Key risk indicators (KRIs) are MOST useful during which of the following risk management phases?
Which of the following would be MOST helpful to an information security management team when allocating resources to mitigate exposures?
An organization has been notified that a disgruntled, terminated IT administrator has tried to break into the corporate network. Which of the following discoveries should be of GREATEST concern to the organization?
Which of the following provides the MOST useful information when determining if a specific control should be implemented?
Senior management has asked a risk practitioner to develop technical risk scenarios related to a recently developed enterprise resource planning (ERP) system. These scenarios will be owned by the system manager. Which of the following would be the BEST method to use when developing the scenarios?
Which of me following is MOST helpful to mitigate the risk associated with an application under development not meeting business objectives?
When reviewing a report on the performance of control processes, it is MOST important to verify whether the:
Which of the following is the BEST key control indicator (KCI) for a vulnerability management program?
Which of the following provides the MOST useful information when developing a risk profile for management approval?
Which of the following is the GREATEST risk associated with the misclassification of data?
Management has required information security awareness training to reduce the risk associated with credential compromise. What is the BEST way to assess the effectiveness of the training?
Which of the following is the BEST way for an organization to enable risk treatment decisions?
Which of the following is the MOST important consideration when implementing ethical remote work monitoring?
Which of the following would require updates to an organization's IT risk register?
An IT risk practitioner has determined that mitigation activities differ from an approved risk action plan. Which of the following is the risk practitioner's BEST course of action?
Which of the following should be management's PRIMARY focus when key risk indicators (KRIs) begin to rapidly approach defined thresholds?
Which of the following should be included in a risk scenario to be used for risk analysis?
An organization practices the principle of least privilege. To ensure access remains appropriate, application owners should be required to review user access rights on a regular basis by obtaining:
A vulnerability assessment of a vendor-supplied solution has revealed that the software is susceptible to cross-site scripting and SQL injection attacks. Which of the following will BEST mitigate this issue?
Which of the following is MOST helpful in aligning IT risk with business objectives?
In an organization where each division manages risk independently, which of the following would BEST enable management of risk at the enterprise level?
The PRIMARY benefit of conducting continuous monitoring of access controls is the ability to identify:
Which of the following is the PRIMARY role of a data custodian in the risk management process?
An organization's IT infrastructure is running end-of-life software that is not allowed without exception approval. Which of the following would provide the MOST helpful information to justify investing in updated software?
A newly hired risk practitioner finds that the risk register has not been updated in the past year. What is the risk practitioner's BEST course of action?
Which of the following BEST indicates whether security awareness training is effective?
Which of the following is the BEST method for assessing control effectiveness against technical vulnerabilities that could be exploited to compromise an information system?
A risk practitioner identifies a database application that has been developed and implemented by the business independently of IT. Which of the following is the BEST course of action?
Which of We following is the MOST effective control to address the risk associated with compromising data privacy within the cloud?
A deficient control has been identified which could result in great harm to an organization should a low frequency threat event occur. When communicating the associated risk to senior management the risk practitioner should explain:
An IT risk practitioner has been asked to regularly report on the overall status and effectiveness of the IT risk management program. Which of the following is MOST useful for this purpose?
The BEST indication that risk management is effective is when risk has been reduced to meet:
Which of the following would be the BEST key performance indicator (KPI) for monitoring the effectiveness of the IT asset management process?
Which of the following describes the relationship between Key risk indicators (KRIs) and key control indicators (KCIS)?
Which of the following criteria associated with key risk indicators (KRIs) BEST enables effective risk monitoring?
Which of the following is MOST important to communicate to senior management during the initial implementation of a risk management program?
Which of the following is MOST important to compare against the corporate risk profile?
Which of The following is the MOST comprehensive input to the risk assessment process specific to the effects of system downtime?
What should be the PRIMARY driver for periodically reviewing and adjusting key risk indicators (KRIs)?
Which of the following provides the MOST up-to-date information about the effectiveness of an organization's overall IT control environment?
Which of the following is a risk practitioner's BEST recommendation to address an organization's need to secure multiple systems with limited IT resources?
Winch of the following key control indicators (KCIs) BEST indicates whether security requirements are identified and managed throughout a project He cycle?
Which of the following would be MOST helpful to a risk practitioner when ensuring that mitigated risk remains within acceptable limits?
Which of the following is the BEST course of action to help reduce the probability of an incident recurring?
Which of the following BEST mitigates the risk of sensitive personal data leakage from a software development environment?
A risk practitioner has just learned about new malware that has severely impacted industry peers worldwide data loss?
Which of the following practices MOST effectively safeguards the processing of personal data?
Which of the following will be the GREATEST concern when assessing the risk profile of an organization?
Which of the following roles is BEST suited to help a risk practitioner understand the impact of IT-related events on business objectives?
Which of the following BEST indicates the risk appetite and tolerance level (or the risk associated with business interruption caused by IT system failures?
Which of the following is the PRIMARY reason to use key control indicators (KCIs) to evaluate control operating effectiveness?
Which of the following should be of GREATEST concern lo a risk practitioner reviewing the implementation of an emerging technology?
Who should be PRIMARILY responsible for establishing an organization's IT risk culture?
When of the following 15 MOST important when developing a business case for a proposed security investment?
Which of the following BEST assists in justifying an investment in automated controls?
After the review of a risk record, internal audit questioned why the risk was lowered from medium to low. Which of the following is the BEST course of action in responding to this inquiry?
Which of the following is the GREATEST benefit to an organization when updates to the risk register are made promptly after the completion of a risk assessment?
Which of the following presents the GREATEST privacy risk related to personal data processing for a global organization?
Which of the following is MOST important information to review when developing plans for using emerging technologies?
Which of the following would be a risk practitioner'$ BEST recommendation to help ensure cyber risk is assessed and reflected in the enterprise-level risk profile?
Which of the following BEST informs decision-makers about the value of a notice and consent control for the collection of personal information?
Which of the following would BEST assist in reconstructing the sequence of events following a security incident across multiple IT systems in the organization's network?
Which of the following presents the GREATEST risk to change control in business application development over the complete life cycle?
An organization has recently been experiencing frequent data corruption incidents. Implementing a file corruption detection tool as a risk response strategy will help to:
To reduce costs, an organization is combining the second and third tines of defense in a new department that reports to a recently appointed C-level executive. Which of the following is the GREATEST concern with this situation?
What information is MOST helpful to asset owners when classifying organizational assets for risk assessment?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
Which of the following data would be used when performing a business impact analysis (BIA)?
While conducting an organization-wide risk assessment, it is noted that many of the information security policies have not changed in the past three years. The BEST course of action is to:
Employees are repeatedly seen holding the door open for others, so that trailing employees do not have to stop and swipe their own ID badges. This behavior BEST represents:
Which of the following is MOST important for a risk practitioner to verify when evaluating the effectiveness of an organization's existing controls?
A risk practitioner has become aware of production data being used in a test environment. Which of the following should be the practitioner's PRIMARY concern?
When is the BEST to identify risk associated with major project to determine a mitigation plan?
A risk practitioner has received an updated enterprise risk management (ERM) report showing that residual risk is now within the organization's defined appetite and tolerance levels. Which of the following is the risk practitioner's BEST course of action?
The risk associated with an asset after controls are applied can be expressed as:
Which of the following is the BEST approach when a risk practitioner has been asked by a business unit manager for special consideration during a risk assessment of a system?
Which of the following is MOST important for a risk practitioner to consider when determining the control requirements for data privacy arising from emerging technologies?
Which of the following is the MOST effective way to integrate risk and compliance management?
Which of the following is MOST important to the successful development of IT risk scenarios?
Which of the following would present the MOST significant risk to an organization when updating the incident response plan?
An organization is adopting block chain for a new financial system. Which of the following should be the GREATEST concern for a risk practitioner evaluating the system's production readiness?
In an organization dependent on data analytics to drive decision-making, which of the following would BEST help to minimize the risk associated with inaccurate data?
Which of the following is MOST important for senior management to review during an acquisition?
The BEST key performance indicator (KPI) to measure the effectiveness of a backup process would be the number of:
Which of the following is the MOST important topic to cover in a risk awareness training program for all staff?
Which of the following should be the FIRST consideration when establishing a new risk governance program?
A root because analysis indicates a major service disruption due to a lack of competency of newly hired IT system administrators Who should be accountable for resolving the situation?
An organization is participating in an industry benchmarking study that involves providing customer transaction records for analysis Which of the following is the MOST important control to ensure the privacy of customer information?
The BEST way to mitigate the high cost of retrieving electronic evidence associated with potential litigation is to implement policies and procedures for.
Which of the following would MOST effectively reduce risk associated with an increase of online transactions on a retailer website?
Which of the following is the MOST critical factor to consider when determining an organization's risk appetite?
An organization has established a policy prohibiting ransom payments if subjected to a ransomware attack. Which of the following is the MOST effective control to support this policy?
Which of the following is the BEST approach to mitigate the risk associated with a control deficiency?
Which of the following is the BEST way to assess the effectiveness of an access management process?
An organization has experienced several incidents of extended network outages that have exceeded tolerance. Which of the following should be the risk practitioner's FIRST step to address this situation?
The following is the snapshot of a recently approved IT risk register maintained by an organization's information security department.
After implementing countermeasures listed in ‘’Risk Response Descriptions’’ for each of the Risk IDs, which of the following component of the register MUST change?
Which of the following resources is MOST helpful to a risk practitioner when updating the likelihood rating in the risk register?
Which of the following is the PRIMARY objective of maintaining an information asset inventory?
Which of the following will BEST help to ensure the continued effectiveness of the IT risk management function within an organization experiencing high employee turnover?
Which of the following is the MOST important reason to validate that risk responses have been executed as outlined in the risk response plan''
A segregation of duties control was found to be ineffective because it did not account for all applicable functions when evaluating access. Who is responsible for ensuring the control is designed to effectively address risk?
Which of the following will BEST help to ensure implementation of corrective action plans?
Which of the following is the BEST approach for an organization in a heavily regulated industry to comprehensively test application functionality?
Which of the following is a risk practitioner's MOST important responsibility in managing risk acceptance that exceeds risk tolerance?
An organization has operations in a location that regularly experiences severe weather events. Which of the following would BEST help to mitigate the risk to operations?
Which of the following is the PRIMARY objective of establishing an organization's risk tolerance and appetite?
After entering a large number of low-risk scenarios into the risk register, it is MOST important for the risk practitioner to:
Which of the following should be of MOST concern to a risk practitioner reviewing an organization risk register after the completion of a series of risk assessments?
Which of the following would provide the MOST reliable evidence of the effectiveness of security controls implemented for a web application?
Which of the following BEST facilitates the identification of appropriate key performance indicators (KPIs) for a risk management program?
Which of the following has the GREATEST influence on an organization's risk appetite?
Which of the following would be of GREATEST concern regarding an organization's asset management?
An organization has decided to commit to a business activity with the knowledge that the risk exposure is higher than the risk appetite. Which of the following is the risk practitioner's MOST important action related to this decision?
Which of the following should be the GREATEST concern to a risk practitioner when process documentation is incomplete?
Which of The following BEST represents the desired risk posture for an organization?
Who should be responsible (of evaluating the residual risk after a compensating control has been
Which of the following should be of GREATEST concern when reviewing the results of an independent control assessment to determine the effectiveness of a vendor's control environment?
Which of the following, who should be PRIMARILY responsible for performing user entitlement reviews?
Which of the following management action will MOST likely change the likelihood rating of a risk scenario related to remote network access?
An organization is planning to move its application infrastructure from on-premises to the cloud. Which of the following is the BEST course of the actin to address the risk associated with data transfer if the relationship is terminated with the vendor?
A company has recently acquired a customer relationship management (CRM) application from a certified software vendor. Which of the following will BE ST help lo prevent technical vulnerabilities from being exploded?
When a risk practitioner is determining a system's criticality. it is MOST helpful to review the associated:
Which of the following will BEST help to ensure key risk indicators (KRIs) provide value to risk owners?
Which of the following is the BEST course of action when an organization wants to reduce likelihood in order to reduce a risk level?
Which of the following is the MAIN benefit to an organization using key risk indicators (KRIs)?
An organization has decided to implement a new Internet of Things (loT) solution. Which of the following should be done FIRST when addressing security concerns associated with this new technology?
Which of the following is MOST important to consider before determining a response to a vulnerability?
The MAIN reason for prioritizing IT risk responses is to enable an organization to:
An incentive program is MOST likely implemented to manage the risk associated with loss of which organizational asset?
The BEST metric to demonstrate that servers are configured securely is the total number of servers:
A risk practitioner has identified that the agreed recovery time objective (RTO) with a Software as a Service (SaaS) provider is longer than the business expectation. Which of the following is the risk practitioner's BEST course of action?
Which of the following s MOST likely to deter an employee from engaging in inappropriate use of company owned IT systems?
Which of the following is the BEST way to determine whether system settings are in alignment with control baselines?
Which of the following is the MOST important consideration for effectively maintaining a risk register?
Which of the following is the BEST method to maintain a common view of IT risk within an organization?
Which of the following is the MOST important step to ensure regulatory requirements are adequately addressed within an organization?
Which of the following is the MOST effective way to reduce potential losses due to ongoing expense fraud?
Which of the following is the MOST important benefit of reporting risk assessment results to senior management?
An organization's chief information officer (CIO) has proposed investing in a new. untested technology to take advantage of being first to market Senior management has concerns about the success of the project and has set a limit for expenditures before final approval. This conditional approval indicates the organization's risk:
Which of the following provides the MOST useful information to assess the magnitude of identified deficiencies in the IT control environment?
Which of the following activities BEST facilitates effective risk management throughout the organization?
Which of the following would be the BEST way for a risk practitioner to validate the effectiveness of a patching program?
Who is BEST suited to provide objective input when updating residual risk to reflect the results of control effectiveness?
It is MOST important that security controls for a new system be documented in:
A control process has been implemented in response to a new regulatory requirement, but has significantly reduced productivity. Which of the following is the BEST way to resolve this concern?
Which of the following would be the GREATEST concern for an IT risk practitioner when an employees.....
Which of the following is MOST important when conducting a post-implementation review as part of the system development life cycle (SDLC)?
An organization has completed a risk assessment of one of its service providers. Who should be accountable for ensuring that risk responses are implemented?
Senior management wants to increase investment in the organization's cybersecurity program in response to changes in the external threat landscape. Which of the following would BEST help to prioritize investment efforts?
When performing a risk assessment of a new service to support a core business process, which of the following should be done FIRST to ensure continuity of operations?
When of the following standard operating procedure (SOP) statements BEST illustrates appropriate risk register maintenance?
An organization's recovery team is attempting to recover critical data backups following a major flood in its data center. However, key team members do not know exactly what steps should be taken to address this crisis. Which of the following is the MOST likely cause of this situation?
A company has located its computer center on a moderate earthquake fault. Which of the following is the MOST important consideration when establishing a contingency plan and an alternate processing site?
Which of the following is the MOST important consideration when communicating the risk associated with technology end-of-life to business owners?
Which of the following is the PRIMARY reason for a risk practitioner to review an organization's IT asset inventory?
Which of the following BEST enables a risk practitioner to identify the consequences of losing critical resources due to a disaster?
Which of the following is the MOST effective way for a large and diversified organization to minimize risk associated with unauthorized software on company devices?
Which of the following is MOST helpful in providing a high-level overview of current IT risk severity*?
A newly incorporated enterprise needs to secure its information assets From a governance perspective which of the following should be done FIRST?
Which of the following is the MOST useful information for a risk practitioner when planning response activities after risk identification?
Which of the following is the MOST effective way 10 identify an application backdoor prior to implementation'?
As pan of business continuity planning, which of the following is MOST important to include m a business impact analysis (BlA)?
Which of the following BEST helps to identify significant events that could impact an organization?
Which of the following provides the MOST reliable evidence of a control's effectiveness?
An organization is considering outsourcing user administration controls tor a critical system. The potential vendor has offered to perform quarterly sett-audits of its controls instead of having annual independent audits. Which of the following should be of GREATEST concern to me risk practitioner?
When establishing an enterprise IT risk management program, it is MOST important to:
Which of the following is the MOST effective way to help ensure accountability for managing risk?
Which of the following has the GREATEST positive impact on ethical compliance within the risk management process?
An organization recently configured a new business division Which of the following is MOST likely to be affected?
Which of the following findings of a security awareness program assessment would cause the GREATEST concern to a risk practitioner?
Which of the following analyses is MOST useful for prioritizing risk scenarios associated with loss of IT assets?
An organization has decided to use an external auditor to review the control environment of an outsourced service provider. The BEST control criteria to evaluate the provider would be based on:
When developing risk scenario using a list of generic scenarios based on industry best practices, it is MOST imported to:
What is the MAIN benefit of using a top-down approach to develop risk scenarios?
During an acquisition, which of the following would provide the MOST useful input to the parent company's risk practitioner when developing risk scenarios for the post-acquisition phase?
Which of the following is the MOST important course of action to foster an ethical, risk-aware culture?
Zero Trust architecture is designed and deployed with adherence to which of the following basic tenets?
Which of the following should be done FIRST when developing an initial set of risk scenarios for an organization?
Which of the following is the ULTIMATE objective of utilizing key control indicators (KCIs) in the risk management process?
The operational risk associated with attacks on a web application should be owned by the individual in charge of:
Which of the following would be MOST helpful in assessing the risk associated with data loss due to human vulnerabilities?
An organization is implementing Zero Trust architecture to improve its security posture. Which of the following is the MOST important input to develop the architecture?
Which of the following is MOST important for management to consider when deciding whether to invest in an IT initiative that exceeds management's risk appetite?
Which of the following is the PRIMARY benefit of integrating risk and security requirements in an organization's enterprise architecture (EA)?
Upon learning that the number of failed backup attempts continually exceeds
the current risk threshold, the risk practitioner should:
A risk practitioner has been asked to assess the risk associated with a new critical application used by a financial process team that the risk practitioner was a member of two years ago. Which of the following is the GREATEST concern with this request?
Which of the following is the PRIMARY advantage of having a single integrated business continuity plan (BCP) rather than each business unit developing its own BCP?
Which of the following BEST reduces the likelihood of fraudulent activity that occurs through use of a digital wallet?
Which of the following risk activities is BEST facilitated by enterprise architecture (EA)?
Which of the following is the BEST response when a potential IT control deficiency has been identified?
Which of the following should a risk practitioner review FIRST when evaluating risk events associated with the organization's data flow model?
Which of the following will BEST help to improve an organization's risk culture?
An organizational policy requires critical security patches to be deployed in production within three weeks of patch availability. Which of the following is the BEST metric to verify adherence to the policy?
Which of the following BEST indicates the effective implementation of a risk treatment plan?
Which of the following is MOST important to ensure risk management practices are effective at all levels within the organization?
Which of the following is the MOST important reason to communicate control effectiveness to senior management?
Which of the following process controls BEST mitigates the risk of an employee issuing fraudulent payments to a vendor?
Which of the following is the GREATEST concern if user acceptance testing (UAT) is not conducted when implementing a new application?
A risk practitioner notes control design changes when comparing risk response to a previously approved action plan. Which of the following is MOST important for the practitioner to confirm?
The PRIMARY benefit of maintaining an up-to-date risk register is that it helps to:
If preventive controls cannot be Implemented due to technology limitations, which of the following should be done FIRST to reduce risk7
An organization retains footage from its data center security camera for 30 days when the policy requires 90-day retention The business owner challenges whether the situation is worth remediating Which of the following is the risk manager s BEST response'
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of an antivirus program?
Which of the following is a risk practitioner's BEST recommendation to help reduce IT risk associated with scheduling overruns when starting a new application development project?
Which of the following provides the BEST evidence that risk responses are effective?
The BEST way to mitigate the high cost of retrieving electronic evidence associated with potential litigation is to implement policies and procedures for:
What is the MOST important consideration when selecting key performance indicators (KPIs) for control monitoring?
A risk practitioner's BEST guidance to help an organization develop relevant risk scenarios is to ensure the scenarios are:
Which of the following would present the GREATEST challenge for a risk practitioner during a merger of two organizations?
The risk to an organization's reputation due to a recent cybersecurity breach is PRIMARILY considered to be:
Which of the following is the MOST likely reason an organization would engage an independent reviewer to assess its IT risk management program?
Which of the following factors will have the GREATEST impact on the implementation of a risk mitigation strategy for an organization?
An organization has outsourced its customer management database to an external service provider. Of the following, who should be accountable for ensuring customer data privacy?
Which of the following is the PRIMARY reason to engage business unit managers in risk management processes'?
Which of the following is the MOST important key performance indicator (KPI) for monitoring the user access management process?
After undertaking a risk assessment of a production system, the MOST appropriate action is fcr the risk manager to
Which of the following is MOST important for the organization to consider before implementing a new in-house developed artificial intelligence (Al) solution?
Which of the following is a risk practitioner's BEST course of action upon learning that regulatory authorities have concerns with an emerging technology the organization is considering?
A risk assessment has revealed that the probability of a successful cybersecurity attack is increasing. The potential loss could exceed the organization's risk appetite. Which of the following ould be the MOST effective course of action?
Which of the following is the MOST important criteria for selecting key risk indicators (KRIs)?
An organization requires a third party for processing customer personal data. Which of the following is the BEST approach when sharing data over a public network?
A multinational company needs to implement a new centralized security system. The risk practitioner has identified a conflict between the organization's data-handling policy and local privacy regulations. Which of the following would be the BEST recommendation?
Which of the following would provide the MOST useful input when evaluating the appropriateness of risk responses?
An organization has established a contract with a vendor that includes penalties for loss of availability. Which risk treatment has been adopted by the organization?
Which of the following is the MOST important reason to restrict access to the risk register on a need-to-know basis?
Which of the following is the BEST way to reduce the likelihood of an individual performing a potentially harmful action as the result of unnecessary entitlement?
An organization is increasingly concerned about loss of sensitive data and asks the risk practitioner to assess the current risk level. Which of the following should the risk practitioner do FIRST?
Which of the following will BEST help to ensure implementation of corrective action plans?
Which of the following situations would BEST justify escalation to senior management?
A key risk indicator (KRI) that incorporates data from external open-source threat intelligence sources has shown changes in risk trend data. Which of the following is MOST important to update in the risk register?
A risk register BEST facilitates which of the following risk management functions?
Which of the following roles should be assigned accountability for monitoring risk levels?
Which of the following should be the MOST important consideration when determining controls necessary for a highly critical information system?
Which of the following is MOST helpful when prioritizing action plans for identified risk?
An organization plans to implement a new Software as a Service (SaaS) speech-to-text solution Which of the following is MOST important to mitigate risk associated with data privacy?
A bank recently incorporated blockchain technology with the potential to impact known risk within the organization. Which of the following is the risk practitioner's BEST course of action?
During a review of the asset life cycle process, a risk practitioner identified several unreturned and unencrypted laptops belonging to former employees. Which of the following is the GREATEST concern with this finding?
A new international data privacy regulation requires personal data to be
disposed after the specified retention period, which is different from the local
regulatory requirement. Which of the following is the risk practitioner's
BEST course of action?
Which of the following should a risk practitioner do FIRST to support the implementation of governance around organizational assets within an enterprise risk management (ERM) program?
Which of the following is the BEST indicator of the effectiveness of a control?
Within the risk management space, which of the following activities could be
delegated to a cloud service provider?
In a public company, which group is PRIMARILY accountable for ensuring sufficient attention and resources are applied to the risk management process?
Which of the following is the GREATEST risk of relying on artificial intelligence (Al) within heuristic security systems?
Who is MOST important lo include in the assessment of existing IT risk scenarios?
A technology company is developing a strategic artificial intelligence (Al)-driven application that has high potential business value. At what point should the enterprise risk profile be updated?
Which of the following would MOST likely cause management to unknowingly accept excessive risk?
Reviewing which of the following BEST helps an organization gain insight into its overall risk profile?
Which of the following is the BEST key performance indicator (KPI) to measure how effectively risk management practices are embedded in the project management office (PMO)?
Who should be responsible for approving the cost of controls to be implemented for mitigating risk?
Which process is MOST effective to determine relevance of threats for risk scenarios?
A poster has been displayed in a data center that reads. "Anyone caught taking photographs in the data center may be subject to disciplinary action." Which of the following control types has been implemented?
A risk practitioner's BEST guidance to help an organization develop relevant risk scenarios is to ensure the scenarios are:
A risk practitioner identifies an increasing trend of employees copying company information unrelated to their job functions to USB drives. Which of the following elements of the risk register should be updated to reflect this observation?
Which of the following is the MOST important consideration for the board and senior leadership
regarding the organization's approach to risk management for emerging technologies?
What is a risk practitioner's BEST approach to monitor and measure how quickly an exposure to a specific risk can affect the organization?
Which group has PRIMARY ownership of reputational risk stemming from unethical behavior within the organization?
Because of a potential data breach, an organization has decided to temporarily shut down its online sales order system until sufficient controls can be implemented. Which risk treatment has been selected?
During the control evaluation phase of a risk assessment, it is noted that multiple controls are ineffective. Which of the following should be the risk practitioner's FIRST course of action?
Which of the following scenarios is MOST likely to cause a risk practitioner to request a formal risk acceptance sign-off?
Which of the following is MOST helpful in developing key risk indicator (KRl) thresholds?
Which of the following is the MOST effective way to help ensure an organization's current risk scenarios are relevant?
An organization's risk practitioner learns a new third-party system on the corporate network has introduced vulnerabilities that could compromise corporate IT systems. What should the risk practitioner do
FIRST?
Which of the following is the BEST measure of the effectiveness of an employee deprovisioning process?
Which of the following provides the MOST helpful reference point when communicating the results of a risk assessment to stakeholders?
Which of the following is the BEST approach for performing a business impact analysis (BIA) of a supply-chain management application?
Which of the following would provide executive management with the BEST information to make risk decisions as a result of a risk assessment?
An organization's risk tolerance should be defined and approved by which of the following?
Which of the following is the PRIMARY benefit of identifying and communicating with stakeholders at the onset of an IT risk assessment?
Read" rights to application files in a controlled server environment should be approved by the:
When testing the security of an IT system, il is MOST important to ensure that;
The PRIMARY reason for periodically monitoring key risk indicators (KRIs) is to:
Which of the following statements in an organization's current risk profile report is cause for further action by senior management?
Which of the following is the BEST indicator of the effectiveness of a control action plan's implementation?
To help ensure all applicable risk scenarios are incorporated into the risk register, it is MOST important to review the:
An organization is considering allowing users to access company data from their personal devices. Which of the following is the MOST important factor when assessing the risk?
A risk assessment has identified increased losses associated with an IT risk scenario. It is MOST important for the risk practitioner to:
A risk practitioner learns that the organization s industry is experiencing a trend of rising security incidents. Which of the following is the BEST course of action?
Which of the following provides The MOST useful information when determining a risk management program's maturity level?
Who is responsible for IT security controls that are outsourced to an external service provider?
Which of the following will BEST help ensure that risk factors identified during an information systems review are addressed?
Which of the following is the MOST important objective of regularly presenting the project risk register to the project steering committee?
An IT license audit has revealed that there are several unlicensed copies of co be to:
A business unit has decided to accept the risk of implementing an off-the-shelf, commercial software package that uses weak password controls. The BEST course of action would be to:
Which of the following BEST indicates that an organizations risk management program is effective?
When assessing the maturity level of an organization's risk management framework, which of the following deficiencies should be of GREATEST concern to a risk practitioner?
Which of the following should be included in a risk assessment report to BEST facilitate senior management's understanding of the results?
Which of the following is MOST important to include in a Software as a Service (SaaS) vendor agreement?
What should a risk practitioner do FIRST upon learning a risk treatment owner has implemented a different control than what was specified in the IT risk action plan?
Which of the following will BEST help to ensure that information system controls are effective?
The MOST important reason to aggregate results from multiple risk assessments on interdependent information systems is to:
Which of the following is the MOST important enabler of effective risk management?
Which of the following criteria is MOST important when developing a response to an attack that would compromise data?
For no apparent reason, the time required to complete daily processing for a legacy application is approaching a risk threshold. Which of the following activities should be performed FIRST?
Which of the following is the BEST way to promote adherence to the risk tolerance level set by management?
An internally developed payroll application leverages Platform as a Service (PaaS) infrastructure from the cloud. Who owns the related data confidentiality risk?
Which of the following would offer the MOST insight with regard to an organization's risk culture?
An organization has identified that terminated employee accounts are not disabled or deleted within the time required by corporate policy. Unsure of the reason, the organization has decided to monitor the situation for three months to obtain more information. As a result of this decision, the risk has been:
Within the three lines of defense model, the accountability for the system of internal control resides with:
Which of the following is the MOST relevant information to include in a risk management strategy?
Which of the following IT key risk indicators (KRIs) provides management with the BEST feedback on IT capacity?
When reporting risk assessment results to senior management, which of the following is MOST important to include to enable risk-based decision making?
What is MOST important for the risk practitioner to understand when creating an initial IT risk register?
Which of the following is the MOST important input when developing risk scenarios?
A bank wants to send a critical payment order via email to one of its offshore branches. Which of the following is the BEST way to ensure the message reaches the intended recipient without alteration?
Which of the following should be a risk practitioner’s MOST important consideration when developing IT risk scenarios?
A risk assessment indicates the residual risk associated with a new bring your own device (BYOD) program is within organizational risk tolerance. Which of the following should the risk practitioner
recommend be done NEXT?
Implementing which of the following will BEST help ensure that systems comply with an established baseline before deployment?
Which of the following observations would be GREATEST concern to a risk practitioner reviewing the implementation status of management action plans?
Which of the following risk scenarios would be the GREATEST concern as a result of a single sign-on implementation?
During a risk assessment, the risk practitioner finds a new risk scenario without controls has been entered into the risk register. Which of the following is the MOST appropriate action?
An external security audit has reported multiple findings related to control noncompliance. Which of the following would be MOST important for the risk practitioner to communicate to senior management?
The BEST way to demonstrate alignment of the risk profile with business objectives is through:
Which of the following should be considered FIRST when assessing risk associated with the adoption of emerging technologies?
An organization has implemented a system capable of comprehensive employee monitoring. Which of the following should direct how the system is used?
An organization's HR department has implemented a policy requiring staff members to take a minimum of five consecutive days leave per year to mitigate the risk of malicious insideractivities. Which of the following is the BEST key performance indicator (KPI) of the effectiveness of this policy?
Which of the following BEST helps to balance the costs and benefits of managing IT risk?
Which of the following provides the BEST evidence that risk mitigation plans have been implemented effectively?
Due to a change in business processes, an identified risk scenario no longer requires mitigation. Which of the following is the MOST important reason the risk should remain in the risk register?
The PRIMARY objective of the board of directors periodically reviewing the risk profile is to help ensure:
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of an anti-virus program?
Which of the following is the GREATEST risk associated with the transition of a sensitive data backup solution from on-premise to a cloud service provider?
Which of the following would prompt changes in key risk indicator {KRI) thresholds?
Deviation from a mitigation action plan's completion date should be determined by which of the following?
A risk practitioner notices a trend of noncompliance with an IT-related control. Which of the following would BEST assist in making a recommendation to management?
Which of the following is the PRIMARY reason for conducting peer reviews of risk analysis?
Which of the following would provide the MOST comprehensive information for updating an organization's risk register?
Which of the following will be MOST effective to mitigate the risk associated with the loss of company data stored on personal devices?
Which of the following BEST helps to identify significant events that could impact an organization?
Vulnerability analysis
Which of the following is MOST important for developing effective key risk indicators (KRIs)?
Which of the following would BEST help secure online financial transactions from improper users?
Which of the following is MOST helpful to management when determining the resources needed to mitigate a risk?
Which of the following should be the PRIMARY objective of a risk awareness training program?
An organization has decided to implement an emerging technology and incorporate the new capabilities into its strategic business plan. Business operations for the technology will be outsourced. What will be the risk practitioner's PRIMARY role during the change?
Which type of cloud computing deployment provides the consumer the GREATEST degree of control over the environment?
What should be the PRIMARY objective for a risk practitioner performing a post-implementation review of an IT risk mitigation project?
It is MOST important for a risk practitioner to have an awareness of an organization s processes in order to:
To minimize risk in a software development project, when is the BEST time to conduct a risk analysis?
Which of the following is MOST important for an organization to have in place when developing a risk management framework?
A risk practitioner is reviewing a vendor contract and finds there is no clause to control privileged access to the organization's systems by vendor employees. Which of the following is the risk practitioner's BEST course of action?
A risk owner has accepted a high-impact risk because the control was adversely affecting process efficiency. Before updating the risk register, it is MOST important for the risk practitioner to:
The risk associated with a high-risk vulnerability in an application is owned by the:
A risk practitioner is reviewing the status of an action plan to mitigate an emerging IT risk and finds the risk level has increased. The BEST course of action would be to:
A risk practitioner has observed that there is an increasing trend of users sending sensitive information by email without using encryption. Which of the following would be the MOST effective approach to mitigate the risk associated with data loss?
Which of the following is the BEST approach to use when creating a comprehensive set of IT risk scenarios?
An IT department originally planned to outsource the hosting of its data center at an overseas location to reduce operational expenses. After a risk assessment, the department has decided to keep the data center in-house. How should the risk treatment response be reflected in the risk register?
Which of the following will BEST mitigate the risk associated with IT and business misalignment?
Which of the following would be a risk practitioners’ BEST recommendation for preventing cyber intrusion?
An unauthorized individual has socially engineered entry into an organization's secured physical premises. Which of the following is the BEST way to prevent future occurrences?
A risk practitioner is organizing a training session lo communicate risk assessment methodologies to ensure a consistent risk view within the organization Which of the following i< the MOST important topic to cover in this training?
Which of the following techniques would be used during a risk assessment to demonstrate to stakeholders that all known alternatives were evaluated?
Which of the following elements of a risk register is MOST likely to change as a result of change in management's risk appetite?
Which of the following is the PRIMARY reason to perform ongoing risk assessments?
Which of the following would be MOST important for a risk practitioner to provide to the internal audit department during the audit planning process?
Which of the following is the MOST useful indicator to measure the efficiency of an identity and access management process?
A risk practitioner is MOST likely to use a SWOT analysis to assist with which risk process?
What is the BEST approach for determining the inherent risk of a scenario when the actual likelihood of the risk is unknown?
During testing, a risk practitioner finds the IT department's recovery time objective (RTO) for a key system does not align with the enterprise's business continuity plan (BCP). Which of the following should be done NEXT?
Which of the following is the MOST important consideration for a risk practitioner when making a system implementation go-live recommendation?
Which of the following would BEST provide early warning of a high-risk condition?
An organization has allowed its cyber risk insurance to lapse while seeking a new insurance provider. The risk practitioner should report to management that the risk has been:
Which of the following helps ensure compliance with a nonrepudiation policy requirement for electronic transactions?
Which of the following is a PRIMARY benefit of engaging the risk owner during the risk assessment process?
Which of the following is the FIRST step in managing the security risk associated with wearable technology in the workplace?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a disaster recovery plan (DRP)?
Which of the following would be the BEST recommendation if the level of risk in the IT risk profile has decreased and is now below management's risk appetite?
An organization delegates its data processing to the internal IT team to manage information through its applications. Which of the following is the role of the internal IT team in this situation?
Which of the following would BEST help to ensure that identified risk is efficiently managed?
Which of the following is the BEST key performance indicator (KPI) to measure the maturity of an organization's security incident handling process?
Which of the following is the BEST method for assessing control effectiveness?
Which of the following is the MOST cost-effective way to test a business continuity plan?
During the risk assessment of an organization that processes credit cards, a number of existing controls have been found to be ineffective and do not meet industry standards. The overall control environment may still be effective if:
Which of the following should be the PRIMARY input when designing IT controls?
A risk practitioner is summarizing the results of a high-profile risk assessment sponsored by senior management. The BEST way to support risk-based decisions by senior management would be to:
The PRIMARY reason for a risk practitioner to review business processes is to:
Management has noticed storage costs have increased exponentially over the last 10 years because most users do not delete their emails. Which of the following can BEST alleviate this issue while not sacrificing security?
Which of the following is the MOST important benefit of implementing a data classification program?
An organization has outsourced its IT security operations to a third party. Who is ULTIMATELY accountable for the risk associated with the outsourced operations?
Which of the following is the MOST effective key performance indicator (KPI) for change management?
Which of the following is the PRIMARY reason for a risk practitioner to use global standards related to risk management?
Which of the following is the MOST important requirement for monitoring key risk indicators (KRls) using log analysis?
A systems interruption has been traced to a personal USB device plugged into the corporate network by an IT employee who bypassed internal control procedures. Of the following, who should be accountable?
Which of the following would BEST help an enterprise prioritize risk scenarios?
When developing a new risk register, a risk practitioner should focus on which of the following risk management activities?
Which of the following would be MOST useful to senior management when determining an appropriate risk response?
A global organization is planning to collect customer behavior data through social media advertising. Which of the following is the MOST important business risk to be considered?
The BEST way to justify the risk mitigation actions recommended in a risk assessment would be to:
Which of the following is the MOST important data source for monitoring key risk indicators (KRIs)?
When determining which control deficiencies are most significant, which of the following would provide the MOST useful information?
Which of the following is the BEST indication of an improved risk-aware culture following the implementation of a security awareness training program for all employees?
A risk assessment has identified that departments have installed their own WiFi access points on the enterprise network. Which of the following would be MOST important to include in a report to senior management?
Which of the following is a specific concern related to machine learning algorithms?
Which of the following is the MOST important benefit of key risk indicators (KRIs)'
During an IT risk scenario review session, business executives question why they have been assigned ownership of IT-related risk scenarios. They feel IT risk is technical in nature and therefore should be owned by IT. Which of the following is the BEST way for the risk practitioner to address these concerns?
A risk practitioner observes that hardware failure incidents have been increasing over the last few months. However, due to built-in redundancy and fault-tolerant architecture, there have been no interruptions to business operations. The risk practitioner should conclude that:
A risk practitioner has identified that the organization's secondary data center does not provide redundancy for a critical application. Who should have the authority to accept the associated risk?
Which of the following would MOST effectively enable a business operations manager to identify events exceeding risk thresholds?
In addition to the risk register, what should a risk practitioner review to develop an understanding of the organization's risk profile?
An organization is planning to engage a cloud-based service provider for some of its data-intensive business processes. Which of the following is MOST important to help define the IT risk associated with this outsourcing activity?
An organization has procured a managed hosting service and just discovered the location is likely to be flooded every 20 years. Of the following, who should be notified of this new information FIRST.
An audit reveals that several terminated employee accounts maintain access. Which of the following should be the FIRST step to address the risk?
Numerous media reports indicate a recently discovered technical vulnerability is being actively exploited. Which of the following would be the BEST response to this scenario?
Which of the following is the BEST way to determine the ongoing efficiency of control processes?
Which of the following should be the HIGHEST priority when developing a risk response?
After undertaking a risk assessment of a production system, the MOST appropriate action is for the risk manager to:
Which of the following is the BEST indication of an effective risk management program?
Which of the following BEST provides an early warning that network access of terminated employees is not being revoked in accordance with the service level agreement (SLA)?
Which of the following is the MOST important foundational element of an effective three lines of defense model for an organization?
Which of the following would be MOST helpful when estimating the likelihood of negative events?
Establishing and organizational code of conduct is an example of which type of control?
A rule-based data loss prevention {DLP) tool has recently been implemented to reduce the risk of sensitive data leakage. Which of the following is MOST likely to change as a result of this implementation?
Which of the following is the BEST method to ensure a terminated employee's access to IT systems is revoked upon departure from the organization?
A risk heat map is MOST commonly used as part of an IT risk analysis to facilitate risk:
A risk practitioner is organizing risk awareness training for senior management. Which of the following is the MOST important topic to cover in the training session?
A risk practitioner has determined that a key control does not meet design expectations. Which of the following should be done NEXT?
Which of the following is MOST important to identify when developing generic risk scenarios?
An organization's senior management is considering whether to acquire cyber insurance. Which of the following is the BEST way for the risk practitioner to enable management’s decision?
The head of a business operations department asks to review the entire IT risk register. Which of the following would be the risk manager s BEST approach to this request before sharing the register?
Which of the following would BEST ensure that identified risk scenarios are addressed?
Which of the following should be the PRIMARY consideration when implementing controls for monitoring user activity logs?
Which of the following would BEST help minimize the risk associated with social engineering threats?
From a business perspective, which of the following is the MOST important objective of a disaster recovery test?
Which of the following tools is MOST effective in identifying trends in the IT risk profile?
Which of the following is MOST helpful to ensure effective security controls for a cloud service provider?
An organization has identified a risk exposure due to weak technical controls in a newly implemented HR system. The risk practitioner is documenting the risk in the risk register. The risk should be owned by the:
The PRIMARY objective of testing the effectiveness of a new control before implementation is to:
After several security incidents resulting in significant financial losses, IT management has decided to outsource the security function to a third party that provides 24/7 security operation services. Which risk response option has management implemented?
Which of the following is the BEST way for a risk practitioner to help management prioritize risk response?
Which of the following should be the PRIMARY consideration when assessing the automation of control monitoring?
IT management has asked for a consolidated view into the organization's risk profile to enable project prioritization and resource allocation. Which of the following materials would
be MOST helpful?
Which of the following is the MAIN reason for documenting the performance of controls?
After a risk has been identified, who is in the BEST position to select the appropriate risk treatment option?