.

How pervasive the vulnerability is within the organization

Full Access
Question # 322

Which of the following should be the risk practitioner s FIRST course of action when an organization has decided to expand into new product areas?

A.

Identify any new business objectives with stakeholders.

B.

Present a business case for new controls to stakeholders.

C.

Revise the organization's risk and control policy.

D.

Review existing risk scenarios with stakeholders.

Full Access
Question # 323

An IT risk practitioner is evaluating an organization's change management controls over the last six months. The GREATEST concern would be an increase in:

A.

rolled back changes below management's thresholds.

B.

change-related exceptions per month.

C.

the average implementation time for changes.

D.

number of user stories approved for implementation.

Full Access
Question # 324

Which of the following is PRIMARILY a risk management responsibly of the first line of defense?

A.

Implementing risk treatment plans

B.

Validating the status of risk mitigation efforts

C.

Establishing risk policies and standards

D.

Conducting independent reviews of risk assessment results

Full Access
Question # 325

Which of the following is the PRIMARY benefit when senior management periodically reviews and updates risk appetite and tolerance levels?

A.

It ensures compliance with the risk management framework.

B.

It ensures an effective risk aggregation process.

C.

It ensures decisions are risk-informed.

D.

It ensures a consistent approach for risk assessments.

Full Access
Question # 326

Which of the following approaches MOST effectively enables accountability for data protection?

A.

Establishing ownership for data within applications and systems

B.

Establishing discipline for policy violations by data owners

C.

Implementing data protection policies across the organization

D.

Conducting data protection awareness and training campaigns

Full Access
Question # 327

Which of the following would MOST effectively reduce risk associated with an increased volume of online transactions on a retailer website?

A.

Hot backup site

B.

Transaction limits

C.

Scalable infrastructure

D.

Website activity monitoring

Full Access
Question # 328

Which of the following would be a risk practitioner's BEST course of action when a project team has accepted a risk outside the established risk appetite?

A.

Reject the risk acceptance and require mitigating controls.

B.

Monitor the residual risk level of the accepted risk.

C.

Escalate the risk decision to the project sponsor for review.

D.

Document the risk decision in the project risk register.

Full Access
Question # 329

Which of the following would be MOST useful when measuring the progress of a risk response action plan?

A.

Percentage of mitigated risk scenarios

B.

Annual loss expectancy (ALE) changes

C.

Resource expenditure against budget

D.

An up-to-date risk register

Full Access
Question # 330

Winch of the following key control indicators (KCIs) BEST indicates whether security requirements are identified and managed throughout a project He cycle?

A.

Number of projects going live without a security review

B.

Number of employees completing project-specific security training

C.

Number of security projects started in core departments

D.

Number of security-related status reports submitted by project managers

Full Access
Question # 331

Which of the following would be MOST helpful to a risk practitioner when ensuring that mitigated risk remains within acceptable limits?

A.

Building an organizational risk profile after updating the risk register

B.

Ensuring risk owners participate in a periodic control testing process

C.

Designing a process for risk owners to periodically review identified risk

D.

Implementing a process for ongoing monitoring of control effectiveness

Full Access
Question # 332
A.

In the design phase.

B.

During pre-production testing.

C.

Once in the production environment.

D.

Throughout development.

Full Access
Question # 333

Which of the following is the BEST approach when a risk treatment plan cannot be completed on time?

A.

Replace the action owner with a more experienced individual.

B.

Implement compensating controls until the preferred action can be completed.

C.

Change the risk response strategy of the relevant risk to risk avoidance.

D.

Develop additional key risk indicators (KRIs) until the preferred action can be completed.

Full Access
Question # 334

What is the PRIMARY role of the application owner when changes are being introduced into an existing environment?

A.

Determining possible losses due to downtime during the changes

B.

Updating control procedures and documentation

C.

Approving the proposed changes based on impact analysis

D.

Notifying owners of affected systems after the changes are implemented

Full Access
Question # 335

Which of the following is MOST important to consider before determining a response to a vulnerability?

A.

The likelihood and impact of threat events

B.

The cost to implement the risk response

C.

Lack of data to measure threat events

D.

Monetary value of the asset

Full Access
Question # 336

Which of the following is MOST important for an organization to consider when developing its IT strategy?

A.

IT goals and objectives

B.

Organizational goals and objectives

C.

The organization's risk appetite statement

D.

Legal and regulatory requirements

Full Access
Question # 337

A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?

A.

The methodology used to perform the risk assessment

B.

Action plans to address risk scenarios requiring treatment

C.

Date and status of the last project milestone

D.

The individuals assigned ownership of controls

Full Access
Question # 338

An organization striving to be on the leading edge in regard to risk monitoring would MOST likely implement:

A.

procedures to monitor the operation of controls.

B.

a tool for monitoring critical activities and controls.

C.

real-time monitoring of risk events and control exceptions.

D.

monitoring activities for all critical assets.

E.

Perform a controls assessment.

Full Access
Question # 339

Which of the following is the BEST approach for selecting controls to minimize risk?

A.

Industry best practice review

B.

Risk assessment

C.

Cost-benefit analysis

D.

Control-effectiveness evaluation

Full Access
Question # 340

Which of the following would BEST help minimize the risk associated with social engineering threats?

A.

Enforcing employees’ sanctions

B.

Conducting phishing exercises

C.

Enforcing segregation of dunes

D.

Reviewing the organization's risk appetite

Full Access
Question # 341

Which of the following controls will BEST detect unauthorized modification of data by a database administrator?

A.

Reviewing database access rights

B.

Reviewing database activity logs

C.

Comparing data to input records

D.

Reviewing changes to edit checks

Full Access
Question # 342

Which of the following is MOST important for senior management to review during an acquisition?

A.

Risk appetite and tolerance

B.

Risk framework and methodology

C.

Key risk indicator (KRI) thresholds

D.

Risk communication plan

Full Access
Question # 343

When establishing an enterprise IT risk management program, it is MOST important to:

A.

review alignment with the organizations strategy.

B.

understand the organization's information security policy.

C.

validate the organization's data classification scheme.

D.

report identified IT risk scenarios to senior management.

Full Access
Question # 344

Which of the following information is MOST useful to a risk practitioner for developing IT risk scenarios?

A.

Published vulnerabilities relevant to the business

B.

Threat actors that can trigger events

C.

Events that could potentially impact the business

D.

IT assets requiring the greatest investment

Full Access
Question # 345

An organization has raised the risk appetite for technology risk. The MOST likely result would be:

A.

increased inherent risk.

B.

higher risk management cost

C.

decreased residual risk.

D.

lower risk management cost.

Full Access
Question # 346

Which of the following should be the PRIMARY focus of an independent review of a risk management process?

A.

Accuracy of risk tolerance levels

B.

Consistency of risk process results

C.

Participation of stakeholders

D.

Maturity of the process

Full Access
Question # 347

An organization has initiated a project to launch an IT-based service to customers and take advantage of being the first to market. Which of the following should be of GREATEST concern to senior management?

A.

More time has been allotted for testing.

B.

The project is likely to deliver the product late.

C.

A new project manager is handling the project.

D.

The cost of the project will exceed the allotted budget.

Full Access
Question # 348

When formulating a social media policy lo address information leakage, which of the following is the MOST important concern to address?

A.

Sharing company information on social media

B.

Sharing personal information on social media

C.

Using social media to maintain contact with business associates

D.

Using social media for personal purposes during working hours

Full Access
Question # 349

Which of the following is the PRIMARY reason to use key control indicators (KCIs) to evaluate control operating effectiveness?

A.

To measure business exposure to risk

B.

To identify control vulnerabilities

C.

To monitor the achievement of set objectives

D.

To raise awareness of operational issues

Full Access
Question # 350

Which of the following is the MOST effective way to integrate business risk management with IT operations?

A.

Perform periodic IT control self-assessments.

B.

Require a risk assessment with change requests.

C.

Provide security awareness training.

D.

Perform periodic risk assessments.

Full Access
Question # 351

Which of the following will BEST help to ensure new IT policies address the enterprise's requirements?

A.

involve IT leadership in the policy development process

B.

Require business users to sign acknowledgment of the poises

C.

involve business owners in the pokey development process

D.

Provide policy owners with greater enforcement authority

Full Access
Question # 352

Which of the following BEST mitigates the risk associated with inadvertent data leakage by users who work remotely?

A.

Conducting training on the protection of organizational assets

B.

Configuring devices to use virtual IP addresses

C.

Ensuring patching for end-user devices

D.

Providing encrypted access to organizational assets

Full Access
Question # 353

Which of The following BEST represents the desired risk posture for an organization?

A.

Inherent risk is lower than risk tolerance.

B.

Operational risk is higher than risk tolerance.

C.

Accepted risk is higher than risk tolerance.

D.

Residual risk is lower than risk tolerance.

Full Access
Question # 354

An organization recently received an independent security audit report of its cloud service provider that indicates significant control weaknesses. What should be done NEXT in response to this report?

A.

Migrate all data to another compliant service provider.

B.

Analyze the impact of the provider's control weaknesses to the business.

C.

Conduct a follow-up audit to verify the provider's control weaknesses.

D.

Review the contract to determine if penalties should be levied against the provider.

Full Access
Question # 355

A recent internal risk review reveals the majority of core IT application recovery time objectives (RTOs) have exceeded the maximum time defined by the business application owners. Which of the following is MOST likely to change as a result?

A.

Risk forecasting

B.

Risk tolerance

C.

Risk likelihood

D.

Risk appetite

Full Access
Question # 356

Which of the following is the GREATEST risk of relying on artificial intelligence (Al) within heuristic security systems?

A.

Al may result in less reliance on human intervention.

B.

Malicious activity may inadvertently be classified as normal during baselining.

C.

Risk assessments of heuristic security systems are more difficult.

D.

Predefined patterns of malicious activity may quickly become outdated.

Full Access
Question # 357

Which of the following is the PRIMARY responsibility of a control owner?

A.

To make risk-based decisions and own losses

B.

To ensure implemented controls mitigate risk

C.

To approve deviations from controls

D.

To design controls that will eliminate risk

Full Access
Question # 358

Sensitive data has been lost after an employee inadvertently removed a file from the premises, in violation of organizational policy. Which of the following controls MOST likely failed?

A.

Background checks

B.

Awareness training

C.

User access

D.

Policy management

Full Access
Question # 359

Which of the following metrics is BEST used to communicate to senior management that the control environment manages risk within appetite and tolerance?

A.

Number of security incidents

B.

Reduction in control expenditures

C.

Number of risk responses executed

D.

Reduction in residual risk

Full Access
Question # 360

When developing a new risk register, a risk practitioner should focus on which of the following risk management activities?

A.

Risk management strategy planning

B.

Risk monitoring and control

C.

Risk identification

D.

Risk response planning

Full Access
Question # 361

Which of the following is the BEST criterion to determine whether higher residual risk ratings in the risk register should be accepted?

A.

Risk maturity

B.

Risk policy

C.

Risk appetite

D.

Risk culture

Full Access
Question # 362

A risk practitioner is performing a risk assessment of recent external advancements in quantum computing. Which of the following would pose the GREATEST concern for the risk practitioner?

A.

The organization has incorporated blockchain technology in its operations.

B.

The organization has not reviewed its encryption standards.

C.

The organization has implemented heuristics on its network firewall.

D.

The organization has not adopted Infrastructure as a Service (laaS) for its operations.

Full Access
Question # 363

Which of the following is the GREATEST risk associated with the use of data analytics?

A.

Distributed data sources

B.

Manual data extraction

C.

Incorrect data selection

D.

Excessive data volume

Full Access
Question # 364

Which of the following is the MOST important consideration for the board and senior leadership

regarding the organization's approach to risk management for emerging technologies?

A.

Ensuring the organization follows risk management industry best practices

B.

Ensuring IT risk scenarios are updated and include emerging technologies

C.

Ensuring the risk framework and policies are suitable for emerging technologies

D.

Ensuring threat intelligence services are used to gather data about emerging technologies

Full Access
Question # 365

A business unit has implemented robotic process automation (RPA) for its

repetitive back-office tasks. Which of the following should be the risk

practitioner's GREATEST concern?

A.

The security team is unaware of the implementation.

B.

The organization may lose institutional knowledge.

C.

The robots may fail to work effectively.

D.

Virtual clients are used for implementation.

Full Access
Question # 366

A risk practitioner has been made aware of a problem in an IT system that was missed during a routine risk assessment. Which of the following is the practitioner's BEST course of action?

A.

Record the problem as a new issue in the risk management system

B.

Record a new issue but backdate it to the original risk assessment date

C.

Report the vulnerability to the asset owner's manager

D.

Document the issue during the next risk assessment

Full Access
Question # 367

When updating a risk register with the results of an IT risk assessment, the risk practitioner should log:

A.

high impact scenarios.

B.

high likelihood scenarios.

C.

treated risk scenarios.

D.

known risk scenarios.

Full Access
Question # 368

The risk associated with data loss from a website which contains sensitive customer information is BEST owned by:

A.

the third-party website manager

B.

the business process owner

C.

IT security

D.

the compliance manager

Full Access
Question # 369

Which of the following would have the GREATEST impact on reducing the risk associated with the implementation of a big data project?

A.

Data processing

B.

Data quality

C.

Data scalability

D.

Data governance

Full Access
Question # 370

Which of the following would provide the MOST comprehensive information for communicating current levels of IT-related risk to executive management?

A.

Risk register

B.

Risk appetite

C.

Risk dashboard

D.

Risk action plans

Full Access
Question # 371

The BEST key performance indicator (KPI) to measure the effectiveness of a backup process would be the number of:

A.

resources to monitor backups

B.

restoration monitoring reports

C.

backup recovery requests

D.

recurring restore failures

Full Access
Question # 372

Which of the following is a risk practitioner's MOST important responsibility in managing risk acceptance that exceeds risk tolerance?

A.

Verify authorization by senior management.

B.

Increase the risk appetite to align with the current risk level

C.

Ensure the acceptance is set to expire over lime

D.

Update the risk response in the risk register.

Full Access
Question # 373

The risk associated with an asset before controls are applied can be expressed as:

A.

a function of the likelihood and impact

B.

the magnitude of an impact

C.

a function of the cost and effectiveness of control.

D.

the likelihood of a given threat

Full Access
Question # 374

Which risk response strategy could management apply to both positive and negative risk that has been identified?

A.

Transfer

B.

Accept

C.

Exploit

D.

Mitigate

Full Access
Question # 375

Which of the following is the MOST effective way for a large and diversified organization to minimize risk associated with unauthorized software on company devices?

A.

Scan end points for applications not included in the asset inventory.

B.

Prohibit the use of cloud-based virtual desktop software.

C.

Conduct frequent reviews of software licenses.

D.

Perform frequent internal audits of enterprise IT infrastructure.

Full Access
Question # 376

Which of the following BEST measures the impact of business interruptions caused by an IT service outage?

A.

Sustained financial loss

B.

Cost of remediation efforts

C.

Duration of service outage

D.

Average time to recovery

Full Access
Question # 377

Which of the following is a risk practitioner's MOST important course of action when the level of risk has exceeded risk tolerance?

A.

Facilitate a review of risk tolerance levels

B.

Adjust the risk impact and likelihood scale

C.

Revise key risk indicator (KRI) thresholds

D.

Introduce the risk treatment process

Full Access
Question # 378

An IT department originally planned to outsource the hosting of its data center at an overseas location to reduce operational expenses. After a risk assessment, the department has decided to keep the data center in-house. How should the risk treatment response be reflected in the risk register?

A.

Risk mitigation

B.

Risk avoidance

C.

Risk acceptance

D.

Risk transfer

Full Access
Question # 379

Which of the following is MOST important to include when reporting the effectiveness of risk management to senior management?

A.

Changes in the organization's risk appetite and risk tolerance levels

B.

Impact due to changes in external and internal risk factors

C.

Changes in residual risk levels against acceptable levels

D.

Gaps in best practices and implemented controls across the industry

Full Access
Question # 380

Which of the following factors will have the GREATEST impact on the implementation of a risk mitigation strategy for an organization?

A.

Cost-benefit analysis

B.

Risk tolerance

C.

Known vulnerabilities

D.

Cyber insurance

Full Access
Question # 381

Which of the following would be MOST useful to senior management when determining an appropriate risk response?

A.

A comparison of current risk levels with established tolerance

B.

A comparison of cost variance with defined response strategies

C.

A comparison of current risk levels with estimated inherent risk levels

D.

A comparison of accepted risk scenarios associated with regulatory compliance

Full Access
Question # 382

Which of the following methods is an example of risk mitigation?

A.

Not providing capability for employees to work remotely

B.

Outsourcing the IT activities and infrastructure

C.

Enforcing change and configuration management processes

D.

Taking out insurance coverage for IT-related incidents

Full Access
Question # 383

Which key performance efficiency IKPI) BEST measures the effectiveness of an organization's disaster recovery program?

A.

Number of service level agreement (SLA) violations

B.

Percentage of recovery issues identified during the exercise

C.

Number of total systems recovered within tie recovery point objective (RPO)

D.

Percentage of critical systems recovered within tie recovery time objective (RTO)

Full Access
Question # 384

The PRIMARY reason for periodically monitoring key risk indicators (KRIs) is to:

A.

rectify errors in results of KRIs.

B.

detect changes in the risk profile.

C.

reduce costs of risk mitigation controls.

D.

continually improve risk assessments.

Full Access
Question # 385

An organization is implementing Zero Trust architecture to improve its security posture. Which of the following is the MOST important input to develop the architecture?

A.

Cloud services risk assessments

B.

The organization's threat model

C.

Access control logs

D.

Multi-factor authentication (MFA) architecture

Full Access
Question # 386

Which of the following is a risk practitioner's BEST course of action upon learning that regulatory authorities have concerns with an emerging technology the organization is considering?

A.

Redesign key risk indicators (KRIs).

B.

Update risk responses.

C.

Conduct a SWOT analysis.

D.

Perform a threat assessment.

Full Access
Question # 387

A global organization is planning to collect customer behavior data through social media advertising. Which of the following is the MOST important business risk to be considered?

A.

Regulatory requirements may differ in each country.

B.

Data sampling may be impacted by various industry restrictions.

C.

Business advertising will need to be tailored by country.

D.

The data analysis may be ineffective in achieving objectives.

Full Access
Question # 388

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a vulnerability management process?

A.

Percentage of vulnerabilities remediated within the agreed service level

B.

Number of vulnerabilities identified during the period

C.

Number of vulnerabilities re-opened during the period

D.

Percentage of vulnerabilities escalated to senior management

Full Access
Question # 389

Which strategy employed by risk management would BEST help to prevent internal fraud?

A.

Require control owners to conduct an annual control certification.

B.

Conduct regular internal and external audits on the systems supporting financial reporting.

C.

Ensure segregation of duties are implemented within key systems or processes.

D.

Require the information security officer to review unresolved incidents.

Full Access
Question # 390

Legal and regulatory risk associated with business conducted over the Internet is driven by:

A.

the jurisdiction in which an organization has its principal headquarters

B.

international law and a uniform set of regulations.

C.

the laws and regulations of each individual country

D.

international standard-setting bodies.

Full Access
Question # 391

Well-developed, data-driven risk measurements should be:

A.

reflective of the lowest organizational level.

B.

a data feed taken directly from operational production systems.

C.

reported to management the same day data is collected.

D.

focused on providing a forward-looking view.

Full Access
Question # 392

Which of the following is MOST important when developing key risk indicators (KRIs)?

A.

Alignment with regulatory requirements

B.

Availability of qualitative data

C.

Properly set thresholds

D.

Alignment with industry benchmarks

Full Access
Question # 393

Which of the following is MOST important for a risk practitioner to verify when evaluating the effectiveness of an organization's existing controls?

A.

Senior management has approved the control design.

B.

Inherent risk has been reduced from original levels.

C.

Residual risk remains within acceptable levels.

D.

Costs for control maintenance are reasonable.

Full Access
Question # 394

Performing a background check on a new employee candidate before hiring is an example of what type of control?

A.

Detective

B.

Compensating

C.

Corrective

D.

Preventive

Full Access
Question # 395

Which of the following provides the BEST measurement of an organization's risk management maturity level?

A.

Level of residual risk

B.

The results of a gap analysis

C.

IT alignment to business objectives

D.

Key risk indicators (KRIs)

Full Access
Question # 396

Which of the following is the BEST metric to measure employee adherence to organizational security policies?

A.

Total number of security policy audit findings

B.

Total number of regulatory violations

C.

Total number of security policy exceptions

D.

Total number of opened phishing emails

Full Access
Question # 397

Which of the following is MOST important to the effectiveness of a senior oversight committee for risk monitoring?

A.

Key risk indicators (KRIs)

B.

Risk governance charter

C.

Organizational risk appetite

D.

Cross-business representation

Full Access
Question # 398

Which of the following statements BEST describes risk appetite?

A.

The amount of risk an organization is willing to accept

B.

The effective management of risk and internal control environments

C.

Acceptable variation between risk thresholds and business objectives

D.

The acceptable variation relative to the achievement of objectives

Full Access
Question # 399

An IT organization is replacing the customer relationship management (CRM) system. Who should own the risk associated with customer data leakage caused by insufficient IT security controls for the new system?

A.

Chief information security officer

B.

Business process owner

C.

Chief risk officer

D.

IT controls manager

Full Access
Question # 400

An organization has outsourced its IT security operations to a third party. Who is ULTIMATELY accountable for the risk associated with the outsourced operations?

A.

The third party s management

B.

The organization's management

C.

The control operators at the third party

D.

The organization's vendor management office

Full Access
Question # 401

An organization has established a policy prohibiting ransom payments if subjected to a ransomware attack. Which of the following is the MOST effective control to support this policy?

A.

Conducting periodic vulnerability scanning

B.

Creating immutable backups

C.

Performing required patching

D.

Implementing continuous intrusion detection monitoring

Full Access
Question # 402

A recent risk workshop has identified risk owners and responses for newly identified risk scenarios. Which of the following should be the risk practitioner s NEXT step? r

A.

Prepare a business case for the response options.

B.

Identify resources for implementing responses.

C.

Develop a mechanism for monitoring residual risk.

D.

Update the risk register with the results.

Full Access
Question # 403

Which of the following would be of GREATEST assistance when justifying investment in risk response strategies?

A.

Total cost of ownership

B.

Resource dependency analysis

C.

Cost-benefit analysis

D.

Business impact analysis

Full Access
Question # 404

The PRIMARY objective of a risk identification process is to:

A.

evaluate how risk conditions are managed.

B.

determine threats and vulnerabilities.

C.

estimate anticipated financial impact of risk conditions.

D.

establish risk response options.

Full Access
Question # 405

An organization is planning to engage a cloud-based service provider for some of its data-intensive business processes. Which of the following is MOST important to help define the IT risk associated with this outsourcing activity?

A.

Service level agreement

B.

Customer service reviews

C.

Scope of services provided

D.

Right to audit the provider

Full Access
Question # 406

Which of the following is MOST important to ensure when continuously monitoring the performance of a client-facing application?

A.

Objectives are confirmed with the business owner.

B.

Control owners approve control changes.

C.

End-user acceptance testing has been conducted.

D.

Performance information in the log is encrypted.

Full Access
Question # 407

An organization's internal audit department is considering the implementation of robotics process automation (RPA) to automate certain continuous auditing tasks. Who would own the risk associated with ineffective design of the software bots?

A.

Lead auditor

B.

Project manager

C.

Chief audit executive (CAE)

D.

Chief information officer (CIO)

Full Access
Question # 408

Who should be responsible for implementing and maintaining security controls?

A.

End user

B.

Internal auditor

C.

Data owner

D.

Data custodian

Full Access
Question # 409

An organization's finance team is proposing the adoption of a blockchain technology to provide a secure method for moving funds. Which of the following should the risk practitioner do FIRST?

A.

Recommend permissionless blockchain.

B.

Perform a risk assessment.

C.

Perform a business impact analysis (BIA).

D.

Recommend permissioned blockchain.

Full Access
Question # 410

A risk practitioner has identified that the agreed recovery time objective (RTO) with a Software as a Service (SaaS) provider is longer than the business expectation. Which ot the following is the risk practitioner's BEST course of action?

A.

Collaborate with the risk owner to determine the risk response plan.

B.

Document the gap in the risk register and report to senior management.

C.

Include a right to audit clause in the service provider contract.

D.

Advise the risk owner to accept the risk.

Full Access
Question # 411

Which of the following is MOST influential when management makes risk response decisions?

A.

Risk appetite

B.

Audit risk

C.

Residual risk

D.

Detection risk

Full Access
Question # 412

Which of the following is the BEST way to determine the value of information assets for risk management purposes?

A.

Assess the loss impact if the information is inadvertently disclosed.

B.

Calculate the overhead required to keep the information secure throughout its life cycle.

C.

Calculate the replacement cost of obtaining the information from alternate sources.

D.

Assess the market value offered by consumers of the information.

Full Access
Question # 413

The PRIMARY reason to implement a formalized risk taxonomy is to:

A.

reduce subjectivity in risk management.

B.

comply with regulatory requirements.

C.

demonstrate best industry practice.

D.

improve visibility of overall risk exposure.

Full Access
Question # 414

Establishing and organizational code of conduct is an example of which type of control?

A.

Preventive

B.

Directive

C.

Detective

D.

Compensating

Full Access
Question # 415

Which of the following is the BEST indication of a potential threat?

A.

Increase in identified system vulnerabilities

B.

Ineffective risk treatment plans

C.

Excessive policy and standard exceptions

D.

Excessive activity in system logs

Full Access
Question # 416

Which of the following BEST enables the development of a successful IT strategy focused on business risk mitigation?

A.

Providing risk awareness training for business units

B.

Obtaining input from business management

C.

Understanding the business controls currently in place

D.

Conducting a business impact analysis (BIA)

Full Access
Question # 417

The MAIN purpose of having a documented risk profile is to:

A.

comply with external and internal requirements.

B.

enable well-informed decision making.

C.

prioritize investment projects.

D.

keep the risk register up-to-date.

Full Access
Question # 418

An organization recently implemented new technologies that enable the use of robotic process automation. Which of the following is MOST important to reassess?

A.

Risk profile

B.

Risk tolerance

C.

Risk capacity

D.

Risk appetite

Full Access
Question # 419

An organization is implementing robotic process automation (RPA) to streamline business processes. Given that implementation of this technology is expected to impact existing controls, which of the following is the risk practitioner's BEST course of action?

A.

Reassess whether mitigating controls address the known risk in the processes.

B.

Update processes to address the new technology.

C.

Update the data governance policy to address the new technology.

D.

Perform a gap analysis of the impacted processes.

Full Access
Question # 420

The MOST important reason for implementing change control procedures is to ensure:

A.

only approved changes are implemented

B.

timely evaluation of change events

C.

an audit trail exists.

D.

that emergency changes are logged.

Full Access
Question # 421

A risk assessment has identified increased losses associated with an IT risk scenario. It is MOST important for the risk practitioner to:

A.

update the risk rating.

B.

reevaluate inherent risk.

C.

develop new risk scenarios.

D.

implement additional controls.

Full Access
Question # 422

Who is ULTIMATELY accountable for the confidentiality of data in the event of a data breach within a Software as a Service (SaaS) environment?

A.

Vendor's information security officer

B.

Customer's data privacy officer

C.

Customer's data owner

D.

Vendor's application owner

Full Access
Question # 423

Which of the following is the BEST measure of the effectiveness of an employee deprovisioning process?

A.

Number of days taken to remove access after staff separation dates

B.

Number of days taken for IT to remove access after receipt of HR instructions

C.

Number of termination requests processed per reporting period

D.

Number of days taken for HR to provide instructions to IT after staff separation dates

Full Access
Question # 424

An organization's recovery team is attempting to recover critical data backups following a major flood in its data center. However, key team members do not know exactly what steps should be taken to address this crisis. Which of the following is the MOST likely cause of this situation?

A.

Failure to test the disaster recovery plan (DRP)

B.

Lack of well-documented business impact analysis (BIA)

C.

Lack of annual updates to the disaster recovery plan (DRP)

D.

Significant changes in management personnel

Full Access
Question # 425

The PRIMARY purpose of IT control status reporting is to:

A.

ensure compliance with IT governance strategy.

B.

assist internal audit in evaluating and initiating remediation efforts.

C.

benchmark IT controls with Industry standards.

D.

facilitate the comparison of the current and desired states.

Full Access
Question # 426

Which of the following would MOST likely cause a risk practitioner to reassess risk scenarios?

A.

A change in the risk management policy

B.

A major security incident

C.

A change in the regulatory environment

D.

An increase in intrusion attempts

Full Access
Question # 427

An organization has four different projects competing for funding to reduce overall IT risk. Which project should management defer?

A.

Project Charlie

B.

Project Bravo

C.

Project Alpha

D.

Project Delta

Full Access
Question # 428

Who is the MOST appropriate owner for newly identified IT risk?

A.

The manager responsible for IT operations that will support the risk mitigation efforts

B.

The individual with authority to commit organizational resources to mitigate the risk

C.

A project manager capable of prioritizing the risk remediation efforts

D.

The individual with the most IT risk-related subject matter knowledge

Full Access
Question # 429

A risk practitioner identifies an increasing trend of employees copying company information unrelated to their job functions to USB drives. Which of the following elements of the risk register should be updated to reflect this observation?

A.

Risk impact

B.

Key risk indicator (KRI)

C.

Risk appetite

D.

Risk likelihood

Full Access
Question # 430

A penetration test reveals several vulnerabilities in a web-facing application. Which of the following should be the FIRST step in selecting a risk response?

A.

Correct the vulnerabilities to mitigate potential risk exposure.

B.

Develop a risk response action plan with key stakeholders.

C.

Assess the level of risk associated with the vulnerabilities.

D.

Communicate the vulnerabilities to the risk owner.

Full Access
Question # 431

Reviewing which of the following provides the BEST indication of an organizations risk tolerance?

A.

Risk sharing strategy

B.

Risk transfer agreements

C.

Risk policies

D.

Risk assessments

Full Access
Question # 432

What is the PRIMARY reason to periodically review key performance indicators (KPIs)?

A.

Ensure compliance.

B.

Identify trends.

C.

Promote a risk-aware culture.

D.

Optimize resources needed for controls

Full Access
Question # 433

An organization has recently hired a large number of part-time employees. During the annual audit, it was discovered that many user IDs and passwords were documented in procedure manuals for use by the part-time employees. Which of the following BEST describes this situation?

A.

Threat

B.

Risk

C.

Vulnerability

D.

Policy violation

Full Access
Question # 434

Which of the following provides the MOST useful information to senior management about risk mitigation status?

A.

Risk strategy

B.

Risk register

C.

Gap analysis

D.

Business impact analysis (BIA)

Full Access
Question # 435

When developing a risk awareness training program, which of the following is the BEST way to promote a risk-aware culture?

A.

Emphasize individual responsibility for managing risk.

B.

Communicate incident escalation procedures.

C.

Illustrate methods to identify threats and vulnerabilities.

D.

Challenge the effectiveness of business processes.

Full Access
Question # 436

Business management is seeking assurance from the CIO that IT has a plan in place for early identification of potential issues that could impact the delivery of a new application Which of the following is the BEST way to increase the chances of a successful delivery'?

A.

Implement a release and deployment plan

B.

Conduct comprehensive regression testing.

C.

Develop enterprise-wide key risk indicators (KRls)

D.

Include business management on a weekly risk and issues report

Full Access
Question # 437

Reviewing which of the following would provide the MOST useful information when preparing to evaluate the effectiveness of existing controls?

A.

Previous audit reports

B.

Control objectives

C.

Risk responses in the risk register

D.

Changes in risk profiles

Full Access
Question # 438

A new risk practitioner finds that decisions for implementing risk response plans are not being made. Which of the following would MOST likely explain this situation?

A.

Risk ownership is not being assigned properly.

B.

The organization has a high level of risk appetite.

C.

Risk management procedures are outdated.

D.

The organization's risk awareness program is ineffective.

Full Access
Question # 439

Where is the FIRST place a risk practitioner should look to identify accountability for a specific risk?

A.

Risk register

B.

Risk scenario

C.

RACI matrix

D.

Risk response plan

Full Access
Question # 440

During the creation of an organization's IT risk management program, the BEST time to identify key risk indicators (KRIs) is while:

A.

Interviewing data owners

B.

Reviewing risk response plans with internal audit

C.

Developing a risk monitoring process

D.

Reviewing an external risk assessment

Full Access
Question # 441

Which of the following BEST enables a risk practitioner to understand management's approach to organizational risk?

A.

Organizational structure and job descriptions

B.

Risk appetite and risk tolerance

C.

Industry best practices for risk management

D.

Prior year's risk assessment results

Full Access
Question # 442

An identified high probability risk scenario involving a critical, proprietary business function has an annualized cost of control higher than the annual loss expectancy. Which of the following is the BEST risk response?

A.

Mitigate

B.

Accept

C.

Transfer

D.

Avoid

Full Access
Question # 443

A MAJOR advantage of using key risk indicators (KRIs) is that they:

A.

Identify scenarios that exceed defined risk appetite.

B.

Help with internal control assessments concerning risk appetite.

C.

Assess risk scenarios that exceed defined thresholds.

D.

Identify when risk exceeds defined thresholds.

Full Access
Question # 444

Which process is MOST effective to determine relevance of threats for risk scenarios?

A.

Vulnerability assessment

B.

Business impact analysis (BIA)

C.

Penetration testing

D.

Root cause analysis

Full Access
Question # 445

The PRIMARY purpose of vulnerability assessments is to:

A.

provide clear evidence that the system is sufficiently secure.

B.

determine the impact of potential threats.

C.

test intrusion detection systems (IDS) and response procedures.

D.

detect weaknesses that could lead to system compromise.

Full Access
Question # 446

Which of the following is MOST important to consider when assessing the likelihood that a recently discovered software vulnerability will be exploited?

A.

The skill level required of a threat actor

B.

The amount of personally identifiable information (PH) disclosed

C.

The ability to detect and trace the threat action

D.

The amount of data that might be exposed by a threat action

Full Access
Question # 447

Which of the following risk register elements is MOST likely to be updated if the attack surface or exposure of an asset is reduced?

A.

Likelihood rating

B.

Control effectiveness

C.

Assessment approach

D.

Impact rating

Full Access
Question # 448

The PRIMARY benefit of conducting a risk workshop using a top-down approach instead of a bottom-up approach is the ability to:

A.

identify specific project risk.

B.

obtain a holistic view of IT strategy risk.

C.

understand risk associated with complex processes.

D.

incorporate subject matter expertise.

Full Access
Question # 449

Which of the following provides the MOST useful information for developing key risk indicators (KRIs)?

A.

Business impact analysis (BIA) results

B.

Risk scenario ownership

C.

Risk thresholds

D.

Possible causes of materialized risk

Full Access
Question # 450

Which of the following would be MOST helpful to a risk owner when making risk-aware decisions?

A.

Risk exposure expressed in business terms

B.

Recommendations for risk response options

C.

Resource requirements for risk responses

D.

List of business areas affected by the risk

Full Access
Question # 451

Which of the following risk scenarios would be the GREATEST concern as a result of a single sign-on implementation?

A.

User access may be restricted by additional security.

B.

Unauthorized access may be gained to multiple systems.

C.

Security administration may become more complex.

D.

User privilege changes may not be recorded.

Full Access
Question # 452

Which of the following is the BEST method for assessing control effectiveness against technical vulnerabilities that could be exploited to compromise an information system?

A.

Vulnerability scanning

B.

Systems log correlation analysis

C.

Penetration testing

D.

Monitoring of intrusion detection system (IDS) alerts

Full Access
Question # 453

A change management process has recently been updated with new testing procedures. What is the NEXT course of action?

A.

Monitor processes to ensure recent updates are being followed.

B.

Communicate to those who test and promote changes.

C.

Conduct a cost-benefit analysis to justify the cost of the control.

D.

Assess the maturity of the change management process.

Full Access
Question # 454

In an organization where each division manages risk independently, which of the following would BEST enable management of risk at the enterprise level?

A.

A standardized risk taxonomy

B.

A list of control deficiencies

C.

An enterprise risk ownership policy

D.

An updated risk tolerance metric

Full Access
Question # 455

A risk practitioner has observed that there is an increasing trend of users sending sensitive information by email without using encryption. Which of the following would be the MOST effective approach to mitigate the risk associated with data loss?

A.

Implement a tool to create and distribute violation reports

B.

Raise awareness of encryption requirements for sensitive data.

C.

Block unencrypted outgoing emails which contain sensitive data.

D.

Implement a progressive disciplinary process for email violations.

Full Access
Question # 456

Which of the following is the MOST effective control to ensure user access is maintained on a least-privilege basis?

A.

User authorization

B.

User recertification

C.

Change log review

D.

Access log monitoring

Full Access
Question # 457

Which of the following BEST mitigates the risk of violating privacy laws when transferring personal information lo a supplier?

A.

Encrypt the data while in transit lo the supplier

B.

Contractually obligate the supplier to follow privacy laws.

C.

Require independent audits of the supplier's control environment

D.

Utilize blockchain during the data transfer

Full Access
Question # 458

A company has located its computer center on a moderate earthquake fault. Which of the following is the MOST important consideration when establishing a contingency plan and an alternate processing site?

A.

The contingency plan provides for backup media to be taken to the alternative site.

B.

The contingency plan for high priority applications does not involve a shared cold site.

C.

The alternative site is a hot site with equipment ready to resume processing immediately.

D.

The alternative site does not reside on the same fault no matter how far the distance apart.

Full Access
Question # 459

In an organization that allows employee use of social media accounts for work purposes, which of the following is the BEST way to protect company sensitive information from being exposed?

A.

Educating employees on what needs to be kept confidential

B.

Implementing a data loss prevention (DLP) solution

C.

Taking punitive action against employees who expose confidential data

D.

Requiring employees to sign nondisclosure agreements

Full Access
Question # 460

Which of the following will be MOST effective to mitigate the risk associated with the loss of company data stored on personal devices?

A.

An acceptable use policy for personal devices

B.

Required user log-on before synchronizing data

C.

Enforced authentication and data encryption

D.

Security awareness training and testing

Full Access
Question # 461

A global company s business continuity plan (BCP) requires the transfer of its customer information….

event of a disaster. Which of the following should be the MOST important risk consideration?

A.

The difference In the management practices between each company

B.

The cloud computing environment is shared with another company

C.

The lack of a service level agreement (SLA) in the vendor contract

D.

The organizational culture differences between each country

Full Access
Question # 462

A risk practitioner is summarizing the results of a high-profile risk assessment sponsored by senior management. The BEST way to support risk-based decisions by senior management would be to:

A.

map findings to objectives.

B.

provide quantified detailed analysis

C.

recommend risk tolerance thresholds.

D.

quantify key risk indicators (KRls).

Full Access
Question # 463

A penetration testing team discovered an ineffectively designed access control. Who is responsible for ensuring the control design gap is remediated?

A.

Control owner

B.

Risk owner

C.

IT security manager

D.

Control operator

Full Access
Question # 464

Which of the following will BEST help an organization select a recovery strategy for critical systems?

A.

Review the business impact analysis.

B.

Create a business continuity plan.

C.

Analyze previous disaster recovery reports.

D.

Conduct a root cause analysis.

Full Access
Question # 465

Which of the following should be of GREATEST concern when reviewing the results of an independent control assessment to determine the effectiveness of a vendor's control environment?

A.

The report was provided directly from the vendor.

B.

The risk associated with multiple control gaps was accepted.

C.

The control owners disagreed with the auditor's recommendations.

D.

The controls had recurring noncompliance.

Full Access
Question # 466

An unauthorized individual has socially engineered entry into an organization's secured physical premises. Which of the following is the BEST way to prevent future occurrences?

A.

Employ security guards.

B.

Conduct security awareness training.

C.

Install security cameras.

D.

Require security access badges.

Full Access
Question # 467

Which of the following would be MOST beneficial as a key risk indicator (KRI)?

A.

Current capital allocation reserves

B.

Negative security return on investment (ROI)

C.

Project cost variances

D.

Annualized loss projections

Full Access
Question # 468

An organization recently configured a new business division Which of the following is MOST likely to be affected?

A.

Risk profile

B.

Risk culture

C.

Risk appetite

D.

Risk tolerance

Full Access
Question # 469

Which of the following would be a weakness in procedures for controlling the migration of changes to production libraries?

A.

The programming project leader solely reviews test results before approving the transfer to production.

B.

Test and production programs are in distinct libraries.

C.

Only operations personnel are authorized to access production libraries.

D.

A synchronized migration of executable and source code from the test environment to the production environment is allowed.

Full Access
Question # 470

Which of the following is the BEST method to track asset inventory?

A.

Periodic asset review by management

B.

Asset registration form

C.

Automated asset management software

D.

IT resource budgeting process

Full Access
Question # 471

Management has noticed storage costs have increased exponentially over the last 10 years because most users do not delete their emails. Which of the following can BEST alleviate this issue while not sacrificing security?

A.

Implementing record retention tools and techniques

B.

Establishing e-discovery and data loss prevention (DLP)

C.

Sending notifications when near storage quota

D.

Implementing a bring your own device 1BVOD) policy

Full Access
Question # 472

Which of the following emerging technologies is frequently used for botnet distributed denial of service (DDoS) attacks?

A.

Internet of Things (IoT)

B.

Quantum computing

C.

Virtual reality (VR)

D.

Machine learning

Full Access
Question # 473

Which of the following is the BEST way for an organization to enable risk treatment decisions?

A.

Allocate sufficient funds for risk remediation.

B.

Promote risk and security awareness.

C.

Establish clear accountability for risk.

D.

Develop comprehensive policies and standards.

Full Access
Question # 474

Which of the following is the BEST indication that an organization's risk management program has not reached the desired maturity level?

A.

Significant increases in risk mitigation budgets

B.

Large fluctuations in risk ratings between assessments

C.

A steady increase in the time to recover from incidents

D.

A large number of control exceptions

Full Access
Question # 475

Which of the following changes would be reflected in an organization's risk profile after the failure of a critical patch implementation?

A.

Risk tolerance is decreased.

B.

Residual risk is increased.

C.

Inherent risk is increased.

D.

Risk appetite is decreased

Full Access
Question # 476

Which of the following key risk indicators (KRIs) is MOST effective for monitoring risk related to a bring your own device (BYOD) program?

A.

Number of users who have signed a BYOD acceptable use policy

B.

Number of incidents originating from BYOD devices

C.

Budget allocated to the BYOD program security controls

D.

Number of devices enrolled in the BYOD program

Full Access
Question # 477

Which of the following is the GREATEST concern related to the monitoring of key risk indicators (KRIs)?

A.

Logs are retained for longer than required.

B.

Logs are reviewed annually.

C.

Logs are stored in a multi-tenant cloud environment.

D.

Logs are modified before analysis is conducted.

Full Access
Question # 478

Which of the following is MOST important to include in a Software as a Service (SaaS) vendor agreement?

A.

An annual contract review

B.

A service level agreement (SLA)

C.

A requirement to adopt an established risk management framework

D.

A requirement to provide an independent audit report

Full Access
Question # 479

Which of the following is the MOST useful information an organization can obtain from external sources about emerging threats?

A.

Solutions for eradicating emerging threats

B.

Cost to mitigate the risk resulting from threats

C.

Indicators for detecting the presence of threatsl)

D.

Source and identity of attackers

Full Access
Question # 480

An organization recently experienced a cyber attack that resulted in the loss of confidential customer data. Which of the following is the risk practitioner's BEST recommendation after recovery steps have been completed?

A.

Develop new key risk indicators (KRIs).

B.

Perform a root cause analysis.

C.

Recommend the purchase of cyber insurance.

D.

Review the incident response plan.

Full Access
Question # 481

Which of the following is the MOST important characteristic when designing a key risk indicator (KRI)?

A.

It is linked to a key performance indicator (KPI)

B.

It is linked to a key control indicator (KCI)

C.

It contains an objective alert threshold

D.

It aligns with industry benchmarks

Full Access
Question # 482

Which of the following risk management practices BEST facilitates the incorporation of IT risk scenarios into the enterprise-wide risk register?

A.

Key risk indicators (KRls) are developed for key IT risk scenarios

B.

IT risk scenarios are assessed by the enterprise risk management team

C.

Risk appetites for IT risk scenarios are approved by key business stakeholders.

D.

IT risk scenarios are developed in the context of organizational objectives.

Full Access
Question # 483

Before implementing instant messaging within an organization using a public solution, which of the following should be in place to mitigate data leakage risk?

A.

A data extraction tool

B.

An access control list

C.

An intrusion detection system (IDS)

D.

An acceptable usage policy

Full Access
Question # 484

A risk practitioner is reporting on an increasing trend of ransomware attacks in the industry. Which of the following information is MOST important to include to enable an informed response decision by key stakeholders?

A.

Methods of attack progression

B.

Losses incurred by industry peers

C.

Most recent antivirus scan reports

D.

Potential impact of events

Full Access
Question # 485

A risk practitioner is performing a risk assessment of recent external advancements in quantum computing. Which of the following would pose the GREATEST concern for the risk practitioner?

A.

The organization has not adopted Infrastructure as a Service (IaaS) for its operations

B.

The organization has incorporated blockchain technology in its operations

C.

The organization has implemented heuristics on its network firewall

D.

The organization has not reviewed its encryption standards

Full Access
Question # 486

A maturity model is MOST useful to an organization when it:

A.

benchmarks against other organizations

B.

defines a qualitative measure of risk

C.

provides a reference for progress

D.

provides risk metrics.

Full Access
Question # 487

Which of the following would provide the MOST helpful input to develop risk scenarios associated with hosting an organization's key IT applications in a cloud environment?

A.

Reviewing the results of independent audits

B.

Performing a site visit to the cloud provider's data center

C.

Performing a due diligence review

D.

Conducting a risk workshop with key stakeholders

Full Access
Question # 488

Which of the following is the MOST common concern associated with outsourcing to a service provider?

A.

Lack of technical expertise

B.

Combining incompatible duties

C.

Unauthorized data usage

D.

Denial of service attacks

Full Access
Question # 489

In addition to the risk exposure, which of the following is MOST important for senior management to understand prior to approving the use of artificial intelligence (Al) solutions?

A.

Potential benefits from use of Al solutions

B.

Monitoring techniques required for AI solutions

C.

Changes to existing infrastructure to support Al solutions

D.

Skills required to support Al solutions

Full Access
Question # 490

The BEST way for management to validate whether risk response activities have been completed is to review:

A.

the risk register change log.

B.

evidence of risk acceptance.

C.

control effectiveness test results.

D.

control design documentation.

Full Access
Question # 491

An organization has completed a risk assessment of one of its service providers. Who should be accountable for ensuring that risk responses are implemented?

A.

IT risk practitioner

B.

Third -partf3ecurity team

C.

The relationship owner

D.

Legal representation of the business

Full Access
Question # 492

Which of the following is MOST important to update when an organization's risk appetite changes?

A.

Key risk indicators (KRIs)

B.

Risk reporting methodology

C.

Key performance indicators (KPIs)

D.

Risk taxonomy

Full Access
Question # 493

Which of the following is the PRIMARY advantage of aligning generic risk scenarios with business objectives?

A.

It establishes where controls should be implemented.

B.

It ensures relevance to the organization.

C.

It quantifies the materiality of any losses that may occur.

D.

It provides better estimates of the impact of current threats.

Full Access
Question # 494

Who should be accountable for monitoring the control environment to ensure controls are effective?

A.

Risk owner

B.

Security monitoring operations

C.

Impacted data owner

D.

System owner

Full Access
Question # 495

Which of the following BEST enables effective risk-based decision making?

A.

Performing threat modeling to understand the threat landscape

B.

Minimizing the number of risk scenarios for risk assessment

C.

Aggregating risk scenarios across a key business unit

D.

Ensuring the risk register is updated to reflect changes in risk factors

Full Access
Question # 496

An organization has introduced risk ownership to establish clear accountability for each process. To ensure effective risk ownership, it is MOST important that:

A.

senior management has oversight of the process.

B.

process ownership aligns with IT system ownership.

C.

segregation of duties exists between risk and process owners.

D.

risk owners have decision-making authority.

Full Access
Question # 497

A control process has been implemented in response to a new regulatory requirement, but has significantly reduced productivity. Which of the following is the BEST way to resolve this concern?

A.

Absorb the loss in productivity.

B.

Request a waiver to the requirements.

C.

Escalate the issue to senior management

D.

Remove the control to accommodate business objectives.

Full Access
Question # 498

Following the implementation of an Internet of Things (loT) solution, a risk practitioner identifies new risk factors with impact to existing controls. Which of the following is MOST important to include in a report to stakeholders?

A.

Identified vulnerabilities

B.

Business managers' concerns

C.

Changes to residual risk

D.

Risk strategies of peer organizations

Full Access
Question # 499

An organization has outsourced its backup and recovery procedures to a third-party cloud provider. Which of the following should be the risk practitioner's NEXT course of action?

A.

Remove the associated risk from the register.

B.

Validate control effectiveness and update the risk register.

C.

Review the contract and service level agreements (SLAs).

D.

Obtain an assurance report from the third-party provider.

Full Access
Question # 500

The BEST way for an organization to ensure that servers are compliant to security policy is

to review:

A.

change logs.

B.

configuration settings.

C.

server access logs.

D.

anti-malware compliance.

Full Access
Question # 501

Which of the following is MOST important when discussing risk within an organization?

A.

Adopting a common risk taxonomy

B.

Using key performance indicators (KPIs)

C.

Creating a risk communication policy

D.

Using key risk indicators (KRIs)

Full Access
Question # 502

Which of the following would be the result of a significant increase in the motivation of a malicious threat actor?

A.

Increase in mitigating control costs

B.

Increase in risk event impact

C.

Increase in risk event likelihood

D.

Increase in cybersecurity premium

Full Access
Question # 503

A risk practitioner has received an updated enterprise risk management (ERM) report showing that residual risk is now within the organization's defined appetite and tolerance levels. Which of the following is the risk practitioner's BEST course of action?

A.

Identify new risk entries to include in ERM.

B.

Remove the risk entries from the ERM register.

C.

Re-perform the risk assessment to confirm results.

D.

Verify the adequacy of risk monitoring plans.

Full Access
Question # 504

The BEST use of key risk indicators (KRIs) is to provide:

A.

Early indication of increasing exposure to a specific risk.

B.

Lagging indication of major information security incidents.

C.

Early indication of changes to required risk response.

D.

Insight into the performance of a monitored process.

Full Access
Question # 505

A risk assessment has identified that departments have installed their own WiFi access points on the enterprise network. Which of the following would be MOST important to include in a report to senior management?

A.

The network security policy

B.

Potential business impact

C.

The WiFi access point configuration

D.

Planned remediation actions

Full Access
Question # 506

An organization has experienced a cyber-attack that exposed customer personally identifiable information (Pll) and caused extended outages of network services. Which of the following stakeholders are MOST important to include in the cyber response team to determine response actions?

A.

Security control owners based on control failures

B.

Cyber risk remediation plan owners

C.

Risk owners based on risk impact

D.

Enterprise risk management (ERM) team

Full Access
Question # 507

Which of the following should be the FIRST consideration when establishing a new risk governance program?

A.

Developing an ongoing awareness and training program

B.

Creating policies and standards that are easy to comprehend

C.

Embedding risk management into the organization

D.

Completing annual risk assessments on critical resources

Full Access
Question # 508

A zero-day vulnerability has been discovered in a globally used brand of hardware server that allows hackers to gain

access to affected IT systems. Which of the following is MOST likely to change as a result of this situation?

A.

Control effectiveness

B.

Risk appetite

C.

Risk likelihood

D.

Key risk indicator (KRI)

Full Access
Question # 509

An incentive program is MOST likely implemented to manage the risk associated with loss of which organizational asset?

A.

Employees

B.

Data

C.

Reputation

D.

Customer lists

Full Access
Question # 510

Which of the following provides the MOST useful input to the development of realistic risk scenarios?

A.

Balanced scorecard

B.

Risk appetite

C.

Risk map

D.

Risk events

Full Access
Question # 511

Who should be accountable for authorizing information system access to internal users?

A.

Information security officer

B.

Information security manager

C.

Information custodian

D.

Information owner

Full Access
Question # 512

While conducting an organization-wide risk assessment, it is noted that many of the information security policies have not changed in the past three years. The BEST course of action is to:

A.

review and update the policies to align with industry standards.

B.

determine that the policies should be updated annually.

C.

report that the policies are adequate and do not need to be updated frequently.

D.

review the policies against current needs to determine adequacy.

Full Access
Question # 513

Senior management has requested a risk practitioner's guidance on whether

a new technical control requested by a business unit is worth the investment.

Which of the following should be the MOST important consideration before

providing input?

A.

The cost of the control relative to the value of risk mitigation

B.

The effectiveness of the control at reducing residual risk levels

C.

The likelihood of a successful attack based on current risk

D.

assessments

E.

The availabilitv of budgeted funds for risk mitigationMitination

Full Access
Question # 514

Which of the following key performance indicators (KPis) would BEST measure me risk of a service outage when using a Software as a Service (SaaS) vendors

A.

Frequency of business continuity plan (BCP) lasting

B.

Frequency and number of new software releases

C.

Frequency and duration of unplanned downtime

D.

Number of IT support staff available after business hours

Full Access
Question # 515

A business is conducting a proof of concept on a vendor’s AI technology. Which of the following is the MOST important consideration for managing risk?

A.

Use of a non-production environment

B.

Regular security updates

C.

Third-party management plan

D.

Adequate vendor support

Full Access
Question # 516

A risk practitioner notes control design changes when comparing risk response to a previously approved action plan. Which of the following is MOST important for the practitioner to confirm?

A.

Appropriate approvals for the control changes

B.

The reason the action plan was modified

C.

The risk owner's approval of the revised action plan

D.

The effectiveness of the resulting control

Full Access
Question # 517

To implement the MOST effective monitoring of key risk indicators (KRIs), which of the following needs to be in place?

A.

Threshold definition

B.

Escalation procedures

C.

Automated data feed

D.

Controls monitoring

Full Access
Question # 518

Which of the following controls BEST helps to ensure that transaction data reaches its destination?

A.

Securing the network from attacks

B.

Providing acknowledgments from receiver to sender

C.

Digitally signing individual messages

D.

Encrypting data-in-transit

Full Access
Question # 519

An organization has initiated a project to implement an IT risk management program for the first time. The BEST time for the risk practitioner to start populating the risk register is when:

A.

identifying risk scenarios.

B.

determining the risk strategy.

C.

calculating impact and likelihood.

D.

completing the controls catalog.

Full Access
Question # 520

A company has recently acquired a customer relationship management (CRM) application from a certified software vendor. Which of the following will BE ST help lo prevent technical vulnerabilities from being exploded?

A.

implement code reviews and Quality assurance on a regular basis

B.

Verity me software agreement indemnifies the company from losses

C.

Review the source coda and error reporting of the application

D.

Update the software with the latest patches and updates

Full Access
Question # 521

Which of the following MUST be assessed before considering risk treatment options for a scenario with significant impact?

A.

Risk magnitude

B.

Incident probability

C.

Risk appetite

D.

Cost-benefit analysis

Full Access
Question # 522

Key risk indicators (KRIs) are MOST useful during which of the following risk management phases?

A.

Monitoring

B.

Analysis

C.

Identification

D.

Response selection

Full Access
Question # 523

Controls should be defined during the design phase of system development because:

A.

it is more cost-effective to determine controls in the early design phase.

B.

structured analysis techniques exclude identification of controls.

C.

structured programming techniques require that controls be designed before coding begins.

D.

technical specifications are defined during this phase.

Full Access