In an organization that allows employee use of social media accounts for work purposes, which of the following is the BEST way to protect company sensitive information from being exposed?
Which of the following is the MOST critical element to maximize the potential for a successful security implementation?
Which of the following is the GREATEST benefit of reviewing security trends reported by a log monitoring system?
It is MOST important that entries in an organization’s risk register be updated:
While reviewing the risk register, a risk practitioner notices that different business units have significant variances in inherent risk for the same risk scenario. Which of the following is the BEST course of action?
Which of the following would be a risk practitioner ' $ BEST recommendation to help ensure cyber risk is assessed and reflected in the enterprise-level risk profile?
When reviewing a risk response strategy, senior management ' s PRIMARY focus should be placed on the:
Which risk analysis methodology uses diagrams to analyze causes and consequences of particular risk events?
What should be the PRIMARY objective for a risk practitioner performing a post-implementation review of an IT risk mitigation project?
An organization moved its payroll system to a Software as a Service (SaaS) application. A new data privacy regulation stipulates that data can only be processed within the countrywhere it is collected. Which of the following should be done FIRST when addressing this situation?
Within the three lines of defense model, the accountability for the system of internal control resides with:
Which of the following is the BEST approach to mitigate the risk associated with a control deficiency?
Which of the following is the GREATEST benefit of incorporating IT risk scenarios into the corporate risk register?
A recent internal risk review reveals the majority of core IT application recovery time objectives (RTOs) have exceeded the maximum time defined by the business application owners. Which of the following is MOST likely to change as a result?
Which of the following would provide the MOST helpful input to develop risk scenarios associated with hosting an organization ' s key IT applications in a cloud environment?
An organization delegates its data processing to the internal IT team to manage information through its applications. Which of the following is the role of the internal IT team in this situation?
When defining thresholds for control key performance indicators (KPIs). it is MOST helpful to align:
Which of the following is the MOST important reason for an organization to regularly assess the design of key risk indicators (KRIs)?
Which of the following is MOST helpful to review when assessing the risk exposure associated with ransomware?
What should be the PRIMARY consideration related to data privacy protection when there are plans for a business initiative to make use of personal information?
An organization has made a decision to purchase a new IT system. During when phase of the system development life cycle (SDLC) will identified risk MOST likely lead to architecture and design trade-offs?
An organization has outsourced its ERP application to an external SaaS provider. Which of the following provides the MOST useful information to identify risk scenarios involving data loss?
Which of the following is the MOST important technology control to reduce the likelihood of fraudulent payments committed internally?
An organization ' s recovery team is attempting to recover critical data backups following a major flood in its data center. However, key team members do not know exactly what steps should be taken to address this crisis. Which of the following is the MOST likely cause of this situation?
Which of the following IT key risk indicators (KRIs) provides management with the BEST feedback on IT capacity?
Analyzing trends in key control indicators (KCIs) BEST enables a risk practitioner to proactively identify impacts on an organization ' s:
Which of the following sources is MOST relevant to reference when updating security awareness training materials?
Because of a potential data breach, an organization has decided to temporarily shut down its online sales order system until sufficient controls can be implemented. Which risk treatment has been selected?
Which of the following is MOST important when creating a program to reduce ethical risk?
Which of the following BEST enables a proactive approach to minimizing the potential impact of unauthorized data disclosure?
Which of the following is the MOST appropriate key risk indicator (KRI) for backup media that is recycled monthly?
Which of the following is the MOST effective control to maintain the integrity of system configuration files?
A risk practitioner is developing a set of bottom-up IT risk scenarios. The MOST important time to involve business stakeholders is when:
Which of the following is PRIMARILY responsible for providing assurance to the board of directors and senior management during the evaluation of a risk management program implementation?
In order to efficiently execute a risk response action plan, it is MOST important for the emergency response team members to understand:
Which of the following should be considered FIRST when creating a comprehensive IT risk register?
A risk practitioners PRIMARY focus when validating a risk response action plan should be that risk response:
Which of the following is the MOST important concern when assigning multiple risk owners for an identified risk?
Which of the following approaches MOST effectively enables accountability for data protection?
Which of the following is a PRIMARY benefit of creating an organizational code of conduct?
A small organization finds it difficult to implement separation of duties necessary to mitigate the likelihood of system misuse. Which of the following would be the BEST compensating control?
Which of the following risk activities is BEST facilitated by enterprise architecture (EA)?
Which of the following should be considered FIRST when managing a risk event related to theft and disclosure of customer information?
During a risk assessment, a risk practitioner learns that an IT risk factor is adequately mitigated by compensating controls in an associated business process. Which of the following would enable the MOST effective management of the residual risk?
Which of the following is the MOST important requirement when implementing a data loss prevention (DLP) system?
What would be MOST helpful to ensuring the effective implementation of a new cybersecurity program?
Which of the following would BEST provide early warning of a high-risk condition?
A business impact analysis (BIA) enables an organization to determine appropriate IT risk mitigation actions by:
Which of the following will have the GREATEST influence when determining an organization ' s risk appetite?
A risk practitioner can use an organization ' s problem management process to anticipate potential risk within IT systems by:
Which of the following is of GREATEST concern when uncontrolled changes are made to the control environment?
Which of the following scenarios presents the GREATEST risk for a global organization when implementing a data classification policy?
Which of the following functions independently reviews and provides feedback regarding the achievement of organizational objectives?
Which of the following is the BEST Key control indicator KCO to monitor the effectiveness of patch management?
Which of the following is the PRIMARY reason to ensure policies and standards are properly documented within the risk management process?
Who is BEST suited to determine whether a new control properly mitigates data loss risk within a system?
Which of the following BEST indicates effective information security incident management?
A global company s business continuity plan (BCP) requires the transfer of its customer information….
event of a disaster. Which of the following should be the MOST important risk consideration?
The operational risk associated with attacks on a web application should be owned by the individual in charge of:
Which of the following should be the PRIMARY input to determine risk tolerance?
Which of the following is the MOST important consideration when performing a risk assessment of a fire suppression system within a data center?
Which of the following is the MOST important consideration when developing an organization ' s risk taxonomy?
From a risk management perspective, which of the following is the PRIMARY purpose of conducting a root cause analysis following an incident?
Which of the following activities is a responsibility of the second line of defense?
Which of the following s MOST likely to deter an employee from engaging in inappropriate use of company owned IT systems?
Which of the following is the MOST effective way to mitigate identified risk scenarios?
Which of the following techniques would be used during a risk assessment to demonstrate to stakeholders that all known alternatives were evaluated?
Participants in a risk workshop have become focused on the financial cost to mitigate risk rather than choosing the most appropriate response. Which of the following is the BEST way to address this type of issue in the long term?
Which of the following presents the GREATEST security risk to an organization with a large number of Internet of Things (IoT) devices within its network?
Which of the following practices would be MOST effective in protecting personality identifiable information (Ptl) from unauthorized access m a cloud environment?
An organization is planning to implement a Zero Trust model. From a cybersecunty perspective, which of the following is MOST important to ensure successful alignment with the overall inten Zero Trust?
The BEST way to justify the risk mitigation actions recommended in a risk assessment would be to:
Which of the following BEST enables the integration of IT risk management across an organization?
A vendor ' s planned maintenance schedule will cause a critical application to temporarily lose failover capabilities. Of the following, who should approve this proposed schedule?
A global organization is considering the transfer of its customer information systems to an overseas cloud service provider in the event of a disaster. Which of the following should be the MOST important risk consideration?
A risk practitioner has been notified that an employee sent an email in error containing customers ' personally identifiable information (Pll). Which of the following is the risk practitioner ' s BEST course of action?
What is a risk practitioner ' s BEST approach to monitor and measure how quickly an exposure to a specific risk can affect the organization?
An organization is considering allowing users to access company data from their personal devices. Which of the following is the MOST important factor when assessing the risk?
Which of the following BEST mitigates the risk of sensitive personal data leakage from a software development environment?
While reviewing a contract of a cloud services vendor, it was discovered that the vendor refuses to accept liability for a sensitive data breach. Which of the following controls will BES reduce the risk associated with such a data breach?
An organization is considering adopting artificial intelligence (AI). Which of the
following is the risk practitioner ' s MOST important course of action?
Which of the following is the GREATEST risk of relying on artificial intelligence (Al) within heuristic security systems?
Which of the following should be a risk practitioner’s MOST important consideration when developing IT risk scenarios?
Which of the following is the PRIMARY role of the board of directors in corporate risk governance?
Which of the following controls would BEST mitigate the risk of user passwords being compromised by a man in the middle technique?
Which of the following is the BEST way for a risk practitioner to consolidate the results of risk assessments across multiple operating units?
When reviewing a report on the performance of control processes, it is MOST important to verify whether the:
A risk practitioner is reviewing the status of an action plan to mitigate an emerging IT risk and finds the risk level has increased. The BEST course of action would be to:
A bank is experiencing an increasing incidence of customer identity theft. Which of the following is the BEST way to mitigate this risk?
Which of the following is a risk practitioner ' s BEST recommendation to senior management when the cost to mitigate a risk scenario exceeds the financial impact should the risk materialize?
Who is the BEST person to an application system used to process employee personal data?
The PRIMARY benefit of conducting a risk workshop using a top-down approach instead of a bottom-up approach is the ability to:
An application development team has a backlog of user requirements for a new system that will process insurance claim payments for customers. Which of the following should be the MOST important consideration for a risk-based review of the user requirements?
Which of the following is MOST important for mitigating ethical risk when establishing accountability for control ownership?
Which of the following should a risk practitioner recommend FIRST when an increasing trend of risk events and subsequent losses has been identified?
An organization recently implemented a machine learning-based solution to monitor IT usage and analyze user behavior in an effort to detect internal fraud. Which of the following is MOST likely to be reassessed as a result of this initiative?
An organization has just started accepting credit card payments from customers via the corporate website. Which of the following is MOST likely to increase as a result of this new initiative?
Which of the following would BEST facilitate the implementation of data classification requirements?
A user has contacted the risk practitioner regarding malware spreading laterally across the organization ' s corporate network. Which of the following is the risk practitioner’s BEST course of action?
Which of the following should be the PRIMARY consideration when identifying and assigning ownership of IT-related risk?
Which of the following is the PRIMARY reason to update a risk register with risk assessment results?
A data processing center operates in a jurisdiction where new regulations have significantly increased penalties for data breaches. Which of the following elements of the risk register is MOST important to update to reflect this change?
Which of the following is the BEST criterion to determine whether higher residual risk ratings in the risk register should be accepted?
It is MOST important to the effectiveness of an IT risk management function that the associated processes are:
Which of the following controls BEST helps to ensure that transaction data reaches its destination?
After entering a large number of low-risk scenarios into the risk register, it is MOST important for the risk practitioner to:
Who is accountable for authorizing application access in a cloud Software as a Service (SaaS) solution?
Warning banners on login screens for laptops provided by an organization to its employees are an example of which type of control?
An organization has completed a project to implement encryption on all databases that host customer data. Which of the following elements of the risk register should be updated the reflect this change?
A process maturity model is MOST useful to the risk management process because it helps:
A risk heat map is MOST commonly used as part of an IT risk analysis to facilitate risk:
Which of the following would MOST likely require a risk practitioner to update the risk register?
Which of the following is MOST important for developing effective key risk indicators (KRIs)?
Which of the following would provide the MOST comprehensive information for updating an organization ' s risk register?
Key control indicators (KCls) help to assess the effectiveness of the internal control environment PRIMARILY by:
Which of the following should be a risk practitioner ' s NEXT action after identifying a high probability of data loss in a system?
Which of the following is the BEST way to ensure data is properly sanitized while in cloud storage?
An organization recently received an independent security audit report of its cloud service provider that indicates significant control weaknesses. What should be done NEXT in response to this report?
An organization has outsourced its lease payment process to a service provider who lacks evidence of compliance with a necessary regulatory standard. Which risk treatment was adopted by the organization?
Within the risk management space, which of the following activities could be
delegated to a cloud service provider?
An organization ' s IT team has proposed the adoption of cloud computing as a cost-saving measure for the business. Which of the following should be of GREATEST concern to the risk practitioner?
What is the BEST information to present to business control owners when justifying costs related to controls?
When classifying and prioritizing risk responses, the areas to address FIRST are those with:
Once a risk owner has decided to implement a control to mitigate risk, it is MOST important to develop:
An organization ' s decision to remain noncompliant with certain laws or regulations is MOST likely influenced by:
The PRIMARY reason for a risk practitioner to review business processes is to:
An organization has outsourced its backup and recovery procedures to a cloud service provider. The provider ' s controls are inadequate for the organization ' s level of risk tolerance. As a result, the organization has internally implemented additional backup and recovery controls. Which risk response has been adopted?
IT management has asked for a consolidated view into the organization ' s risk profile to enable project prioritization and resource allocation. Which of the following materials would
be MOST helpful?
Which of the following shortcomings of perimeter security does Zero Trust aim to resolve?
Which of the following is MOST important for effective communication of a risk profile to relevant stakeholders?
Which of the following should be of MOST concern to a risk practitioner reviewing the system development life cycle (SDLC)?
The PRIMARY reason for tracking the status of risk mitigation plans is to ensure:
Which of the following is the BEST indicator of an effective IT security awareness program?
Which of the following controls would BEST reduce the likelihood of a successful network attack through social engineering?
Which of the following provides the BEST evidence that risk mitigation plans have been implemented effectively?
The PRIMARY benefit of maintaining an up-to-date risk register is that it helps to:
Which of We following is the MOST effective control to address the risk associated with compromising data privacy within the cloud?
The BEST way to obtain senior management support for investment in a control implementation would be to articulate the reduction in:
Which of the following is the MOST important information to cover a business continuity awareness Ira nine, program for all employees of the organization?
Which of the following is MOST important for a risk practitioner to ensure once a risk action plan has been completed?
Which of the following BEST describes the role of the IT risk profile in strategic IT-related decisions?
An organization is implementing Zero Trust architecture to improve its security posture. Which of the following is the MOST important input to develop the architecture?
An organization has recently updated its disaster recovery plan (DRP). Which of the following would be the GREATEST risk if the new plan is not tested?
A risk practitioner is evaluating policies defined by an organization as part of its IT security framework. Which of the following would be of GREATEST concern?
A risk practitioner is reviewing accountability assignments for data risk in the risk register. Which of the following would pose the GREATEST concern?
An organization has decided to outsource a web application, and customer data will be stored in the vendor ' s public cloud. To protect customer data, it is MOST important to ensure which of the following?
To communicate the risk associated with IT in business terms, which of the following MUST be defined?
In a DevOps environment, a container does not pass dynamic application security testing (DAST). How should this situation be categorized?
Which of the following would provide the MOST objective assessment of the effectiveness of an organization ' s security controls?
Which key performance efficiency IKPI) BEST measures the effectiveness of an organization ' s disaster recovery program?
Which of the following is the MOST important consideration for the board and senior leadership
regarding the organization ' s approach to risk management for emerging technologies?
Which of the following is the MOST important topic to cover in a risk awareness training program for all staff?
Read " rights to application files in a controlled server environment should be approved by the:
From a risk management perspective, which of the following is the PRIMARY benefit of using automated system configuration validation tools?
An incentive program is MOST likely implemented to manage the risk associated with loss of which organizational asset?
Upon learning that the number of failed back-up attempts continually exceeds the current risk threshold, the risk practitioner should:
Vulnerabilities have been detected on an organization ' s systems. Applications installed on these systems will not operate if the underlying servers are updated. Which of the following is the risk practitioner ' s BEST course of action?
An organization has built up its cash reserves and has now become financially able to support additional risk while meeting its objectives. What is this change MOST likely to impact?
Which of the following provides the MOST insight regarding an organization ' s risk culture?
Which of the following is the BEST indicator of the effectiveness of IT risk management processes?
Which organizational role should be accountable for ensuring information assets are appropriately classified?
A financial organization is considering a project to implement the use of blockchain technology. To help ensure the organization ' s management team can make informed decisions on the project, which of the following should the risk practitioner reassess?
A risk practitioner is developing a set of bottom-up IT risk scenarios. The MOST important time to involve business stakeholders is when:
A department allows multiple users to perform maintenance on a system using a single set of credentials. A risk practitioner determined this practice to be high-risk. Which of the following is the MOST effective way to mitigate this risk?
As part of its risk strategy, an organization decided to transition its financial system from a cloud-based provider to an internally managed system. Which of the following should the risk practitioner do FIRST?
Which of the following is the GREATEST concern associated with business end users developing their own applications on end user spreadsheets and database programs?
The PRIMARY goal of conducting a business impact analysis (BIA) as part of an overall continuity planning process is to:
Which of the following would BEST facilitate the implementation of data classification requirements?
Which of the following is a PRIMARY reason for considering existing controls during initial risk assessment?
An organization is considering the adoption of an aggressive business strategy to achieve desired growth From a risk management perspective what should the risk practitioner do NEXT?
When establishing leading indicators for the information security incident response process it is MOST important to consider the percentage of reported incidents:
Which of the following would MOST effectively reduce risk associated with an increased volume of online transactions on a retailer website?
Which of the following is the MOST effective way to minimize the impact associated with the loss of key employees?
Which of the following is the MOST comprehensive resource for prioritizing the implementation of information systems controls?
An organization has experienced a cyber-attack that exposed customer personally identifiable information (Pll) and caused extended outages of network services. Which of the following stakeholders are MOST important to include in the cyber response team to determine response actions?
When developing a risk awareness training program, which of the following training topics would BEST facilitate a thorough understanding of risk scenarios?
Zero Trust architecture is designed and deployed with adherence to which of the following basic tenets?
Which of the following is the PRIMARY objective of establishing an organization ' s risk tolerance and appetite?
Which of the following should be the PRIMARY focus of an independent review of a risk management process?
A business delegates its application data management to the internal IT team. Which of the following is the role of the internal IT team in this situation?
It is MOST important for a risk practitioner to have an awareness of an organization s processes in order to:
Which of the following is the PRIMARY responsibility of the first line of defense related to computer-enabled fraud?
Which group has PRIMARY ownership of reputational risk stemming from unethical behavior within the organization?
Reviewing which of the following BEST helps an organization gam insight into its overall risk profile ' '
Which of the following BEST mitigates reputational risk associated with disinformation campaigns against an organization?
Which of the following is the MOST effective key performance indicator (KPI) for change management?
Which of the following is MOST important to ensure before using risk reports in decision making?
Which of the following is the MOST important consideration when prioritizing risk response?
When implementing an IT risk management program, which of the following is the BEST time to evaluate current control effectiveness?
Digital signatures are an effective control method for information exchange over an insecure network because they:
When presenting risk, the BEST method to ensure that the risk is measurable against the organization ' s risk appetite is through the use of a:
Which of the following would be MOST useful when measuring the progress of a risk response action plan?
To enable effective integration of IT risk scenarios and enterprise risk management (ERM), it is MOST important to have a consistent approach to reporting:
Which of the following is the MOST important reason to link an effective key control indicator (KCI) to relevant key risk indicators (KRIs)?
Which of the following is the BEST indication that an organization ' s IT asset life cycle is poorly managed?
An IT project risk was identified during a monthly steering committee meeting. Which of the following roles is BEST positioned to approve the risk mitigation response?
The risk appetite for an organization could be derived from which of the following?
Which of the following is MOST likely to be impacted as a result of a new policy which allows staff members to remotely connect to the organization ' s IT systems via personal or public computers?
Which of the following should be of GREATEST concern to a risk practitioner when determining the effectiveness of IT controls?
Which of the following would MOST effectively reduce the potential for inappropriate exposure of vulnerabilities documented in an organization ' s risk register?
The BEST way to determine the likelihood of a system availability risk scenario is by assessing the:
An organization has outsourced its IT security operations to a third party. Who is ULTIMATELY accountable for the risk associated with the outsourced operations?
The use of multi-factor authentication (MFA) when applied to an FTP connection is an example of which type of control category?
Which of the following is MOST critical to the design of relevant risk scenarios?
Which of the following is MOST helpful in providing a high-level overview of current IT risk severity*?
A chief risk officer (CRO) has asked to have the IT risk register integrated into the enterprise risk management (ERM) process. Which of the following will BEST facilitate the reporting of IT risk at the enterprise level?
Which of the following is the BEST control to prevent unauthorized access to an organization ' s critical assets?
What should a risk practitioner do FIRST when an assessment reveals a control is not operating as intended?
Which of the following is the BEST risk management approach for the strategic IT planning process?
Which of the following should be determined FIRST when a new security vulnerability is made public?
Which of the following is the PRIMARY purpose for ensuring senior management understands the organization’s risk universe in relation to the IT risk management program?
Which of the following will BEST help to improve an organization ' s risk culture?
A third-party vendor has offered to perform user access provisioning and termination. Which of the following control accountabilities is BEST retained within the organization?
Which of the following is the MOST important consideration when developing risk strategies?
An organization operates in an environment where reduced time-to-market for new software products is a top business priority. Which of the following should be the risk practitioner ' s GREATEST concern?
Who is MOST important lo include in the assessment of existing IT risk scenarios?
Reviewing historical risk events is MOST useful for which of the following processes within the risk management life cycle?
Which of the following would be MOST helpful to a risk practitioner when preparing a summary of current IT risk for senior management review?
Which of the following BEST indicates that an organization ' s disaster recovery plan (DRP) will mitigate the risk of the organization failing to recover from a major service disruption?
Which of the following should be a risk practitioner ' s NEXT step after learning of an incident that has affected a competitor?
Which of the following data would be used when performing a business impact analysis (BIA)?
Which of the following is the GREATEST concern associated with insufficient focus on addressing blockchain interoperability in the SDLC?
An organization is planning to move its application infrastructure from on-premises to the cloud. Which of the following is the BEST course of the actin to address the risk associated with data transfer if the relationship is terminated with the vendor?
An organization is developing a risk awareness program for contractors and consultants. Which of the following is MOST important for the organization to keep confidential?
An organization recently configured a new business division Which of the following is MOST likely to be affected?
An organization ' s risk profile indicates that residual risk levels have fallen significantly below management ' s risk appetite. Which of the following is the BEST course of action?
An external data source has released an advisory about a critical vulnerability affecting a widely used software application. Which of the following should the risk practitioner do FIRST?
Which of the following presents the GREATEST risk to change control in business application development over the complete life cycle?
The MOST important characteristic of an organization s policies is to reflect the organization ' s:
Which of the following is MOST important to determine as a result of a risk assessment?
Which of the following is the MOST important course of action to foster an ethical, risk-aware culture?
The results of a risk assessment reveal risk scenarios with high impact and low likelihood of occurrence. Which of the following would be the BEST action to address these scenarios?
Which of the following is the FIRST step when identifying risk items related to a new IT project?
The risk associated with data loss from a website which contains sensitive customer information is BEST owned by:
What is the BEST course of action when the business impact of a risk event is rated high, but the likelihood of risk materialization has decreased?
Which of the following is MOST helpful in defining an early-warning threshold associated with insufficient network bandwidth’’?
During the control evaluation phase of a risk assessment, it is noted that multiple controls are ineffective. Which of the following should be the risk practitioner ' s FIRST course of action?
Which of the following proposed benefits is MOST likely to influence senior management approval to reallocate budget for a new security initiative?
Which of the following is the BEST way to determine the value of information assets for risk management purposes?
Which of the following provides the MOST useful information to senior management about risk mitigation status?
Which of the following provides the MOST useful information for developing key risk indicators (KRIs)?
When creating a program to manage data privacy risk, which of the following is MOST important to ensure that the program is successful?
Which of the following is the MOST important reason to restrict access to the risk register on a need-to-know basis?
The PRIMARY reason for periodic penetration testing of Internet-facing applications is to:
A risk practitioner has been notified of a social engineering attack using artificial intelligence (AI) technology to impersonate senior management personnel. Which of the following would BEST mitigate the impact of such attacks?
During a recent security framework review, it was discovered that the marketing department implemented a non-fungible token asset program. This was done without following established risk procedures. Which of the following should the risk practitioner do FIRST?
Which of the following is MOST helpful when prioritizing action plans for identified risk?
When communicating changes in the IT risk profile, which of the following should be included to BEST enable stakeholder decision making?
Who is responsible for IT security controls that are outsourced to an external service provider?
A risk practitioner recently discovered that personal information from the production environment is required for testing purposes in non-production environments. Which of the following is the BEST recommendation to address this situation?
A newly incorporated enterprise needs to secure its information assets From a governance perspective which of the following should be done FIRST?
Which of the following management action will MOST likely change the likelihood rating of a risk scenario related to remote network access?
Which of the following is a PRIMARY benefit of engaging the risk owner during the risk assessment process?
To minimize the risk of a potential acquisition being exposed externally, an organization has selected a few key employees to be engaged in the due diligence process. A member of the due diligence team realizes a close acquaintance is a high-ranking IT professional at a subsidiary of the company about to be acquired. What is the BEST course of action for this team member?
Which of the following MUST be assessed before considering risk treatment options for a scenario with significant impact?
The PRIMARY benefit of using a maturity model is that it helps to evaluate the:
The MOST important measure of the effectiveness of risk management in project implementation is the percentage of projects:
Which of the following is MOST important to enable well-informed cybersecurity risk decisions?
An organization is implementing encryption for data at rest to reduce the risk associated with unauthorized access. Which of the following MUST be considered to assess the residual risk?
A risk practitioner is assisting with the preparation of a report on the organization s disaster recovery (DR) capabilities. Which information would have the MOST impact on the overall recovery profile?
Which of the following is the MOST useful indicator to measure the efficiency of an identity and access management process?
Which of the following BEST confirms the existence and operating effectiveness of information systems controls?
Which of the following key performance indicators (KPis) would BEST measure me risk of a service outage when using a Software as a Service (SaaS) vendors
A business unit has decided to accept the risk of implementing an off-the-shelf, commercial software package that uses weak password controls. The BEST course of action would be to:
Within the three lines of defense model, the PRIMARY responsibility for ensuring risk mitigation controls are properly configured belongs with:
A risk practitioner is summarizing the results of a high-profile risk assessment sponsored by senior management. The BEST way to support risk-based decisions by senior management would be to:
A risk practitioner is concerned with potential data loss in the event of a breach at a hosted third-party provider. Which of the following is the BEST way to mitigate this risk?
Which of the following is the PRIMARY reason to use administrative controls in conjunction with technical controls?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of IT policies? The number of:
Which of the following is MOST important to consider when selecting risk indicators (KRIs)? The ability to:
An unauthorized individual has socially engineered entry into an organization ' s secured physical premises. Which of the following is the BEST way to prevent future occurrences?
Which of the following would BEST mitigate the risk associated with reputational damage from inappropriate use of social media sites by employees?
Which stakeholder is MOST important to include when defining a risk profile during me selection process for a new third party application?
An organization has established workflows in its service desk to support employee reports of security-related concerns. Which of the following is the MOST efficient approach to analyze these concerns?
Which of the following is the MOST important characteristic when designing a key risk indicator (KRI)?
For a large software development project, risk assessments are MOST effective when performed:
Management has noticed storage costs have increased exponentially over the last 10 years because most users do not delete their emails. Which of the following can BEST alleviate this issue while not sacrificing security?
Which of the following is the BEST control for a large organization to implement to effectively mitigate risk related to fraudulent transactions?
A key risk indicator (KRI) indicates a reduction in the percentage of appropriately patched servers. Which of the following is the risk practitioner ' s BEST course of action?
An organization’s expense claim system allows users to split large transactions into smaller ones to bypass limits. What should the risk practitioner do?
Which of the following BEST facilitates the mitigation of identified gaps between current and desired risk environment states?
Which of the following is MOST important to determine when assessing the potential risk exposure of a loss event involving personal data?
The FIRST step for a startup company when developing a disaster recovery plan (DRP) should be to identify:
Which of the following is accountable for the management of IT risk within an organization?
Which of the following will be MOST effective in uniquely identifying the originator of electronic transactions?
A peer review of a risk assessment finds that a relevant threat community was not included. Mitigation of the risk will require substantial changes to a software application. Which of the following is the BEST course of action?
Which of the following could BEST detect an in-house developer inserting malicious functions into a web-based application?
A risk practitioner has identified that the organization ' s secondary data center does not provide redundancy for a critical application. Who should have the authority to accept the associated risk?
Which of the following is the MOST effective way to help ensure future risk levels do not exceed the organization ' s risk appetite?
Which of the following would be the BEST way to help ensure the effectiveness of a data loss prevention (DLP) control that has been implemented to prevent the loss of credit card data?
An organization has raised the risk appetite for technology risk. The MOST likely result would be:
To implement the MOST effective monitoring of key risk indicators (KRIs), which of the following needs to be in place?
Key performance indicators (KPIs) are BEST utilized to provide a high-level overview of:
One of an organization ' s key IT systems cannot be patched because the patches interfere with critical business application functionalities. Which of the following would be the risk practitioner ' s BEST recommendation?
Which of the following BEST enables an organization to address risk associated with technical complexity?
Which of the following is the PRIMARY objective of maintaining an information asset inventory?
Which of the following is MOST essential for an effective change control environment?
Which of the following is the MOST significant risk associated with using cloud computing for disaster recovery?
A risk practitioner is advising management on how to update the IT policy framework to account for the organization s cloud usage. Which of the following should be the FIRST step in this process?
Which of the following will be MOST effective to mitigate the risk associated with the loss of company data stored on personal devices?
Which of the following is the MOST relevant information to include in a risk management strategy?
Which of the following BEST enables an organization to determine whether external emerging risk factors will impact the organization ' s risk profile?
Which of the following would be MOST helpful when selecting appropriate protection for data?
The BEST way to mitigate the high cost of retrieving electronic evidence associated with potential litigation is to implement policies and procedures for.
Which of the following would be the GREATEST challenge when implementing a corporate risk framework for a global organization?
Which of the following controls will BEST mitigate risk associated with excessive access privileges?
Which of the following should be used as the PRIMARY basis for evaluating the state of an organization ' s cloud computing environment against leading practices?
Which of the following activities would BEST contribute to promoting an organization-wide risk-aware culture?
A risk practitioner is utilizing a risk heat map during a risk assessment. Risk events that are coded with the same color will have a similar:
A threat intelligence team has identified an indicator of compromise related to an advanced persistent threat (APT) actor. Which of the following is the risk practitioner ' s BEST course of action?
Which of the following is the MOST important update for keeping the risk register current?
Which of the following is the BEST indication of an improved risk-aware culture following the implementation of a security awareness training program for all employees?
Which of the following would provide the BEST guidance when selecting an appropriate risk treatment plan?
Which of the following is the GREATEST risk associated with the use of data analytics?
Which of the following is MOST helpful to facilitate the decision of recovery priorities in a disaster situation?
During which phase of the system development life cycle (SDLC) should information security requirements for the implementation of a new IT system be defined?
Which of the following is the MOST important consideration for protecting data assets m a Business application system?
Which of the following is MOST important to update when an organization ' s risk appetite changes?
Quantifying the value of a single asset helps the organization to understand the:
Which of the following is the BEST method for determining an enterprise ' s current appetite for risk?
Which of the following is the BEST metric to demonstrate the effectiveness of an organization ' s change management process?
After the implementation of a blockchain solution, a risk practitioner discovers noncompliance with new industry regulations. Which of the following is the MOST important course of actionpriorto informing senior management?
A payroll manager discovers that fields in certain payroll reports have been modified without authorization. Which of the following control weaknesses could have contributed MOST to this problem?
Which of the following BEST enables risk mitigation associated with software licensing noncompliance?
When of the following 15 MOST important when developing a business case for a proposed security investment?
Which of the following BEST enables the risk profile to serve as an effective resource to support business objectives?
Which risk response strategy could management apply to both positive and negative risk that has been identified?
Which of the following is a PRIMARY benefit to an organization that is using threat intelligence?
Which of the following is the BEST way to determine the ongoing efficiency of control processes?
An organization is concerned that a change in its market situation may impact the current level of acceptable risk for senior management. As a result, which of the following is MOST important to reevaluate?
A risk practitioner is involved in a comprehensive overhaul of the organizational risk management program. Which of the following should be reviewed FIRST to help identify relevant IT risk scenarios?
Which of the following is the PRIMARY reason for a risk practitioner to examine a post-implementation review report for a control automation tool?
Several vulnerabilities have been identified in an organization’s core financial systems. Which of the following would be the risk practitioner’s BEST course of action?
A risk practitioner learns that the organization s industry is experiencing a trend of rising security incidents. Which of the following is the BEST course of action?
Which of the following is the BEST way to determine the potential organizational impact of emerging privacy regulations?
Which of the following BEST facilitates the process of documenting risk tolerance?
Which of the following should be given the HIGHEST priority when developing a response plan for risk assessment results?
An IT risk practitioner has determined that mitigation activities differ from an approved risk action plan. Which of the following is the risk practitioner ' s BEST course of action?
Which of the following is MOST important when conducting a post-implementation review as part of the system development life cycle (SDLC)?
Of the following, who is responsible for approval when a change in an application system is ready for release to production?
A risk action plan has been changed during the risk mitigation effort. Which of the following is MOST important for the risk practitioner to verify?
Which of the following would cause the GREATEST concern for a risk practitioner reviewing the IT risk scenarios recorded in an organization’s IT risk register?
Which of the following is MOST important to review when determining whether a potential IT service provider’s control environment is effective?
During a post-implementation review for a new system, users voiced concerns about missing functionality. Which of the following is the BEST way for the organization to avoid this situation in the future?
Which of the following occurs during the implementation phase of the system development life cycle (SDLC)?
Which of the following will be MOST effective in helping to ensure control failures are appropriately managed?
An organization has implemented a preventive control to lock user accounts after three unsuccessful login attempts. This practice has been proven to be unproductive, and a change in the control threshold value has been recommended. Who should authorize changing this threshold?
To reduce the risk introduced when conducting penetration tests, the BEST mitigating control would be to:
Which of the following should be initiated when a high number of noncompliant conditions are observed during review of a control procedure?
Which of the following is the PRIMARY reason to adopt key control indicators (KCIs) in the risk monitoring and reporting process?
After the implementation of a remediation plan, an assessment of associated control design and operating effectiveness can determine the level of:
Which of the following is the PRIMARY objective of aggregating the impact of IT risk scenarios and reflecting the results in the enterprise risk register?
A systems interruption has been traced to a personal USB device plugged into the corporate network by an IT employee who bypassed internal control procedures. Of the following, who should be accountable?
An organization has been notified that a disgruntled, terminated IT administrator has tried to break into the corporate network. Which of the following discoveries should be of GREATEST concern to the organization?
Which of the following is MOST important to include when reporting the effectiveness of risk management to senior management?
A risk practitioner has received an updated enterprise risk management (ERM) report showing that residual risk is now within the organization ' s defined appetite and tolerance levels. Which of the following is the risk practitioner ' s BEST course of action?
Which of the following attributes of a key risk indicator (KRI) is MOST important?
After the implementation of internal of Things (IoT) devices, new risk scenarios were identified. What is the PRIMARY reason to report this information to risk owners?
Which of the following is the BEST metric to demonstrate the effectiveness of an organization’s software testing program?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a disaster recovery test of critical business processes?
An organization has decided to commit to a business activity with the knowledge that the risk exposure is higher than the risk appetite. Which of the following is the risk practitioner ' s MOST important action related to this decision?
Whether the results of risk analyses should be presented in quantitative or qualitative terms should be based PRIMARILY on the:
When formulating a social media policy lo address information leakage, which of the following is the MOST important concern to address?
When determining the accuracy of a key risk indicator (KRI), it is MOST important that the indicator:
Which of the following would be the BEST justification to invest in the development of a governance, risk, and compliance (GRC) solution?
Which of the following is the BEST way to quantify the likelihood of risk materialization?
Which of the following is a risk practitioner ' s BEST recommendation upon learning that an employee inadvertently disclosed sensitive data to a vendor?
While reviewing an organization ' s monthly change management metrics, a risk practitioner notes that the number of emergency changes has increased substantially Which of the following would be the BEST approach for the risk practitioner to take?
Which of the following should be the PRIMARY focus of an IT risk awareness program?
An organization ' s risk tolerance should be defined and approved by which of the following?
Which of the following would be a risk practitioner ' s BEST course of action when a project team has accepted a risk outside the established risk appetite?
A risk practitioner is conducting a risk assessment after discovering the use of unauthorized cloud software on personal devices to accomplish work-related tasks. Which of the following is the risk practitioner ' s BEST course of action?
An online payment processor would be severely impacted if the fraud detection system has an outage. Which of the following is the BEST way to address this risk?
Which of the following is MOST important information to review when developing plans for using emerging technologies?
An organizations chief technology officer (CTO) has decided to accept the risk associated with the potential loss from a denial-of-service (DoS) attack. In this situation, the risk practitioner ' s BEST course of action is to:
Which of the following BEST indicates that an organization has implemented IT performance requirements?
When performing a risk assessment of a new service to support a ewe Business process. which of the following should be done FRST10 ensure continuity of operations?
After undertaking a risk assessment of a production system, the MOST appropriate action is for the risk manager to:
An organization operates in a jurisdiction where heavy fines are imposed for leakage of customer data. Which of the following provides the BEST input to assess the inherent risk impact?
A large organization needs to report risk at all levels for a new centralized visualization project to reduce cost and improve performance. Which of the following would MOST effectively represent the overall risk of the project to senior management?
Days before the realization of an acquisition, a data breach is discovered at the company to be acquired. For the accruing organization, this situation represents which of the following?
A service organization is preparing to adopt an IT control framework to comply with the contractual requirements of a new client. Which of the following would be MOST helpful to the risk practitioner?
Which of the following should be the MAIN consideration when validating an organization ' s risk appetite?
When developing a new risk register, a risk practitioner should focus on which of the following risk management activities?
Which of the following is MOST important to sustainable development of secure IT services?
Which of the following is the FIRST step when conducting a business impact analysis (BIA)?
An organization recently invested in an identity and access management (IAM) solution to manage user activities across corporate mobile devices. Which of the following is MOST important to update in the risk register?
Which of the following is MOST important for a risk practitioner to understand about an organization in order to create an effective risk
awareness program?
Which of the following is MOST important for a risk practitioner to consider when determining the control requirements for data privacy arising from emerging technologies?
The PRIMARY reason for communicating risk assessment results to data owners is to enable the:
The implementation of a risk treatment plan will exceed the resources originally allocated for the risk response. Which of the following should be the risk owner ' s NEXT action?
Following a significant change to a business process, a risk practitioner believes the associated risk has been reduced. The risk practitioner should advise the risk owner to FIRST
An organization uses a biometric access control system for authentication and access to its server room. Which control type has been implemented?
As part of an overall IT risk management plan, an IT risk register BEST helps management:
Which of the following scenarios presents the GREATEST risk of noncompliance with data privacy best practices?
Which of the following is MOST important for an organization to have in place when developing a risk management framework?
Which of the following is the MOST effective way to reduce potential losses due to ongoing expense fraud?
An organization is considering modifying its system to enable acceptance of credit card payments. To reduce the risk of data exposure, which of the following should the organization do FIRST?
Which of the following BEST enables the development of a successful IT strategy focused on business risk mitigation?
A risk register BEST facilitates which of the following risk management functions?
A recent risk workshop has identified risk owners and responses for newly identified risk scenarios. Which of the following should be the risk practitioner s NEXT step? r
Which organization is implementing a project to automate the purchasing process, including the modification of approval controls. Which of the following tasks is lie responsibility of the risk practitioner*?
Which of the following is the MOST efficient method for monitoring control effectiveness?
Which of the following BEST enables an organization to address new risk associated with an Internet of Things (IoT) solution?
The risk associated with an asset before controls are applied can be expressed as:
A newly hired risk practitioner finds that the risk register has not been updated in the past year. What is the risk practitioner ' s BEST course of action?
After mapping generic risk scenarios to organizational security policies, the NEXT course of action should be to:
An organization learns of a new ransomware attack affecting organizations worldwide. Which of the following should be done FIRST to reduce the likelihood of infection from the attack?
Which of the following should be the FIRST consideration when a business unit wants to use personal information for a purpose other than for which it was originally collected?
Which of the following is the PRIMARY reason for a risk practitioner to report changes and trends in the IT risk profile to senior management?
Which of the following is the PRIMARY reason to use key control indicators (KCIs) to evaluate control operating effectiveness?
Which of the following roles is BEST suited to help a risk practitioner understand the impact of IT-related events on business objectives?
As pan of business continuity planning, which of the following is MOST important to include m a business impact analysis (BlA)?
An organization is revising its IT security policy. Which of the following should be done FIRST to help ensure the policy is followed?
Which of the following management actions will MOST likely change the likelihood rating of a risk scenario related to remote network access?
Which of the following BEST indicates the risk appetite and tolerance level (or the risk associated with business interruption caused by IT system failures?
Which of the following changes would be reflected in an organization ' s risk profile after the failure of a critical patch implementation?
Which of the following is the GREATEST benefit to an organization when updates to the risk register are made promptly after the completion of a risk assessment?
Which of the following is the BEST approach for an organization in a heavily regulated industry to comprehensively test application functionality?
Which of the following helps ensure compliance with a nonrepudiation policy requirement for electronic transactions?
Which of the following is the BEST method to identify weaknesses in an organization ' s technical environment that could be leveraged by an attacker to gain access?
An organization ' s capability to implement a risk management framework is PRIMARILY influenced by the:
An organization has used generic risk scenarios to populate its risk register. Which of the following presents the GREATEST challenge to assigning of the associated risk entries?
A global organization is planning to collect customer behavior data through social media advertising. Which of the following is the MOST important business risk to be considered?
Which of the following scenarios is MOST important to communicate to senior management?
Which of the following BEST represents a critical threshold value for a key control indicator (KCI)?
Which of the following BEST reduces the likelihood of fraudulent activity that occurs through use of a digital wallet?
Which of me following is MOST helpful to mitigate the risk associated with an application under development not meeting business objectives?
Which of the following is the MOST effective way lo ensure professional ethics are maintained as a core organizational value and adhered to by employees?
A root because analysis indicates a major service disruption due to a lack of competency of newly hired IT system administrators Who should be accountable for resolving the situation?
A company has located its computer center on a moderate earthquake fault. Which of the following is the MOST important consideration when establishing a contingency plan and an alternate processing site?
Which of the following is the MOST useful information for prioritizing risk mitigation?
Which of the following is MOST important for a risk practitioner to consider when analyzing the risk associated with migrating to a new cloud service provider?
Reviewing which of the following would provide the MOST useful information when preparing to evaluate the effectiveness of existing controls?
A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?
Before selecting a final risk response option for a given risk scenario, management should FIRST:
Which of the following is MOST important to the effective monitoring of key risk indicators (KRIS)?
An organization is considering outsourcing user administration controls tor a critical system. The potential vendor has offered to perform quarterly sett-audits of its controls instead of having annual independent audits. Which of the following should be of GREATEST concern to me risk practitioner?
A software developer has administrative access to a production application. Which of the following should be of GREATEST concern to a risk practitioner?
A PRIMARY function of the risk register is to provide supporting information for the development of an organization ' s risk:
An IT organization is replacing the customer relationship management (CRM) system. Who should own the risk associated with customer data leakage caused by insufficient IT security controls for the new system?
A new software package that could help mitigate risk in an organization has become available. Which of the following is the risk practitioner ' s BEST course of action?
An organization automatically approves exceptions to security policies on a recurring basis. This practice is MOST likely the result of:
Which of the following provides the MOST mitigation value for an organization implementing new Internet of Things (loT) devices?
An organization maintains independent departmental risk registers that are not automatically aggregated. Which of the following is the GREATEST concern?
Which of the following is MOST important to have in place to ensure the effectiveness of risk and security metrics reporting?
A failed IT system upgrade project has resulted in the corruption of an organization ' s asset inventory database. Which of the following controls BEST mitigates the impact of this incident?
Which of the following BEST indicates that a control has been implemented successfully?
Which of the following is MOST important to the effectiveness of key performance indicators (KPIs)?
A risk practitioner is defining metrics for security threats that were not identified by antivirus software. Which type of metric is being developed?
Which of the following is a risk practitioner ' s BEST course of action upon learning that regulatory authorities have concerns with an emerging technology the organization is considering?
Which of the following BEST prevents unauthorized access to customer personal data transmitted to third-party service providers?
Which of the following is the BEST source for identifying key control indicators (KCIs)?
When establishing an enterprise IT risk management program, it is MOST important to:
Which of the following BEST enables senior management lo compare the ratings of risk scenarios?
During a risk assessment of a financial institution, a risk practitioner discovers that tellers can initiate and approve transactions of significant value. This team is also responsible for ensuring transactions are recorded and balances are reconciled by the end of the day. Which of the following is the risk practitioner ' s BEST recommendation to mitigate the associated risk?
Which of the following is the BEST indicator of the effectiveness of a control?
Which of the following should be done FIRST when information is no longer required to support business objectives?
A newly enacted information privacy law significantly increases financial penalties for breaches of personally identifiable information (Pll). Which of the following will MOST likely outcome for an organization affected by the new law?
Which of the following BEST indicates the condition of a risk management program?
Following a review of a third-party vendor, it is MOST important for an organization to ensure:
Which of the following BEST helps to identify significant events that could impact an organization?
Vulnerability analysis
What should a risk practitioner do FIRST when vulnerability assessment results identify a weakness in an application?
An organization has established a policy prohibiting ransom payments if subjected to a ransomware attack. Which of the following is the MOST effective control to support this policy?
Which of the following is MOST important to consider when determining a recovery time objective (RTO)?
Which of the following should be the GREATEST concern for an organization that uses open source software applications?
Which of the following is the BEST way to determine whether new controls mitigate security gaps in a business system?
Which of the following would MOST likely result in agreement on accountability for risk scenarios?
Which of the following introduces the GREATEST amount of risk during the software development life cycle (SDLC)?
Which of the following is the PRIMARY reason for an organization to include an acceptable use banner when users log in?
Which of the following is the PRIMARY risk management responsibility of the second line of defense?
Which of the following BEST indicates that an organization ' s risk management processes are mature?
Which of the following is the MOST important consideration when establishing a recovery point objective (RPO)?
Which of the following resources is MOST helpful to a risk practitioner when updating the likelihood rating in the risk register?
Which of the following is the PRIMARY concern for a risk practitioner regarding an organization ' s adoption of innovative big data analytics capabilities?
To help ensure all applicable risk scenarios are incorporated into the risk register, it is MOST important to review the:
When developing risk treatment alternatives for a Business case, it is MOST helpful to show risk reduction based on:
An organization has outsourced its backup and recovery procedures to a third-party cloud provider. Which of the following should be the risk practitioner ' s NEXT course of action?
Which of the following presents the GREATEST challenge to managing an organization ' s end-user devices?
The BEST key performance indicator (KPI) to measure the effectiveness of a backup process would be the number of:
Which of the following would be the BEST key performance indicator (KPI) for monitoring the effectiveness of the IT asset management process?
Which of the following issues found during the review of a newly created disaster recovery plan (DRP) should be of MOST concern?
An IT license audit has revealed that there are several unlicensed copies of co be to:
Which of the following is the MOST significant risk related to an organization ' s use of AI technology?
Senior management has asked the risk practitioner for the overall residual risk level for a process that contains numerous risk scenarios. Which of the following should be provided?
Which of the following is the MOST important reason for a risk practitioner to identify stakeholders for each IT risk scenario?
Which of the following approaches to bring your own device (BYOD) service delivery provides the BEST protection from data loss?
Which of the following is the MOST effective way to identify changes in the performance of the control environment?
Which of the following would MOST likely cause a risk practitioner to change the likelihood rating in the risk register?
Which of the following is the PRIMARY reason for logging in a production database environment?
A risk practitioner is MOST likely to use a SWOT analysis to assist with which risk process?
Which of the following is the PRIMARY reason to engage business unit managers in risk management processes ' ?
An organization wants to transfer risk by purchasing cyber insurance. Which of the following would be MOST important for the risk practitioner to communicate to senior management for contract negotiation purposes?
Which of the following approaches BEST identifies information systems control deficiencies?
Key risk indicators (KRIs) are MOST useful during which of the following risk management phases?
Which of the following is the MOST important factor when deciding on a control to mitigate risk exposure?
A risk practitioner has discovered a deficiency in a critical system that cannot be patched. Which of the following should be the risk practitioner ' s FIRST course of action?
Which of the following is the MOST essential characteristic of a good IT risk scenario?
Which of the following is MOST helpful in identifying loss magnitude during risk analysis of a new system?
Which of the following BEST facilitates the development of relevant risk scenarios?
Which of the following provides the MOST useful information when measuring the progress of risk response action plans?
Implementing which of the following will BEST help ensure that systems comply with an established baseline before deployment?
An organization ' s stakeholders are unable to agree on appropriate risk responses. Which of the following would be the BEST course of action?
Which of the following is the GREATEST concern when establishing key risk indicators (KRIs)?
An audit reveals that there are changes in the environment that are not reflected in the risk profile. Which of the following is the BEST course of action?
When evaluating a number of potential controls for treating risk, it is MOST important to consider:
Which of the following is the MOST important enabler of effective risk management?
Who should be responsible for determining which stakeholders need to be involved in the development of a risk scenario?
Which of the following BEST indicates that an organizations risk management program is effective?
Which of the following techniques is MOST helpful when quantifying the potential loss impact of cyber risk?
Which of the following is the MOST important element of a successful risk awareness training program?
The PRIMARY benefit of selecting an appropriate set of key risk indicators (KRIs) is that they:
Which of the following is the MOST important data attribute of key risk indicators (KRIs)?
Which of the following would be MOST helpful to an information security management team when allocating resources to mitigate exposures?
Which of the following presents the GREATEST concern associated with the
use of artificial intelligence (Al) systems?
Which of the following is the BEST way to confirm whether appropriate automated controls are in place within a recently implemented system?
A risk practitioner has observed that risk owners have approved a high number of exceptions to the information security policy. Which of the following should be the risk practitioner ' s GREATEST concern?