Which of the following will be the GREATEST concern when assessing the risk profile of an organization?
In order to determining a risk is under-controlled the risk practitioner will need to
An audit reveals that several terminated employee accounts maintain access. Which of the following should be the FIRST step to address the risk?
Which of the following BEST mitigates reputational risk associated with disinformation campaigns against an organization?
A risk practitioner is utilizing a risk heat map during a risk assessment. Risk events that are coded with the same color will have a similar:
A risk practitioner is performing a risk assessment of recent external advancements in quantum computing. Which of the following would pose the GREATEST concern for the risk practitioner?
An organization is planning to engage a cloud-based service provider for some of its data-intensive business processes. Which of the following is MOST important to help define the IT risk associated with this outsourcing activity?
An IT risk practitioner has been asked to regularly report on the overall status and effectiveness of the IT risk management program. Which of the following is MOST useful for this purpose?
Within the three lines of defense model, the responsibility for managing risk and controls resides with:
The PRIMARY benefit of using a maturity model is that it helps to evaluate the:
Which of the following would be the BEST key performance indicator (KPI) for monitoring the effectiveness of the IT asset management process?
A data processing center operates in a jurisdiction where new regulations have significantly increased penalties for data breaches. Which of the following elements of the risk register is MOST important to update to reflect this change?
Which of the following is the GREATEST benefit when enterprise risk management (ERM) provides oversight of IT risk management?
Which of the following elements of a risk register is MOST likely to change as a result of change in management's risk appetite?
A risk owner has identified a risk with high impact and very low likelihood. The potential loss is covered by insurance. Which of the following should the risk practitioner do NEXT?
An organization is considering adopting artificial intelligence (AI). Which of the
following is the risk practitioner's MOST important course of action?
Which of the following should be of GREATEST concern lo a risk practitioner reviewing the implementation of an emerging technology?
When updating the risk register after a risk assessment, which of the following is MOST important to include?
Which of the following is the BEST way to support communication of emerging risk?
The risk associated with a high-risk vulnerability in an application is owned by the:
A cote data center went offline abruptly for several hours affecting many transactions across multiple locations. Which of the to" owing would provide the MOST useful information to determine mitigating controls?
Which of the following would be the BEST way to help ensure the effectiveness of a data loss prevention (DLP) control that has been implemented to prevent the loss of credit card data?
Which of the following is MOST essential for an effective change control environment?
A service organization is preparing to adopt an IT control framework to comply with the contractual requirements of a new client. Which of the following would be MOST helpful to the risk practitioner?
Which of the following is the MOST important consideration when determining whether to accept residual risk after security controls have been implemented on a critical system?
Which of the following is the MOST effective way to mitigate identified risk scenarios?
The PRIMARY benefit of conducting continuous monitoring of access controls is the ability to identify:
Which of the following is a PRIMARY benefit of engaging the risk owner during the risk assessment process?
Which of the following should be done FIRST when developing a data protection management plan?
A bank wants to send a critical payment order via email to one of its offshore branches. Which of the following is the BEST way to ensure the message reaches the intended recipient without alteration?
Key control indicators (KCls) help to assess the effectiveness of the internal control environment PRIMARILY by:
Which of the following data would be used when performing a business impact analysis (BIA)?
Which of the following will MOST improve stakeholders' understanding of the effect of a potential threat?
When an organization is having new software implemented under contract, which of the following is key to controlling escalating costs?
Which of the following is MOST influential when management makes risk response decisions?
An organization has outsourced its IT security operations to a third party. Who is ULTIMATELY accountable for the risk associated with the outsourced operations?
A risk practitioners PRIMARY focus when validating a risk response action plan should be that risk response:
The PRIMARY reason for periodically monitoring key risk indicators (KRIs) is to:
An organization is considering allowing users to access company data from their personal devices. Which of the following is the MOST important factor when assessing the risk?
Which of the following provides the MOST up-to-date information about the effectiveness of an organization's overall IT control environment?
Which of the following is MOST important to sustainable development of secure IT services?
Which of the following is the MOST cost-effective way to test a business continuity plan?
Which of the following would present the MOST significant risk to an organization when updating the incident response plan?
Which of the following is the MOST important reason to restrict access to the risk register on a need-to-know basis?
A company has recently acquired a customer relationship management (CRM) application from a certified software vendor. Which of the following will BE ST help lo prevent technical vulnerabilities from being exploded?
Which of the following is the PRIMARY reason for a risk practitioner to report changes and trends in the IT risk profile to senior management?
Which of the following would present the GREATEST challenge when assigning accountability for control ownership?
While reviewing a contract of a cloud services vendor, it was discovered that the vendor refuses to accept liability for a sensitive data breach. Which of the following controls will BES reduce the risk associated with such a data breach?
Which of the following should be the PRIMARY consideration for a startup organization that has decided to adopt externally-sourced security policies?
An organization recently received an independent security audit report of its cloud service provider that indicates significant control weaknesses. What should be done NEXT in response to this report?
An organization allows programmers to change production systems in emergency situations. Which of the following is the BEST control?
When communicating changes in the IT risk profile, which of the following should be included to BEST enable stakeholder decision making?
Which of the following IT controls is MOST useful in mitigating the risk associated with inaccurate data?
Which of the following is the BEST method for determining an enterprise's current appetite for risk?
Which of the following should be the FIRST course of action if the risk associated with a new technology is found to be increasing?
When establishing an enterprise IT risk management program, it is MOST important to:
Which of the following is the BEST way to determine the ongoing efficiency of control processes?
To enable effective risk governance, it is MOST important for senior management to:
When creating a separate IT risk register for a large organization, which of the following is MOST important to consider with regard to the existing corporate risk 'register?
Which of the following is the BEST course of action for a system administrator who suspects a colleague may be intentionally weakening a system's validation controls in order to pass through fraudulent transactions?
Which of the following is the MOST important consideration for effectively maintaining a risk register?
Which of the following BEST indicates that an organizations risk management program is effective?
Which of the following is the MOST important factor affecting risk management in an organization?
It is MOST appropriate for changes to be promoted to production after they are:
Which of the following MOST effectively limits the impact of a ransomware attack?
When reviewing a report on the performance of control processes, it is MOST important to verify whether the:
A risk practitioner has been notified of a social engineering attack using artificial intelligence (Al) technology to impersonate senior management personnel. Which of the following would BEST mitigate the impact of such attacks?
Which of the following is the MOST important consideration when multiple risk practitioners capture risk scenarios in a single risk register?
Which of the following is MOST important to include in a risk assessment of an emerging technology?
Which of the following BEST indicates the risk appetite and tolerance level (or the risk associated with business interruption caused by IT system failures?
Which of the following is the BEST way to confirm whether appropriate automated controls are in place within a recently implemented system?
From a risk management perspective, which of the following is the PRIMARY benefit of using automated system configuration validation tools?
Which of the following is the MOST important information to cover a business continuity awareness Ira nine, program for all employees of the organization?
Which of the following is the BEST indication of an effective risk management program?
Which of the following is MOST important to consider when determining the risk associated with re-identification of obfuscated personal data?
Which of the following is the MOST effective way to integrate business risk management with IT operations?
Read" rights to application files in a controlled server environment should be approved by the:
Which of the following is the MOST important consideration when implementing ethical remote work monitoring?
Which of the following should be the MOST important consideration when performing a vendor risk assessment?
Which of the following is the MOST useful indicator to measure the efficiency of an identity and access management process?
Which of the following is the MOST effective way 10 identify an application backdoor prior to implementation'?
An internally developed payroll application leverages Platform as a Service (PaaS) infrastructure from the cloud. Who owns the related data confidentiality risk?
An organization is implementing internet of Things (loT) technology to control temperature and lighting in its headquarters. Which of the following should be of GREATEST concern?
During which phase of the system development life cycle (SDLC) should information security requirements for the implementation of a new IT system be defined?
Which of the following is MOST helpful in aligning IT risk with business objectives?
A risk practitioner learns that a risk owner has been accepting gifts from a supplier of IT products. Some of these IT products are used to implement controls and to mitigate risk to acceptable levels. Which of the following should the risk practitioner do FIRST?
it was determined that replication of a critical database used by two business units failed. Which of the following should be of GREATEST concern1?
Who should be PRIMARILY responsible for establishing an organization's IT risk culture?
Which of the following provides the MOST useful information to determine risk exposure following control implementations?
Which of the following is the BEST control to minimize the risk associated with scope creep in software development?
A software developer has administrative access to a production application. Which of the following should be of GREATEST concern to a risk practitioner?
An external security audit has reported multiple findings related to control noncompliance. Which of the following would be MOST important for the risk practitioner to communicate to senior management?
Which of me following is MOST helpful to mitigate the risk associated with an application under development not meeting business objectives?
Which of the following is the BEST control for a large organization to implement to effectively mitigate risk related to fraudulent transactions?
Which of the following is the GREATEST benefit to an organization when updates to the risk register are made promptly after the completion of a risk assessment?
Which of the following is the MOST important characteristic of a key risk indicator (KRI) to enable decision-making?
Which of the following would provide the MOST objective assessment of the effectiveness of an organization's security controls?
A risk practitioner is organizing a training session lo communicate risk assessment methodologies to ensure a consistent risk view within the organization Which of the following i< the MOST important topic to cover in this training?
A change management process has recently been updated with new testing procedures. What is the NEXT course of action?
Which of the following will BEST ensure that information security risk factors are mitigated when developing in-house applications?
An information system for a key business operation is being moved from an in-house application to a Software as a Service (SaaS) vendor. Which of the following will have the GREATEST impact on the ability to monitor risk?
An engineer has been assigned to conduct data restoration after a server storage failure. However, the procedure was not successful. Which of the following is the MOST probable cause of this situation?
A risk practitioner has reviewed new international regulations and realizes the new regulations will affect the organization. Which of the following should be the risk practitioner's NEXT course of
action?
Which of the following is the MOST important consideration when prioritizing risk response?
Which of the following BEST mitigates the risk of violating privacy laws when transferring personal information lo a supplier?
Which of the following would provide the MOST useful information to a risk owner when reviewing the progress of risk mitigation?
Which of the following would be a risk practitioner's BEST course of action when a project team has accepted a risk outside the established risk appetite?
A department allows multiple users to perform maintenance on a system using a single set of credentials. A risk practitioner determined this practice to be high-risk. Which of the following is the MOST effective way to mitigate this risk?
An organization is preparing to transfer a large number of customer service representatives to the sales department. Of the following, who is responsible for mitigating the risk associated with residual system access?
An organization has engaged a third party to provide an Internet gateway encryption service that protects sensitive data uploaded to a cloud service. This is an example of risk:
Which of the following is the MOST important component in a risk treatment plan?
The BEST way for an organization to ensure that servers are compliant to security policy is
to review:
Which of the following should be included in a risk assessment report to BEST facilitate senior management's understanding of the results?
After undertaking a risk assessment of a production system, the MOST appropriate action is for the risk manager to:
An organization striving to be on the leading edge in regard to risk monitoring would MOST likely implement:
Which of the following practices would be MOST effective in protecting personality identifiable information (Ptl) from unauthorized access m a cloud environment?
Which of the following controls will BEST mitigate risk associated with excessive access privileges?
Which strategy employed by risk management would BEST help to prevent internal fraud?
Which of the following is the GREATEST concern associated with insufficient focus on addressing blockchain interoperability in the SDLC?
Which of the following should be done FIRST when a new risk scenario has been identified
Which of the following would MOST effectively reduce the potential for inappropriate exposure of vulnerabilities documented in an organization's risk register?
Which of the following should be done FIRST upon learning that the organization will be affected by a new regulation in its industry?
Several network user accounts were recently created without the required management approvals. Which of the following would be the risk practitioner's BEST recommendation to address this situation?
Which of the following controls BEST enables an organization to ensure a complete and accurate IT asset inventory?
After migrating a key financial system to a new provider, it was discovered that a developer could gain access to the production environment. Which of the following is the BEST way to mitigate the risk in this situation?
Which of the following is the BEST way to determine the value of information assets for risk management purposes?
Reviewing which of the following BEST helps an organization gain insight into its overall risk profile?
Following a business continuity planning exercise, an organization decides to accept an identified risk associated with a critical business system. Which of the following should be done next?
It was discovered that a service provider's administrator was accessing sensitive information without the approval of the customer in an Infrastructure as a Service (laaS) model. Which of the following would BEST protect against a future recurrence?
An organization has decided to postpone the assessment and treatment of several risk scenarios because stakeholders are unavailable. As a result of this decision, the risk associated with these new entries has been;
Which of the following is a risk practitioner's BEST course of action if a risk assessment identifies a risk that is extremely unlikely but would have a severe impact should it occur?
When of the following provides the MOST tenable evidence that a business process control is effective?
Which of the following is MOST important to the effectiveness of key performance indicators (KPIs)?
When classifying and prioritizing risk responses, the areas to address FIRST are those with:
The patch management process is MOST effectively monitored through which of the following key control indicators (KCIs)?
Which of the following is the BEST way to identify changes in the risk profile of an organization?
The BEST metric to monitor the risk associated with changes deployed to production is the percentage of:
While conducting an organization-wide risk assessment, it is noted that many of the information security policies have not changed in the past three years. The BEST course of action is to:
Which of the following should be determined FIRST when a new security vulnerability is made public?
An IT department originally planned to outsource the hosting of its data center at an overseas location to reduce operational expenses. After a risk assessment, the department has decided to keep the data center in-house. How should the risk treatment response be reflected in the risk register?
A recent regulatory requirement has the potential to affect an organization's use of a third party to supply outsourced business services. Which of the following is the BEST course of action?
The GREATEST benefit of including low-probability, high-impact events in a risk assessment is the ability to:
Which of the following BEST enables the timely detection of changes in the security control environment?
The acceptance of control costs that exceed risk exposure MOST likely demonstrates:
Which of the following would be MOST useful to senior management when determining an appropriate risk response?
Which of the following provides The BEST information when determining whether to accept residual risk of a critical system to be implemented?
Which of the following situations would BEST justify escalation to senior management?
The MOST important reason for implementing change control procedures is to ensure:
An organization has agreed to a 99% availability for its online services and will not accept availability that falls below 98.5%. This is an example of:
Which of the following is the ULTIMATE objective of utilizing key control indicators (KCIs) in the risk management process?
The MOST essential content to include in an IT risk awareness program is how to:
Which of the following is the BEST way to address IT regulatory compliance risk?
As pan of business continuity planning, which of the following is MOST important to include m a business impact analysis (BlA)?
An organization has allowed its cyber risk insurance to lapse while seeking a new insurance provider. The risk practitioner should report to management that the risk has been:
When confirming whether implemented controls are operating effectively, which of the following is MOST important to review?
A recent risk workshop has identified risk owners and responses for newly identified risk scenarios. Which of the following should be the risk practitioner's NEXT step?
The BEST way to obtain senior management support for investment in a control implementation would be to articulate the reduction in:
Which of the following is the BEST way to determine whether system settings are in alignment with control baselines?
Which of the following outcomes of disaster recovery planning is MOST important to enable the initiation of necessary actions during a disaster?
An IT license audit has revealed that there are several unlicensed copies of co be to:
Which of the following is a risk practitioner's BEST course of action after identifying risk scenarios related to noncompliance with new industry regulations?
An organization moved its payroll system to a Software as a Service (SaaS) application. A new data privacy regulation stipulates that data can only be processed within the countrywhere it is collected. Which of the following should be done FIRST when addressing this situation?
A global organization is considering the transfer of its customer information systems to an overseas cloud service provider in the event of a disaster. Which of the following should be the MOST important risk consideration?
Which of the following is MOST important for maintaining the effectiveness of an IT risk register?
Which of the following is the MOST important consideration when selecting digital signature software?
Which of the following BEST reduces the risk associated with the theft of a laptop containing sensitive information?
A risk practitioner has been made aware of a problem in an IT system that was missed during a routine risk assessment. Which of the following is the practitioner's BEST course of action?
Numerous media reports indicate a recently discovered technical vulnerability is being actively exploited. Which of the following would be the BEST response to this scenario?
Which of the following is the FIRST step when conducting a business impact analysis (BIA)?
Which of the following is the MOST effective way to integrate risk and compliance management?
An organization has granted a vendor access to its data in order to analyze customer behavior. Which of the following would be the MOST effective control to mitigate the risk of customer data leakage?
Which of the following scenarios presents the GREATEST risk for a global organization when implementing a data classification policy?
An organization is making significant changes to an application. At what point should the application risk profile be updated?
Which of the following is the PRIMARY reason to use administrative controls in conjunction with technical controls?
Which of the following is the PRIMARY role of the board of directors in corporate risk governance?
A vendor’s planned maintenance schedule will cause a critical application to temporarily lose failover capabilities. Of the following, who should approve this proposed schedule?
Which of the following is the MOST important objective of embedding risk management practices into the initiation phase of the project management life cycle?
In addition to the risk exposure, which of the following is MOST important for senior management to understand prior to approving the use of artificial intelligence (Al) solutions?
Which of the following controls will BEST detect unauthorized modification of data by a database administrator?
An organization is adopting block chain for a new financial system. Which of the following should be the GREATEST concern for a risk practitioner evaluating the system's production readiness?
An organization has made a decision to purchase a new IT system. During when phase of the system development life cycle (SDLC) will identified risk MOST likely lead to architecture and design trade-offs?
Which of the following criteria associated with key risk indicators (KRIs) BEST enables effective risk monitoring?
An organization planning to transfer and store its customer data with an offshore cloud service provider should be PRIMARILY concerned with:
A risk practitioner is reviewing accountability assignments for data risk in the risk register. Which of the following would pose the GREATEST concern?
To enable effective integration of IT risk scenarios and ERM, it is MOST important to have a consistent approach to reporting:
Which of the following is the MOST important criteria for selecting key risk indicators (KRIs)?
Which of the following is MOST important for an organization to consider when developing its IT strategy?
Which of the following is the BEST recommendation when a key risk indicator (KRI) is generating an excessive volume of events?
While reviewing the risk register, a risk practitioner notices that different business units have significant variances in inherent risk for the same risk scenario. Which of the following is the BEST course of action?
Which of the following is the MOST important course of action for a risk practitioner when reviewing the results of control performance monitoring?
Which of the following is the MOST effective control to ensure user access is maintained on a least-privilege basis?
Where is the FIRST place a risk practitioner should look to identify accountability for a specific risk?
An organization's IT team has proposed the adoption of cloud computing as a cost-saving measure for the business. Which of the following should be of GREATEST concern to the risk practitioner?
Which of the following management action will MOST likely change the likelihood rating of a risk scenario related to remote network access?
An organization has an internal control that requires all access for employees be removed within 15 days of their termination date. Which of the following should the risk practitioner use to monitor
adherence to the 15-day threshold?
Which of the following would MOST likely result in updates to an IT risk appetite statement?
Which of the following is MOST important for a risk practitioner to update when a software upgrade renders an existing key control ineffective?
An internal audit report reveals that a legacy system is no longer supported Which of the following is the risk practitioner's MOST important action before recommending a risk response'
The BEST indication that risk management is effective is when risk has been reduced to meet:
Which of the following is the FIRST step when conducting a business impact analysis (BIA)?
Which of the following is the MOST important input when developing risk scenarios?
Which of the following presents the GREATEST privacy risk related to personal data processing for a global organization?
An organization operates in an environment where reduced time-to-market for new software products is a top business priority. Which of the following should be the risk practitioner's GREATEST concern?
Employees are repeatedly seen holding the door open for others, so that trailing employees do not have to stop and swipe their own ID badges. This behavior BEST represents:
Which of the following provides the MOST reliable evidence to support conclusions after completing an information systems controls assessment?
In addition to the risk register, what should a risk practitioner review to develop an understanding of the organization's risk profile?
Which of the following should be of MOST concern to a risk practitioner reviewing the system development life cycle (SDLC)?
An application runs a scheduled job that compiles financial data from multiple business systems and updates the financial reporting system. If this job runs too long, it can delay financial reporting. Which of the following is the risk practitioner's BEST recommendation?
IT management has asked for a consolidated view into the organization's risk profile to enable project prioritization and resource allocation. Which of the following materials would
be MOST helpful?
Which of the following BEST indicates how well a web infrastructure protects critical information from an attacker?
Which of the following is the MOST efficient method for monitoring control effectiveness?
Which of the following is the PRIMARY advantage of having a single integrated business continuity plan (BCP) rather than each business unit developing its own BCP?
Which of the following BEST enforces access control for an organization that uses multiple cloud technologies?
Which of the following deficiencies identified during a review of an organization's cybersecurity policy should be of MOST concern?
Which of the following should be the PRIMARY consideration when assessing the risk of using Internet of Things (loT) devices to collect and process personally identifiable information (Pll)?
Which of the following would MOST likely require a risk practitioner to update the risk register?
Which of the following would be MOST helpful to a risk practitioner when ensuring that mitigated risk remains within acceptable limits?
An organization has outsourced its backup and recovery procedures to a third-party cloud provider. Which of the following is the risk practitioner s BEST course of action?
Which of the following would BEST facilitate the implementation of data classification requirements?
The PRIMARY objective of collecting information and reviewing documentation when performing periodic risk analysis should be to:
To reduce costs, an organization is combining the second and third tines of defense in a new department that reports to a recently appointed C-level executive. Which of the following is the GREATEST concern with this situation?
Which of the following is MOST important requirement to include in a Software as a Service (SaaS) vendor contract to ensure data is protected?
An organization is outsourcing a key database to be hosted by an external service provider. Who is BEST suited to assess the impact of potential data loss?
An organization's risk tolerance should be defined and approved by which of the following?
An organization operates in a jurisdiction where heavy fines are imposed for leakage of customer data. Which of the following provides the BEST input to assess the inherent risk impact?
After a high-profile systems breach at an organization s key vendor, the vendor has implemented additional mitigating controls. The vendor has voluntarily shared the following set of assessments:
Which of the assessments provides the MOST reliable input to evaluate residual risk in the vendor's control environment?
Which of the following is the MOST essential characteristic of a good IT risk scenario?
Which of the following has the GREATEST positive impact on ethical compliance within the risk management process?
Which of the following would provide the MOST helpful input to develop risk scenarios associated with hosting an organization's key IT applications in a cloud environment?
Which of the following provides the MOST useful information for developing key risk indicators (KRIs)?
Which of the following can be interpreted from a single data point on a risk heat map?
After mapping generic risk scenarios to organizational security policies, the NEXT course of action should be to:
Which of the following is the GREATEST benefit of analyzing logs collected from different systems?
What is the MOST important consideration when aligning IT risk management with the enterprise risk management (ERM) framework?
Which of the following is the PRIMARY consideration when establishing an organization's risk management methodology?
An organization has outsourced its billing function to an external service provider. Who should own the risk of customer data leakage caused by the service provider?
Which of the following is the GREATEST concern associated with business end users developing their own applications on end user spreadsheets and database programs?
The risk associated with inadvertent disclosure of database records from a public cloud service provider (CSP) would MOST effectively be reduced by:
Which of the following is the BEST measure of the effectiveness of an employee deprovisioning process?
Which of the following risk activities is BEST facilitated by enterprise architecture (EA)?
Which of the following BEST indicates effective information security incident management?
When presenting risk, the BEST method to ensure that the risk is measurable against the organization's risk appetite is through the use of a:
Which of the following presents the GREATEST risk to change control in business application development over the complete life cycle?
A risk practitioner has learned that the number of emergency change management tickets without subsequent approval has doubled from the same period of the previous year. Which of the following is the MOST important action for the risk practitioner to take?
Which of the following would provide the BEST guidance when selecting an appropriate risk treatment plan?
Which of the following is the BEST recommendation of a risk practitioner for an organization that recently changed its organizational structure?
Which of the following has the GREATEST influence on an organization's risk appetite?
Which of the following BEST balances the costs and benefits of managing IT risk*?
Once a risk owner has decided to implement a control to mitigate risk, it is MOST important to develop:
Which of the following requirements is MOST important to include in an outsourcing contract to help ensure sensitive data stored with a service provider is secure?
Which of the following methods would BEST contribute to identifying obscure risk scenarios?
After the implementation of internal of Things (IoT) devices, new risk scenarios were identified. What is the PRIMARY reason to report this information to risk owners?
Which of the following observations would be GREATEST concern to a risk practitioner reviewing the implementation status of management action plans?
Which of the following is the BEST way to ensure ongoing control effectiveness?
A business impact analysis (BIA) enables an organization to determine appropriate IT risk mitigation actions by:
A risk practitioner has been asked by executives to explain how existing risk treatment plans would affect risk posture at the end of the year. Which of the following is MOST helpful in responding to this request?
An organization is participating in an industry benchmarking study that involves providing customer transaction records for analysis Which of the following is the MOST important control to ensure the privacy of customer information?
Which of the following is the GREATEST benefit for an organization with a strong risk awareness culture?
Which of the following is the BEST indicator of executive management's support for IT risk mitigation efforts?
Which of the following would provide the MOST reliable evidence of the effectiveness of security controls implemented for a web application?
An organization is concerned that its employees may be unintentionally disclosing data through the use of social media sites. Which of the following will MOST effectively mitigate tins risk?
Which of the following is MOST helpful in identifying loss magnitude during risk analysis of a new system?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of IT policies? The number of:
An organization requires a third party for processing customer personal data. Which of the following is the BEST approach when sharing data over a public network?
Which of the following presents the GREATEST challenge to managing an organization's end-user devices?
Which of the following is the GREATEST risk associated with the use of data analytics?
An organization is implementing robotic process automation (RPA) to streamline business processes. Given that implementation of this technology is expected to impact existing controls, which of the following is the risk practitioner's BEST course of action?
It is MOST important that security controls for a new system be documented in:
Which of the following is MOST important when developing key performance indicators (KPIs)?
The PRIMARY objective of testing the effectiveness of a new control before implementation is to:
Which of the following is a PRIMARY objective of privacy impact assessments (PIAs)?
Which of The following should be of GREATEST concern for an organization considering the adoption of a bring your own device (BYOD) initiative?
Which of the following would provide the MOST useful input when evaluating the appropriateness of risk responses?
An organization is considering the adoption of an aggressive business strategy to achieve desired growth From a risk management perspective what should the risk practitioner do NEXT?
A failure in an organization s IT system build process has resulted in several computers on the network missing the corporate endpoint detection and response (EDR) software. Which of the following should be the risk practitioner’s IMMEDIATE concern?
Which of the following would BEST facilitate the maintenance of data classification requirements?
A risk assessment has identified that departments have installed their own WiFi access points on the enterprise network. Which of the following would be MOST important to include in a report to senior management?
Which of the following is the BEST way to promote adherence to the risk tolerance level set by management?
Prior to selecting key performance indicators (KPIs), itis MOST important to ensure:
Which of the following BEST provides an early warning that network access of terminated employees is not being revoked in accordance with the service level agreement (SLA)?
A risk practitioner is reporting on an increasing trend of ransomware attacks in the industry. Which of the following information is MOST important to include to enable an informed response decision by key stakeholders?
An organization has been experiencing an increasing number of spear phishing attacks Which of the following would be the MOST effective way to mitigate the risk associated with these attacks?
During a review of the asset life cycle process, a risk practitioner identified several unreturned and unencrypted laptops belonging to former employees. Which of the following is the GREATEST concern with this finding?
Which of the following contributes MOST to the effective implementation of risk responses?
Senior management has asked the risk practitioner for the overall residual risk level for a process that contains numerous risk scenarios. Which of the following should be provided?
The BEST way to mitigate the high cost of retrieving electronic evidence associated with potential litigation is to implement policies and procedures for.
Which of the following should be used as the PRIMARY basis for evaluating the state of an organization's cloud computing environment against leading practices?
An organization is increasingly concerned about loss of sensitive data and asks the risk practitioner to assess the current risk level. Which of the following should the risk practitioner do FIRST?
Which of the following is BEST used to aggregate data from multiple systems to identify abnormal behavior?
Which of the following BEST describes the role of the IT risk profile in strategic IT-related decisions?
Which of the following MUST be assessed before considering risk treatment options for a scenario with significant impact?
A risk practitioner is concerned with potential data loss in the event of a breach at a hosted third-party provider. Which of the following is the BEST way to mitigate this risk?
Which of the following should be included in a risk scenario to be used for risk analysis?
Which of the following is the BEST indication that key risk indicators (KRls) should be revised?
What is the BEST approach for determining the inherent risk of a scenario when the actual likelihood of the risk is unknown?
A risk practitioner is developing a set of bottom-up IT risk scenarios. The MOST important time to involve business stakeholders is when:
A risk practitioner notes control design changes when comparing risk response to a previously approved action plan. Which of the following is MOST important for the practitioner to confirm?
Which of the following is the MOST significant indicator of the need to perform a penetration test?
The PRIMARY reason to have risk owners assigned to entries in the risk register is to ensure:
Which of the following should be the PRIMARY goal of developing information security metrics?
Which of the following BEST enables effective risk reporting to the board of directors?
Which of the following BEST indicates the efficiency of a process for granting access privileges?
Which stakeholders are PRIMARILY responsible for determining enterprise IT risk appetite?
Which of the following is a risk practitioner's MOST important responsibility in managing risk acceptance that exceeds risk tolerance?
When of the following is the MOST significant exposure when an application uses individual user accounts to access the underlying database?
An organization has determined a risk scenario is outside the defined risk tolerance level. What should be the NEXT course of action?
A risk practitioner is advising management on how to update the IT policy framework to account for the organization s cloud usage. Which of the following should be the FIRST step in this process?
Which of the following is the BEST way to assess the effectiveness of an access management process?
During implementation of an intrusion detection system (IDS) to monitor network traffic, a high number of alerts is reported. The risk practitioner should recommend to:
An IT department has provided a shared drive for personnel to store information to which all employees have access. Which of the following parties is accountable for the risk of potential loss of confidential information?
Which of the following is the PRIMARY role of a data custodian in the risk management process?
Which of the following is the PRIMARY benefit of implementing key control indicators (KCIs)?
Which of the following is the MOST effective way for a large and diversified organization to minimize risk associated with unauthorized software on company devices?
Which of the following is the PRIMARY reason for conducting peer reviews of risk analysis?
An enterprise has taken delivery of software patches that address vulnerabilities in its core business software. Prior to implementation, which of the following is the MOST important task to be performed?
Which of the following is the BEST metric to demonstrate the effectiveness of an organization's change management process?
To implement the MOST effective monitoring of key risk indicators (KRIs), which of the following needs to be in place?
Which of the following is MOST important to understand when developing key risk indicators (KRIs)?
A risk practitioner discovers that an IT operations team manager bypassed web filtering controls by using a mobile device, in violation of the network security policy. Which of the following should the risk practitioner do FIRST?
Which of the following is of GREATEST concern when uncontrolled changes are made to the control environment?
Which of the following is the BEST recommendation to senior management when the results of a risk and control assessment indicate a risk scenario can only be partially mitigated?
An employee lost a personal mobile device that may contain sensitive corporate information. What should be the risk practitioner's recommendation?
Which of the following describes the relationship between Key risk indicators (KRIs) and key control indicators (KCIS)?
Which of the following would be MOST important for a risk practitioner to provide to the internal audit department during the audit planning process?
Which of the following is the MAIN reason to continuously monitor IT-related risk?
Business areas within an organization have engaged various cloud service providers directly without assistance from the IT department. What should the risk practitioner do?
The MOST important consideration when selecting a control to mitigate an identified risk is whether:
An organization is planning to outsource its payroll function to an external service provider Which of the following should be the MOST important consideration when selecting the provider?
Which of the following is MOST important to review when an organization needs to transition the majority of its employees to remote work during a crisis?
A penetration test reveals several vulnerabilities in a web-facing application. Which of the following should be the FIRST step in selecting a risk response?
A risk practitioner has been notified that an employee sent an email in error containing customers' personally identifiable information (Pll). Which of the following is the risk practitioner's BEST course of action?
From a business perspective, which of the following is the MOST important objective of a disaster recovery test?
Which of the following is the MOST relevant information to include in a risk management strategy?
An organization has implemented a preventive control to lock user accounts after three unsuccessful login attempts. This practice has been proven to be unproductive, and a change in the control threshold value has been recommended. Who should authorize changing this threshold?
The BEST way to demonstrate alignment of the risk profile with business objectives is through:
A key performance indicator (KPI) shows that a process is operating inefficiently, even though no control issues were noted during the most recent risk assessment. Which of the following should be done FIRST?
Which of the following would MOST likely cause a risk practitioner to change the likelihood rating in the risk register?
Which of the following would be MOST helpful in assessing the risk associated with data loss due to human vulnerabilities?
Which of the following attributes of a key risk indicator (KRI) is MOST important?
An organization has procured a managed hosting service and just discovered the location is likely to be flooded every 20 years. Of the following, who should be notified of this new information FIRST.
Which of the following poses the GREATEST risk to an organization's operations during a major it transformation?
A highly regulated enterprise is developing a new risk management plan to specifically address legal and regulatory risk scenarios What should be done FIRST by IT governance to support this effort?
A risk practitioner has received an updated enterprise risk management (ERM) report showing that residual risk is now within the organization's defined appetite and tolerance levels. Which of the following is the risk practitioner's BEST course of action?
An organization has introduced risk ownership to establish clear accountability for each process. To ensure effective risk ownership, it is MOST important that:
A risk practitioner notices that a particular key risk indicator (KRI) has remained below its established trigger point for an extended period of time. Which of the following should be done FIRST?
Which of the following scenarios is MOST likely to cause a risk practitioner to request a formal risk acceptance sign-off?
A data center has recently been migrated to a jurisdiction where heavy fines will be imposed should leakage of customer personal data occur. Assuming no other changes to the operating environment, which factor should be updated to reflect this situation as an input to scenario development for this particular risk event?
A key risk indicator (KRI) threshold has reached the alert level, indicating data leakage incidents are highly probable. What should be the risk practitioner's FIRST course of action?
Which of the following is the BEST key control indicator (KCI) for a vulnerability management program?
Which of the following is the PRIMARY reason to use key control indicators (KCIs) to evaluate control operating effectiveness?
A control owner identifies that the organization's shared drive contains personally identifiable information (Pll) that can be accessed by all personnel. Which of the following is the MOST effective risk response?
A risk assessment has revealed that the probability of a successful cybersecurity attack is increasing. The potential loss could exceed the organization's risk appetite. Which of the following ould be the MOST effective course of action?
A risk practitioner has learned that an effort to implement a risk mitigation action plan has stalled due to lack of funding. The risk practitioner should report that the associated risk has been:
Which of the following is MOST effective in continuous risk management process improvement?
Business management is seeking assurance from the CIO that IT has a plan in place for early identification of potential issues that could impact the delivery of a new application Which of the following is the BEST way to increase the chances of a successful delivery'?
Which of the following would be MOST useful when measuring the progress of a risk response action plan?
Which of the following is the MOST important key performance indicator (KPI) to establish in the service level agreement (SLA) for an outsourced data center?
An identified high probability risk scenario involving a critical, proprietary business function has an annualized cost of control higher than the annual loss expectancy. Which of the following is the BEST risk response?
The BEST way for management to validate whether risk response activities have been completed is to review:
Of the following, whose input is ESSENTIAL when developing risk scenarios for the implementation of a third-party mobile application that stores customer data?
Which of the following practices BEST mitigates risk related to enterprise-wide ethical decision making in a multi-national organization?
Which of the following is the MOST important technology control to reduce the likelihood of fraudulent payments committed internally?
Which of the following is MOST helpful in defining an early-warning threshold associated with insufficient network bandwidth’’?
Which of the following is the BEST approach for an organization in a heavily regulated industry to comprehensively test application functionality?
Which of the following is the BEST approach to mitigate the risk associated with a control deficiency?
Which of the following techniques is MOST helpful when quantifying the potential loss impact of cyber risk?
An organization has received notification that it is a potential victim of a cybercrime that may have compromised sensitive customer data. What should be The FIRST course of action?
Which of the following is the BEST approach to use when creating a comprehensive set of IT risk scenarios?
A risk practitioner's BEST guidance to help an organization develop relevant risk scenarios is to ensure the scenarios are:
Which of the following is MOST helpful to review when identifying risk scenarios associated with the adoption of Internet of Things (loT) technology in an organization?
Which of the following is the MOST important consideration when determining the appropriate data retention period throughout the data management life cycle?
An organization is considering outsourcing user administration controls tor a critical system. The potential vendor has offered to perform quarterly sett-audits of its controls instead of having annual independent audits. Which of the following should be of GREATEST concern to me risk practitioner?
When reporting on the performance of an organization's control environment including which of the following would BEST inform stakeholders risk decision-making?
A risk practitioner has been notified of a social engineering attack using artificial intelligence (AI) technology to impersonate senior management personnel. Which of the following would BEST mitigate the impact of such attacks?
A key risk indicator (KRI) indicates a reduction in the percentage of appropriately patched servers. Which of the following is the risk practitioner's BEST course of action?
Which of the following should be the PRIMARY consideration when assessing the automation of control monitoring?
In a public company, which group is PRIMARILY accountable for ensuring sufficient attention and resources are applied to the risk management process?
A risk practitioner wants to identify potential risk events that affect the continuity of a critical business process. Which of the following should the risk practitioner do FIRST?
An organization that has been the subject of multiple social engineering attacks is developing a risk awareness program. The PRIMARY goal of this program should be to:
An organization is considering modifying its system to enable acceptance of credit card payments. To reduce the risk of data exposure, which of the following should the organization do FIRST?
Which of the following provides the MOST important information to facilitate a risk response decision?
Which of the following would be the BEST way for a risk practitioner to validate the effectiveness of a patching program?
When implementing an IT risk management program, which of the following is the BEST time to evaluate current control effectiveness?
An incentive program is MOST likely implemented to manage the risk associated with loss of which organizational asset?
An organization plans to migrate sensitive information to a public cloud infrastructure. Which of the following is the GREATEST security risk in this scenario?
Which of the following roles would be MOST helpful in providing a high-level view of risk related to customer data loss?
What is the MOST important consideration when selecting key performance indicators (KPIs) for control monitoring?
As part of an overall IT risk management plan, an IT risk register BEST helps management:
For a large software development project, risk assessments are MOST effective when performed:
When determining which control deficiencies are most significant, which of the following would provide the MOST useful information?
Which of the following would be a risk practitioner’s BEST recommendation upon learning of an updated cybersecurity regulation that could impact the organization?
A control process has been implemented in response to a new regulatory requirement, but has significantly reduced productivity. Which of the following is the BEST way to resolve this concern?
Which of the following is MOST important to consider when determining risk appetite?
A control owner has completed a year-long project To strengthen existing controls. It is MOST important for the risk practitioner to:
Which of the following BEST facilitates the mitigation of identified gaps between current and desired risk environment states?
During a risk assessment of a financial institution, a risk practitioner discovers that tellers can initiate and approve transactions of significant value. This team is also responsible for ensuring transactions are recorded and balances are reconciled by the end of the day. Which of the following is the risk practitioner's BEST recommendation to mitigate the associated risk?
Which of the following BEST indicates that an organization has implemented IT performance requirements?
Which of the following is the BEST indication of an improved risk-aware culture following the implementation of a security awareness training program for all employees?
Which of the following BEST helps to identify significant events that could impact an organization?
Vulnerability analysis
An organization has initiated a project to launch an IT-based service to customers and take advantage of being the first to market. Which of the following should be of GREATEST concern to senior management?
Which of the following BEST enables the integration of IT risk management across an organization?
Who is PRIMARILY accountable for identifying risk on a daily basis and ensuring adherence to the organization's policies?
A multinational company needs to implement a new centralized security system. The risk practitioner has identified a conflict between the organization's data-handling policy and local privacy regulations. Which of the following would be the BEST recommendation?
Which of the following BEST enables a risk practitioner to identify the consequences of losing critical resources due to a disaster?
Which of the following is the BEST way to determine the value of information assets for risk management purposes?
WhichT5f the following is the MOST effective way to promote organization-wide awareness of data security in response to an increase in regulatory penalties for data leakage?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a disaster recovery test of critical business processes?
An IT operations team implements disaster recovery controls based on decisions from application owners regarding the level of resiliency needed. Who is the risk owner in this scenario?
A risk practitioner is organizing risk awareness training for senior management. Which of the following is the MOST important topic to cover in the training session?
Which of the following is the BEST course of action when risk is found to be above the acceptable risk appetite?
The PRIMARY reason a risk practitioner would be interested in an internal audit report is to:
A new regulator/ requirement imposes severe fines for data leakage involving customers' personally identifiable information (Pll). The risk practitioner has recommended avoiding the risk. Which of the following actions would BEST align with this recommendation?
Which of the following is the GREATEST concern associated with the use of artificial intelligence (AI) language models?
Which component of a software inventory BEST enables the identification and mitigation of known vulnerabilities?
Which of the following is the PRIMARY risk management responsibility of the third line of defense?
Which of the following is MOST important for an organization to have in place when developing a risk management framework?
Which of the following is the MOST important factor to consider when determining whether to approve a policy exception request?
Who is MOST likely to be responsible for the coordination between the IT risk strategy and the business risk strategy?
Which of the following is MOST important to consider when determining a recovery time objective (RTO)?
When of the following is the BEST key control indicator (KCI) to determine the effectiveness of en intrusion prevention system (IPS)?
A risk practitioner is performing a risk assessment of recent external advancements in quantum computing. Which of the following would pose the GREATEST concern for the risk practitioner?
An organization maintains independent departmental risk registers that are not automatically aggregated. Which of the following is the GREATEST concern?
Which of the following is the MOST appropriate action when a tolerance threshold is exceeded?
Which of the following BEST measures the efficiency of an incident response process?
Which of the following risk management practices BEST facilitates the incorporation of IT risk scenarios into the enterprise-wide risk register?
Which of the following should be implemented to BEST mitigate the risk associated with infrastructure updates?
Which element of an organization's risk register is MOST important to update following the commissioning of a new financial reporting system?
Which of the following criteria for assigning owners to IT risk scenarios provides the GREATEST benefit to an organization?
In the three lines of defense model, a PRIMARY objective of the second line is to:
A risk practitioner has been asked to propose a risk acceptance framework for an organization. Which of the following is the MOST important consideration for the risk practitioner to address in the framework?
A risk assessment has identified that an organization may not be in compliance with industry regulations. The BEST course of action would be to:
Which of the following is MOST helpful in developing key risk indicator (KRl) thresholds?
Which of the following issues found during the review of a newly created disaster recovery plan (DRP) should be of MOST concern?
Which of the following would BEST help identify the owner for each risk scenario in a risk register?
Which of the following should be a risk practitioner's NEXT step upon learning the impact of an organization's noncompliance with a specific legal regulation?
The PRIMARY reason for tracking the status of risk mitigation plans is to ensure:
An organization uses a vendor to destroy hard drives. Which of the following would BEST reduce the risk of data leakage?
An organization learns of a new ransomware attack affecting organizations worldwide. Which of the following should be done FIRST to reduce the likelihood of infection from the attack?
A new international data privacy regulation requires personal data to be
disposed after the specified retention period, which is different from the local
regulatory requirement. Which of the following is the risk practitioner's
BEST course of action?
Which of the following is the GREATEST benefit of updating the risk register to include outcomes from a risk assessment?