Summer Special Limited Time 65% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: geek65

CRISC Certified in Risk and Information Systems Control Questions and Answers

Questions 4

Which of the following is the PRIMARY reason for a risk practitioner to report changes and trends in the IT risk profile to senior management?

Options:

A.

To ensure risk owners understand their responsibilities

B.

To ensure IT risk is managed within acceptable limits

C.

To ensure the organization complies with legal requirements

D.

To ensure the IT risk awareness program is effective

Buy Now
Questions 5

Which of the following would be a risk practitioner's MOST important action upon learning that an IT control has failed?

Options:

A.

Implement a replacement control.

B.

Adjust residual risk rating.

C.

Escalate to senior management.

D.

Review compensating controls.

Buy Now
Questions 6

Which of the following is the MOST important reason to validate that risk responses have been executed as outlined in the risk response plan''

Options:

A.

To ensure completion of the risk assessment cycle

B.

To ensure controls arc operating effectively

C.

To ensure residual risk Is at an acceptable level

D.

To ensure control costs do not exceed benefits

Buy Now
Questions 7

An internal audit report reveals that a legacy system is no longer supported Which of the following is the risk practitioner's MOST important action before recommending a risk response'

Options:

A.

Review historical application down me and frequency

B.

Assess the potential impact and cost of mitigation

C.

identify other legacy systems within the organization

D.

Explore the feasibility of replacing the legacy system

Buy Now
Questions 8

What is the PRIMARY purpose of a business impact analysis (BIA)?

Options:

A.

To determine the likelihood and impact of threats to business operations

B.

To identify important business processes in the organization

C.

To estimate resource requirements for related business processes

D.

To evaluate the priority of business operations in case of disruption

Buy Now
Questions 9

Who is the BEST person to the employee personal data?

Options:

A.

Human resources (HR) manager

B.

System administrator

C.

Data privacy manager

D.

Compliance manager

Buy Now
Questions 10

Which of the following BEST indicates the effective implementation of a risk treatment plan?

Options:

A.

Inherent risk is managed within an acceptable level.

B.

Residual risk is managed within appetite and tolerance.

C.

Risk treatments are aligned with industry peers.

D.

Key controls are identified and documented.

Buy Now
Questions 11

Which of the following is MOST important to enable well-informed cybersecurity risk decisions?

Options:

A.

Determine and understand the risk rating of scenarios.

B.

Conduct risk assessment peer reviews.

C.

Identify roles and responsibilities for security controls.

D.

Engage a third party to perform a risk assessment.

Buy Now
Questions 12

Which of the following is the GREATEST concern associated with the lack of proper control monitoring?

Options:

A.

There is potential for an increase in audit findings

B.

Key performance indicators (KPIs) may not be reliable

C.

The potential for risk realization is increased

D.

Control inefficiencies may go undetected

Buy Now
Questions 13

Which of the following is MOST important to understand when determining an appropriate risk assessment approach?

Options:

A.

Complexity of the IT infrastructure

B.

Value of information assets

C.

Management culture

D.

Threats and vulnerabilities

Buy Now
Questions 14

Which of the following is MOST important for maintaining the effectiveness of an IT risk register?

Options:

A.

Removing entries from the register after the risk has been treated

B.

Recording and tracking the status of risk response plans within the register

C.

Communicating the register to key stakeholders

D.

Performing regular reviews and updates to the register

Buy Now
Questions 15

Which of the following is the BEST course of action when an organization wants to reduce likelihood in order to reduce a risk level?

Options:

A.

Monitor risk controls.

B.

Implement preventive measures.

C.

Implement detective controls.

D.

Transfer the risk.

Buy Now
Questions 16

Whose risk tolerance matters MOST when making a risk decision?

Options:

A.

Customers who would be affected by a breach

B.

Auditors, regulators and standards organizations

C.

The business process owner of the exposed assets

D.

The information security manager

Buy Now
Questions 17

After the announcement of a new IT regulatory requirement, it is MOST important for a risk practitioner to;

Options:

A.

prepare an IT risk mitigation strategy.

B.

escalate to senior management.

C.

perform a cost-benefit analysis.

D.

review the impact to the IT environment.

Buy Now
Questions 18

Which of the following should a risk practitioner recommend FIRST when an increasing trend of risk events and subsequent losses has been identified?

Options:

A.

Conduct root cause analyses for risk events.

B.

Educate personnel on risk mitigation strategies.

C.

Integrate the risk event and incident management processes.

D.

Implement controls to prevent future risk events.

Buy Now
Questions 19

Which of the following is the MOST critical element to maximize the potential for a successful security implementation?

Options:

A.

The organization's knowledge

B.

Ease of implementation

C.

The organization's culture

D.

industry-leading security tools

Buy Now
Questions 20

A risk practitioner is assisting with the preparation of a report on the organization s disaster recovery (DR) capabilities. Which information would have the MOST impact on the overall recovery profile?

Options:

A.

The percentage of systems meeting recovery target times has increased.

B.

The number of systems tested in the last year has increased.

C.

The number of systems requiring a recovery plan has increased.

D.

The percentage of systems with long recovery target times has decreased.

Buy Now
Questions 21

To help identify high-risk situations, an organization should:

Options:

A.

continuously monitor the environment.

B.

develop key performance indicators (KPIs).

C.

maintain a risk matrix.

D.

maintain a risk register.

Buy Now
Questions 22

An organization's stakeholders are unable to agree on appropriate risk responses. Which of the following would be the BEST course of action?

Options:

A.

Escalate to senior management.

B.

Identify a risk transfer option.

C.

Reassess risk scenarios.

D.

Benchmark with similar industries.

Buy Now
Questions 23

Which of the following will BEST communicate the importance of risk mitigation initiatives to senior management?

Options:

A.

Business case

B.

Balanced scorecard

C.

Industry standards

D.

Heat map

Buy Now
Questions 24

Risk management strategies are PRIMARILY adopted to:

Options:

A.

take necessary precautions for claims and losses.

B.

achieve acceptable residual risk levels.

C.

avoid risk for business and IT assets.

D.

achieve compliance with legal requirements.

Buy Now
Questions 25

What should be the PRIMARY objective of updating a risk awareness program in response to a steady rise in cybersecurity threats across the industry?

Options:

A.

To increase familiarity and understanding of potential security incidents

B.

To ensure compliance with risk management policies and procedures

C.

To reduce the risk of insider threats that could compromise security practices

D.

To lower the organization's risk appetite and tolerance levels

Buy Now
Questions 26

An information security audit identified a risk resulting from the failure of an automated control Who is responsible for ensuring the risk register is updated accordingly?

Options:

A.

The risk practitioner

B.

The risk owner

C.

The control owner

D.

The audit manager

Buy Now
Questions 27

An IT risk practitioner has determined that mitigation activities differ from an approved risk action plan. Which of the following is the risk practitioner's BEST course of action?

Options:

A.

Report the observation to the chief risk officer (CRO).

B.

Validate the adequacy of the implemented risk mitigation measures.

C.

Update the risk register with the implemented risk mitigation actions.

D.

Revert the implemented mitigation measures until approval is obtained

Buy Now
Questions 28

Which of the following is the BEST way to determine software license compliance?

Options:

A.

List non-compliant systems in the risk register.

B.

Conduct periodic compliance reviews.

C.

Review whistleblower reports of noncompliance.

D.

Monitor user software download activity.

Buy Now
Questions 29

A user has contacted the risk practitioner regarding malware spreading laterally across the organization's corporate network. Which of the following is the risk practitioner’s BEST course of action?

Options:

A.

Review all log files generated during the period of malicious activity.

B.

Perform a root cause analysis.

C.

Notify the cybersecurity incident response team.

D.

Update the risk register.

Buy Now
Questions 30

An organization that has been the subject of multiple social engineering attacks is developing a risk awareness program. The PRIMARY goal of this program should be to:

Options:

A.

reduce the risk to an acceptable level.

B.

communicate the consequences for violations.

C.

implement industry best practices.

D.

reduce the organization's risk appetite

Buy Now
Questions 31

Which of the following statements in an organization's current risk profile report is cause for further action by senior management?

Options:

A.

Key performance indicator (KPI) trend data is incomplete.

B.

New key risk indicators (KRIs) have been established.

C.

Key performance indicators (KPIs) are outside of targets.

D.

Key risk indicators (KRIs) are lagging.

Buy Now
Questions 32

Who is ULTIMATELY accountable for risk treatment?

Options:

A.

Risk owner

B.

Enterprise risk management (ERM)

C.

Risk practitioner

D.

Control owner

Buy Now
Questions 33

Options:

A.

Average time to contain security incidents

B.

Percentage of systems being monitored

C.

Number of false positives reported

D.

Number of personnel dedicated to security monitoring

Buy Now
Questions 34

Which of the following is the BEST method to maintain a common view of IT risk within an organization?

Options:

A.

Collecting data for IT risk assessment

B.

Establishing and communicating the IT risk profile

C.

Utilizing a balanced scorecard

D.

Performing and publishing an IT risk analysis

Buy Now
Questions 35

Which of the following would be MOST helpful to an information security management team when allocating resources to mitigate exposures?

Options:

A.

Relevant risk case studies

B.

Internal audit findings

C.

Risk assessment results

D.

Penetration testing results

Buy Now
Questions 36

Which of the following BEST describes the role of the IT risk profile in strategic IT-related decisions?

Options:

A.

It compares performance levels of IT assets to value delivered.

B.

It facilitates the alignment of strategic IT objectives to business objectives.

C.

It provides input to business managers when preparing a business case for new IT projects.

D.

It helps assess the effects of IT decisions on risk exposure

Buy Now
Questions 37

Which of the following provides the MOST useful information when developing a risk profile for management approval?

Options:

A.

Residual risk and risk appetite

B.

Strength of detective and preventative controls

C.

Effectiveness and efficiency of controls

D.

Inherent risk and risk tolerance

Buy Now
Questions 38

Which of the following is of GREATEST concern when uncontrolled changes are made to the control environment?

Options:

A.

A decrease in control layering effectiveness

B.

An increase in inherent risk

C.

An increase in control vulnerabilities

D.

An increase in the level of residual risk

Buy Now
Questions 39

A PRIMARY advantage of involving business management in evaluating and managing risk is that management:

Options:

A.

better understands the system architecture.

B.

is more objective than risk management.

C.

can balance technical and business risk.

D.

can make better-informed business decisions.

Buy Now
Questions 40

Winch of the following key control indicators (KCIs) BEST indicates whether security requirements are identified and managed throughout a project He cycle?

Options:

A.

Number of projects going live without a security review

B.

Number of employees completing project-specific security training

C.

Number of security projects started in core departments

D.

Number of security-related status reports submitted by project managers

Buy Now
Questions 41

Which of the following provides the MOST useful input to the development of realistic risk scenarios?

Options:

A.

Balanced scorecard

B.

Risk appetite

C.

Risk map

D.

Risk events

Buy Now
Questions 42

After mapping generic risk scenarios to organizational security policies, the NEXT course of action should be to:

Options:

A.

record risk scenarios in the risk register for analysis.

B.

validate the risk scenarios for business applicability.

C.

reduce the number of risk scenarios to a manageable set.

D.

perform a risk analysis on the risk scenarios.

Buy Now
Questions 43

Which of the following is the PRIMARY benefit of using a risk map with stakeholders?

Options:

A.

Consolidates risk response options by severity

B.

Aligns risk appetite with business objectives

C.

Correlates risk scenarios to risk appetite

D.

Defines an organizational risk taxonomy

Buy Now
Questions 44

The BEST metric to demonstrate that servers are configured securely is the total number of servers:

Options:

A.

exceeding availability thresholds

B.

experiencing hardware failures

C.

exceeding current patching standards.

D.

meeting the baseline for hardening.

Buy Now
Questions 45

Which of the following is the BEST evidence that risk management is driving business decisions in an organization?

Options:

A.

Compliance breaches are addressed in a timely manner.

B.

Risk ownership is identified and assigned.

C.

Risk treatment options receive adequate funding.

D.

Residual risk is within risk tolerance.

Buy Now
Questions 46

Which of the following is the BEST approach for selecting controls to minimize risk?

Options:

A.

Industry best practice review

B.

Risk assessment

C.

Cost-benefit analysis

D.

Control-effectiveness evaluation

Buy Now
Questions 47

Reviewing which of the following would provide the MOST useful information when preparing to evaluate the effectiveness of existing controls?

Options:

A.

Previous audit reports

B.

Control objectives

C.

Risk responses in the risk register

D.

Changes in risk profiles

Buy Now
Questions 48

Which of the following, who should be PRIMARILY responsible for performing user entitlement reviews?

Options:

A.

IT security manager

B.

IT personnel

C.

Data custodian

D.

Data owner

Buy Now
Questions 49

Which of the following is the MOST important reason to link an effective key control indicator (KCI) to relevant key risk indicators (KRIs)?

Options:

A.

To monitor changes in the risk environment

B.

To provide input to management for the adjustment of risk appetite

C.

To monitor the accuracy of threshold levels in metrics

D.

To obtain business buy-in for investment in risk mitigation measures

Buy Now
Questions 50

An organization is concerned that its employees may be unintentionally disclosing data through the use of social media sites. Which of the following will MOST effectively mitigate tins risk?

Options:

A.

Requiring the use of virtual private networks (VPNs)

B.

Establishing a data classification policy

C.

Conducting user awareness training

D.

Requiring employee agreement of the acceptable use policy

Buy Now
Questions 51

Which of the following factors will have the GREATEST impact on the implementation of a risk mitigation strategy for an organization?

Options:

A.

Cost-benefit analysis

B.

Risk tolerance

C.

Known vulnerabilities

D.

Cyber insurance

Buy Now
Questions 52

Which of the following BEST balances the costs and benefits of managing IT risk*?

Options:

A.

Prioritizing and addressing risk in line with risk appetite. Eliminating risk through preventive and detective controls

B.

Considering risk that can be shared with a third party

C.

Evaluating the probability and impact of risk scenarios

Buy Now
Questions 53

Which of the following approaches will BEST help to ensure the effectiveness of risk awareness training?

Options:

A.

Piloting courses with focus groups

B.

Using reputable third-party training programs

C.

Reviewing content with senior management

D.

Creating modules for targeted audiences

Buy Now
Questions 54

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a vulnerability management process?

Options:

A.

Percentage of vulnerabilities remediated within the agreed service level

B.

Number of vulnerabilities identified during the period

C.

Number of vulnerabilities re-opened during the period

D.

Percentage of vulnerabilities escalated to senior management

Buy Now
Questions 55

A risk practitioner is organizing a training session lo communicate risk assessment methodologies to ensure a consistent risk view within the organization Which of the following i< the MOST important topic to cover in this training?

Options:

A.

Applying risk appetite

B.

Applying risk factors

C.

Referencing risk event data

D.

Understanding risk culture

Buy Now
Questions 56

Options:

A.

Accept the residual risk due to the low likelihood of occurrence.

B.

Implement additional mitigation measures.

C.

Determine whether residual risk is within risk appetite.

D.

Adopt a new risk assessment method to avoid the residual risk.

Buy Now
Questions 57

Vulnerabilities have been detected on an organization's systems. Applications installed on these systems will not operate if the underlying servers are updated. Which of the following is the risk practitioner's BEST course of action?

Options:

A.

Recommend the business change the application.

B.

Recommend a risk treatment plan.

C.

Include the risk in the next quarterly update to management.

D.

Implement compensating controls.

Buy Now
Questions 58

Which of the following is a risk practitioner's BEST recommendation upon learning that an employee inadvertently disclosed sensitive data to a vendor?

Options:

A.

Enroll the employee in additional security training.

B.

Invoke the incident response plan.

C.

Conduct an internal audit.

D.

Instruct the vendor to delete the data.

Buy Now
Questions 59

Which of the following is the MOST important update for keeping the risk register current?

Options:

A.

Modifying organizational structures when lines of business merge

B.

Adding new risk assessment results annually

C.

Retiring risk scenarios that have been avoided

D.

Changing risk owners due to employee turnover

Buy Now
Questions 60

A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?

Options:

A.

The team that performed the risk assessment

B.

An assigned risk manager to provide oversight

C.

Action plans to address risk scenarios requiring treatment

D.

The methodology used to perform the risk assessment

Buy Now
Questions 61

Which of the following is MOST helpful in identifying loss magnitude during risk analysis of a new system?

Options:

A.

Recovery time objective (RTO)

B.

Cost-benefit analysis

C.

Business impact analysis (BIA)

D.

Cyber insurance coverage

Buy Now
Questions 62

An organization's IT department wants to complete a proof of concept (POC) for a security tool. The project lead has asked for approval to use the production data for testing purposes as it will yield the best results. Which of the following is the risk practitioner's BEST recommendation?

Options:

A.

Accept the risk of using the production data to ensure accurate results.

B.

Assess the risk of using production data for testing before making a decision.

C.

Benchmark against what peer organizations are doing with POC testing environments.

D.

Deny the request, as production data should not be used for testing purposes.

Buy Now
Questions 63

Which of the following is the PRIMARY reason for an organization to include an acceptable use banner when users log in?

Options:

A.

To reduce the likelihood of insider threat

B.

To eliminate the possibility of insider threat

C.

To enable rapid discovery of insider threat

D.

To reduce the impact of insider threat

Buy Now
Questions 64

An organization's business gap analysis reveals the need for a robust IT risk strategy. Which of the following should be the risk practitioner's PRIMARY consideration when participating in development of the new strategy?

Options:

A.

Scale of technology

B.

Risk indicators

C.

Risk culture

D.

Proposed risk budget

Buy Now
Questions 65

Who is ULTIMATELY accountable for the confidentiality of data in the event of a data breach within a Software as a Service (SaaS) environment?

Options:

A.

Vendor's information security officer

B.

Customer's data privacy officer

C.

Customer's data owner

D.

Vendor's application owner

Buy Now
Questions 66

A risk practitioner has recently become aware of unauthorized use of confidential personal information within the organization. Which of the following should the risk practitioner do FIRST?

Options:

A.

Establish database activity monitoring

B.

Report the incident to the chief privacy officer (CPO)

C.

Invoke the incident response plan

D.

Escalate the issue to the data owner

Buy Now
Questions 67

Which of the following is MOST important for a risk practitioner to verify when evaluating the effectiveness of an organization's existing controls?

Options:

A.

Senior management has approved the control design.

B.

Inherent risk has been reduced from original levels.

C.

Residual risk remains within acceptable levels.

D.

Costs for control maintenance are reasonable.

Buy Now
Questions 68

Which of the following should be the FIRST consideration when a business unit wants to use personal information for a purpose other than for which it was originally collected?

Options:

A.

Informed consent

B.

Cross border controls

C.

Business impact analysis (BIA)

D.

Data breach protection

Buy Now
Questions 69

A global company s business continuity plan (BCP) requires the transfer of its customer information….

event of a disaster. Which of the following should be the MOST important risk consideration?

Options:

A.

The difference In the management practices between each company

B.

The cloud computing environment is shared with another company

C.

The lack of a service level agreement (SLA) in the vendor contract

D.

The organizational culture differences between each country

Buy Now
Questions 70

Which of the following BEST facilitates the process of documenting risk tolerance?

Options:

A.

Creating a risk register

B.

Interviewing management

C.

Conducting a risk assessment

D.

Researching industry standards

Buy Now
Questions 71

Which of the following is the BEST indication of an enhanced risk-aware culture?

Options:

A.

Users have read and agreed to comply with security policies.

B.

Risk issues are openly discussed within the organization.

C.

Scores have improved on risk awareness quizzes.

D.

There is a decrease in the number of reported incidents.

Buy Now
Questions 72

Which of the following would present the GREATEST challenge when assigning accountability for control ownership?

Options:

A.

Weak governance structures

B.

Senior management scrutiny

C.

Complex regulatory environment

D.

Unclear reporting relationships

Buy Now
Questions 73

An IT department has provided a shared drive for personnel to store information to which all employees have access. Which of the following parties is accountable for the risk of potential loss of confidential information?

Options:

A.

Risk manager

B.

Data owner

C.

End user

D.

IT department

Buy Now
Questions 74

An organization recently experienced a cyber attack that resulted in the loss of confidential customer data. Which of the following is the risk practitioner's BEST recommendation after recovery steps have been completed?

Options:

A.

Develop new key risk indicators (KRIs).

B.

Perform a root cause analysis.

C.

Recommend the purchase of cyber insurance.

D.

Review the incident response plan.

Buy Now
Questions 75

Which of the following is the BEST indicator of the effectiveness of a control action plan's implementation?

Options:

A.

Increased number of controls

B.

Reduced risk level

C.

Increased risk appetite

D.

Stakeholder commitment

Buy Now
Questions 76

Which of the following is the MOST critical consideration when awarding a project to a third-party service provider whose servers are located offshore?

Options:

A.

Difficulty of monitoring compliance due to geographical distance

B.

Cost implications due to installation of network intrusion detection systems (IDSs)

C.

Delays in incident communication

D.

Potential impact on data governance

Buy Now
Questions 77

Which of the following methods would BEST contribute to identifying obscure risk scenarios?

Options:

A.

Brainstorming sessions

B.

Control self-assessments

C.

Vulnerability analysis

D.

Monte Carlo analysis

Buy Now
Questions 78

Which of the following is MOST effective against external threats to an organizations confidential information?

Options:

A.

Single sign-on

B.

Data integrity checking

C.

Strong authentication

D.

Intrusion detection system

Buy Now
Questions 79

Of the following, who is responsible for approval when a change in an application system is ready for release to production?

Options:

A.

Information security officer

B.

IT risk manager

C.

Business owner

D.

Chief risk officer (CRO)

Buy Now
Questions 80

Which of the following is the PRIMARY reason to update a risk register with risk assessment results?

Options:

A.

To communicate the level and priority of assessed risk to management

B.

To provide a comprehensive inventory of risk across the organization

C.

To assign a risk owner to manage the risk

D.

To enable the creation of action plans to address nsk

Buy Now
Questions 81

An organization is considering modifying its system to enable acceptance of credit card payments. To reduce the risk of data exposure, which of the following should the organization do FIRST?

Options:

A.

Conduct a risk assessment.

B.

Update the security strategy.

C.

Implement additional controls.

D.

Update the risk register.

Buy Now
Questions 82

The PRIMARY reason for establishing various Threshold levels for a set of key risk indicators (KRIs) is to:

Options:

A.

highlight trends of developing risk.

B.

ensure accurate and reliable monitoring.

C.

take appropriate actions in a timely manner.

D.

set different triggers for each stakeholder.

Buy Now
Questions 83

Which of the following will BEST quantify the risk associated with malicious users in an organization?

Options:

A.

Business impact analysis

B.

Risk analysis

C.

Threat risk assessment

D.

Vulnerability assessment

Buy Now
Questions 84

Which of the following would BEST help minimize the risk associated with social engineering threats?

Options:

A.

Enforcing employees’ sanctions

B.

Conducting phishing exercises

C.

Enforcing segregation of dunes

D.

Reviewing the organization's risk appetite

Buy Now
Questions 85

A risk practitioner shares the results of a vulnerability assessment for a critical business application with the business manager. Which of the following is the NEXT step?

Options:

A.

Develop a risk action plan to address the findings.

B.

Evaluate the impact of the vulnerabilities to the business application.

C.

Escalate the findings to senior management and internal audit.

D.

Conduct a penetration test to validate the vulnerabilities from the findings.

Buy Now
Questions 86

Which of the following BEST enables the risk profile to serve as an effective resource to support business objectives?

Options:

A.

Engaging external risk professionals to periodically review the risk

B.

Prioritizing global standards over local requirements in the risk profile

C.

Updating the risk profile with risk assessment results

D.

Assigning quantitative values to qualitative metrics in the risk register

Buy Now
Questions 87

Which of the following would provide the MOST comprehensive information for communicating current levels of IT-related risk to executive management?

Options:

A.

Risk register

B.

Risk appetite

C.

Risk dashboard

D.

Risk action plans

Buy Now
Questions 88

Which of the following scenarios is MOST important to communicate to senior management?

Options:

A.

Accepted risk scenarios with detailed plans for monitoring

B.

Risk scenarios that have been shared with vendors and third parties

C.

Accepted risk scenarios with impact exceeding the risk tolerance

D.

Risk scenarios that have been identified, assessed, and responded to by the risk owners

Buy Now
Questions 89

Reviewing which of the following BEST helps an organization gain insight into its overall risk profile?

Options:

A.

Threat landscape

B.

Risk appetite

C.

Risk register

D.

Risk metrics

Buy Now
Questions 90

Continuous monitoring of key risk indicators (KRIs) will:

Options:

A.

ensure that risk will not exceed the defined risk appetite of the organization.

B.

provide an early warning so that proactive action can be taken.

C.

provide a snapshot of the risk profile.

D.

ensure that risk tolerance and risk appetite are aligned.

Buy Now
Questions 91

A risk practitioner has been asked to evaluate the adoption of a third-party blockchain integration platform based on the value added by the platform and the organization's risk appetite. Which of the following is the risk practitioner's BEST course of action?

Options:

A.

Conduct a risk assessment with stakeholders.

B.

Conduct third-party resilience tests.

C.

Update the risk register with the process changes.

D.

Review risk related to standards and regulations.

Buy Now
Questions 92

A risk practitioner is reporting on an increasing trend of ransomware attacks in the industry. Which of the following information is MOST important to include to enable an informed response decision by key stakeholders?

Options:

A.

Methods of attack progression

B.

Losses incurred by industry peers

C.

Most recent antivirus scan reports

D.

Potential impact of events

Buy Now
Questions 93

Which of the following provides the BEST evidence that risk mitigation plans have been implemented effectively?

Options:

A.

Self-assessments by process owners

B.

Mitigation plan progress reports

C.

Risk owner attestation

D.

Change in the level of residual risk

Buy Now
Questions 94

Which of the following would BEST help an enterprise prioritize risk scenarios?

Options:

A.

Industry best practices

B.

Placement on the risk map

C.

Degree of variances in the risk

D.

Cost of risk mitigation

Buy Now
Questions 95

Which of the following should be determined FIRST when a new security vulnerability is made public?

Options:

A.

Whether the affected technology is used within the organization

B.

Whether the affected technology is Internet-facing

C.

What mitigating controls are currently in place

D.

How pervasive the vulnerability is within the organization

Buy Now
Questions 96

Which of the following should be an element of the risk appetite of an organization?

Options:

A.

The effectiveness of compensating controls

B.

The enterprise's capacity to absorb loss

C.

The residual risk affected by preventive controls

D.

The amount of inherent risk considered appropriate

Buy Now
Questions 97

An organization has outsourced its billing function to an external service provider. Who should own the risk of customer data leakage caused by the service provider?

Options:

A.

The service provider

B.

Vendor risk manager

C.

Legal counsel

D.

Business process owner

Buy Now
Questions 98

An organization has updated its acceptable use policy to mitigate the risk of employees disclosing confidential information. Which of the following is the BEST way to reinforce the effectiveness of this policy?

Options:

A.

Communicate sanctions for policy violations to all staff.

B.

Obtain signed acceptance of the new policy from employees.

C.

Train all staff on relevant information security best practices.

D.

Implement data loss prevention (DLP) within the corporate network.

Buy Now
Questions 99

Which of the following would be a risk practitioner's GREATEST concern with the use of a vulnerability scanning tool?

Options:

A.

Increased time to remediate vulnerabilities

B.

Inaccurate reporting of results

C.

Increased number of vulnerabilities

D.

Network performance degradation

Buy Now
Questions 100

An organization has committed to a business initiative with the knowledge that the risk exposure is higher than the risk appetite. Which of the following is the risk practitioner's MOST important action related to this decision?

Options:

A.

Recommend rejection of the initiative.

B.

Change the level of risk appetite.

C.

Document formal acceptance of the risk.

D.

Initiate a reassessment of the risk.

Buy Now
Questions 101

Which of the following is the GREATEST benefit of using IT risk scenarios?

Options:

A.

They support compliance with regulations.

B.

They provide evidence of risk assessment.

C.

They facilitate communication of risk.

D.

They enable the use of key risk indicators (KRls)

Buy Now
Questions 102

The MAIN reason for prioritizing IT risk responses is to enable an organization to:

Options:

A.

determine the risk appetite.

B.

determine the budget.

C.

define key performance indicators (KPIs).

D.

optimize resource utilization.

Buy Now
Questions 103

An organization is considering allowing users to access company data from their personal devices. Which of the following is the MOST important factor when assessing the risk?

Options:

A.

Classification of the data

B.

Type of device

C.

Remote management capabilities

D.

Volume of data

Buy Now
Questions 104

An organization control environment is MOST effective when:

Options:

A.

control designs are reviewed periodically

B.

controls perform as intended.

C.

controls are implemented consistently.

D.

controls operate efficiently

Buy Now
Questions 105

Which of the following is MOST important to have in place to ensure the effectiveness of risk and security metrics reporting?

Options:

A.

Organizational reporting process

B.

Incident reporting procedures

C.

Regularly scheduled audits

D.

Incident management policy

Buy Now
Questions 106

Which of the following is the MAIN benefit to an organization using key risk indicators (KRIs)?

Options:

A.

KRIs provide an early warning that a risk threshold is about to be reached.

B.

KRIs signal that a change in the control environment has occurred.

C.

KRIs provide a basis to set the risk appetite for an organization.

D.

KRIs assist in the preparation of the organization's risk profile.

Buy Now
Questions 107

Which of the following is a risk practitioner's BEST course of action upon learning that a control under internal review may no longer be necessary?

Options:

A.

Obtain approval to retire the control.

B.

Update the status of the control as obsolete.

C.

Consult the internal auditor for a second opinion.

D.

Verify the effectiveness of the original mitigation plan.

Buy Now
Questions 108

Which of the following is the BEST recommendation to address recent IT risk trends that indicate social engineering attempts are increasing in the organization?

Options:

A.

Conduct a simulated phishing attack.

B.

Update spam filters

C.

Revise the acceptable use policy

D.

Strengthen disciplinary procedures

Buy Now
Questions 109

The PRIMARY reason for periodically monitoring key risk indicators (KRIs) is to:

Options:

A.

rectify errors in results of KRIs.

B.

detect changes in the risk profile.

C.

reduce costs of risk mitigation controls.

D.

continually improve risk assessments.

Buy Now
Questions 110

A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?

Options:

A.

The methodology used to perform the risk assessment

B.

Action plans to address risk scenarios requiring treatment

C.

Date and status of the last project milestone

D.

The individuals assigned ownership of controls

Buy Now
Questions 111

Which of the following is the MOST important consideration when multiple risk practitioners capture risk scenarios in a single risk register?

Options:

A.

Aligning risk ownership and control ownership

B.

Developing risk escalation and reporting procedures

C.

Maintaining up-to-date risk treatment plans

D.

Using a consistent method for risk assessment

Buy Now
Questions 112

Which of the following BEST facilities the alignment of IT risk management with enterprise risk management (ERM)?

Options:

A.

Adopting qualitative enterprise risk assessment methods

B.

Linking IT risk scenarios to technology objectives

C.

linking IT risk scenarios to enterprise strategy

D.

Adopting quantitative enterprise risk assessment methods

Buy Now
Questions 113

Which of the following is MOST helpful in defining an early-warning threshold associated with insufficient network bandwidth’’?

Options:

A.

Average bandwidth usage

B.

Peak bandwidth usage

C.

Total bandwidth usage

D.

Bandwidth used during business hours

Buy Now
Questions 114

An organization is considering adopting artificial intelligence (AI). Which of the

following is the risk practitioner's MOST important course of action?

Options:

A.

Develop key risk indicators (KRIs).

B.

Ensure sufficient pre-implementation testing.

C.

Identify applicable risk scenarios.

D.

Identify the organization's critical data.

Buy Now
Questions 115

An effective control environment is BEST indicated by controls that:

Options:

A.

minimize senior management's risk tolerance.

B.

manage risk within the organization's risk appetite.

C.

reduce the thresholds of key risk indicators (KRIs).

D.

are cost-effective to implement

Buy Now
Questions 116

While evaluating control costs, management discovers that the annual cost exceeds the annual loss expectancy (ALE) of the risk. This indicates the:

Options:

A.

control is ineffective and should be strengthened

B.

risk is inefficiently controlled.

C.

risk is efficiently controlled.

D.

control is weak and should be removed.

Buy Now
Questions 117

The PRIMARY reason a risk practitioner would be interested in an internal audit report is to:

Options:

A.

plan awareness programs for business managers.

B.

evaluate maturity of the risk management process.

C.

assist in the development of a risk profile.

D.

maintain a risk register based on noncompliance.

Buy Now
Questions 118

During the initial risk identification process for a business application, it is MOST important to include which of the following stakeholders?

Options:

A.

Business process owners

B.

Business process consumers

C.

Application architecture team

D.

Internal audit

Buy Now
Questions 119

An organization has identified a risk exposure due to weak technical controls in a newly implemented HR system. The risk practitioner is documenting the risk in the risk register. The risk should be owned by the:

Options:

A.

chief risk officer.

B.

project manager.

C.

chief information officer.

D.

business process owner.

Buy Now
Questions 120

Which of the following BEST indicates that an organizations risk management program is effective?

Options:

A.

Fewer security incidents have been reported.

B.

The number of audit findings has decreased.

C.

Residual risk is reduced.

D.

inherent risk Is unchanged.

Buy Now
Questions 121

Senior leadership has set guidelines for the integration of a new acquisition. The guidelines allow for a variation in the level of risk-taking. The variation indicates which of the following risk management concepts?

Options:

A.

Risk tolerance

B.

Risk appetite

C.

Risk sensitivity

D.

Risk velocity

Buy Now
Questions 122

Which group has PRIMARY ownership of reputational risk stemming from unethical behavior within the organization?

Options:

A.

Board of directors

B.

Human resources (HR)

C.

Risk management committee

D.

Audit committee

Buy Now
Questions 123

Which of the following will be MOST effective to mitigate the risk associated with the loss of company data stored on personal devices?

Options:

A.

An acceptable use policy for personal devices

B.

Required user log-on before synchronizing data

C.

Enforced authentication and data encryption

D.

Security awareness training and testing

Buy Now
Questions 124

An organizations chief technology officer (CTO) has decided to accept the risk associated with the potential loss from a denial-of-service (DoS) attack. In this situation, the risk practitioner's BEST course of action is to:

Options:

A.

identify key risk indicators (KRls) for ongoing monitoring

B.

validate the CTO's decision with the business process owner

C.

update the risk register with the selected risk response

D.

recommend that the CTO revisit the risk acceptance decision.

Buy Now
Questions 125

To enable effective risk governance, it is MOST important for senior management to:

Options:

A.

Ensure the IT governance framework is up to date.

B.

Communicate the risk management strategy across the organization.

C.

Gain a clear understanding of business risk and related ownership.

D.

Ensure security policies and procedures are documented.

Buy Now
Questions 126

Which of the following s MOST likely to deter an employee from engaging in inappropriate use of company owned IT systems?

Options:

A.

A centralized computer security response team

B.

Regular performance reviews and management check-ins

C.

Code of ethics training for all employees

D.

Communication of employee activity monitoring

Buy Now
Questions 127

Options:

A.

Key performance indicators (KPIs)

B.

Key risk indicator (KRI) thresholds

C.

Risk trends

D.

Risk objectives

Buy Now
Questions 128

Which of the following elements of a risk register is MOST likely to change as a result of change in management's risk appetite?

Options:

A.

Key risk indicator (KRI) thresholds

B.

Inherent risk

C.

Risk likelihood and impact

D.

Risk velocity

Buy Now
Questions 129

Which of the following is the PRIMARY risk management responsibility of the second line of defense?

Options:

A.

Monitoring risk responses

B.

Applying risk treatments

C.

Providing assurance of control effectiveness

D.

Implementing internal controls

Buy Now
Questions 130

A risk practitioner learns that a risk owner has been accepting gifts from a supplier of IT products. Some of these IT products are used to implement controls and to mitigate risk to acceptable levels. Which of the following should the risk practitioner do FIRST?

Options:

A.

Initiate disciplinary action against the risk owner.

B.

Reassess the risk and review the underlying controls.

C.

Review organizational ethics policies.

D.

Report the activity to the supervisor.

Buy Now
Questions 131

A control owner has completed a year-long project To strengthen existing controls. It is MOST important for the risk practitioner to:

Options:

A.

update the risk register to reflect the correct level of residual risk.

B.

ensure risk monitoring for the project is initiated.

C.

conduct and document a business impact analysis (BIA).

D.

verify cost-benefit of the new controls being implemented.

Buy Now
Questions 132

Several newly identified risk scenarios are being integrated into an organization's risk register. The MOST appropriate risk owner would be the individual who:

Options:

A.

is in charge of information security.

B.

is responsible for enterprise risk management (ERM)

C.

can implement remediation action plans.

D.

is accountable for loss if the risk materializes.

Buy Now
Questions 133

Which of the following stakeholders are typically included as part of a line of defense within the three lines of defense model?

Options:

A.

Board of directors

B.

Vendors

C.

Regulators

D.

Legal team

Buy Now
Questions 134

Which of the following is the PRIMARY benefit when senior management periodically reviews and updates risk appetite and tolerance levels?

Options:

A.

It ensures compliance with the risk management framework.

B.

It ensures an effective risk aggregation process.

C.

It ensures decisions are risk-informed.

D.

It ensures a consistent approach for risk assessments.

Buy Now
Questions 135

Which of the following BEST enables an organization to determine whether risk management is aligned with its goals and objectives?

Options:

A.

The organization has approved policies that provide operational boundaries.

B.

Organizational controls are in place to effectively manage risk appetite.

C.

Environmental changes that impact risk are continually evaluated.

D.

The organization has an approved enterprise architecture (EA) program.

Buy Now
Questions 136

Which of the following is the GREATEST concern associated with insufficient focus on addressing blockchain interoperability in the SDLC?

Options:

A.

Limited blockchain adoption and support

B.

Reduced transaction speed and system responsiveness

C.

Reduced network integrity and availability

D.

Limited integration with external systems and blockchains

Buy Now
Questions 137

Which of the following is the ULTIMATE goal of conducting a privacy impact analysis (PIA)?

Options:

A.

To identify gaps in data protection controls

B.

To develop a customer notification plan

C.

To identify personally identifiable information (Pll)

D.

To determine gaps in data identification processes

Buy Now
Questions 138

Which of the following is the BEST recommendation of a risk practitioner for an organization that recently changed its organizational structure?

Options:

A.

Communicate the new risk profile.

B.

Implement a new risk assessment process.

C.

Revalidate the corporate risk appetite.

D.

Review and adjust key risk indicators (KRIs).

Buy Now
Questions 139

From a risk management perspective, the PRIMARY objective of using maturity models is to enable:

Options:

A.

solution delivery.

B.

resource utilization.

C.

strategic alignment.

D.

performance evaluation.

Buy Now
Questions 140

A risk practitioner has been asked by executives to explain how existing risk treatment plans would affect risk posture at the end of the year. Which of the following is MOST helpful in responding to this request?

Options:

A.

Assessing risk with no controls in place

B.

Showing projected residual risk

C.

Providing peer benchmarking results

D.

Assessing risk with current controls in place

Buy Now
Questions 141

When developing a response plan to address security incidents regarding sensitive data loss, it is MOST important

Options:

A.

revalidate current key risk indicators (KRIs).

B.

revise risk management procedures.

C.

review the data classification policy.

D.

revalidate existing risk scenarios.

Buy Now
Questions 142

The PRIMARY benefit of conducting continuous monitoring of access controls is the ability to identify:

Options:

A.

inconsistencies between security policies and procedures

B.

possible noncompliant activities that lead to data disclosure

C.

leading or lagging key risk indicators (KRIs)

D.

unknown threats to undermine existing access controls

Buy Now
Questions 143

An online payment processor would be severely impacted if the fraud detection system has an outage. Which of the following is the BEST way to address this risk?

Options:

A.

Implement continuous control monitoring.

B.

Communicate the risk to management.

C.

Introduce recovery control procedures.

D.

Document a risk response plan.

Buy Now
Questions 144

Which of the following is the BEST metric to demonstrate the effectiveness of an organization's patch management process?

Options:

A.

Average time to implement patches after vendor release

B.

Number of patches tested prior to deployment

C.

Increase in the frequency of patches deployed into production

D.

Percent of patches implemented within established timeframe

Buy Now
Questions 145

Which of the following is MOST important to the effective monitoring of key risk indicators (KRIS)?

Options:

A.

Updating the threat inventory with new threats

B.

Automating log data analysis

C.

Preventing the generation of false alerts

D.

Determining threshold levels

Buy Now
Questions 146

A control owner responsible for the access management process has developed a machine learning model to automatically identify excessive access privileges. What is the risk practitioner's BEST course of action?

Options:

A.

Review the design of the machine learning model against control objectives.

B.

Adopt the machine learning model as a replacement for current manual access reviews.

C.

Ensure the model assists in meeting regulatory requirements for access controls.

D.

Discourage the use of emerging technologies in key processes.

Buy Now
Questions 147

Which of the following would be a risk practitioner'$ BEST recommendation to help ensure cyber risk is assessed and reflected in the enterprise-level risk profile?

Options:

A.

Manage cyber risk according to the organization's risk management framework.

B.

Define cyber roles and responsibilities across the organization

C.

Conduct cyber risk awareness training tailored specifically for senior management

D.

Implement a cyber risk program based on industry best practices

Buy Now
Questions 148

An organization is implementing Zero Trust architecture to improve its security posture. Which of the following is the MOST important input to develop the architecture?

Options:

A.

Cloud services risk assessments

B.

The organization's threat model

C.

Access control logs

D.

Multi-factor authentication (MFA) architecture

Buy Now
Questions 149

Which of the blowing is MOST important when implementing an organization s security policy?

Options:

A.

Obtaining management support

B.

Benchmarking against industry standards

C.

Assessing compliance requirements

D.

Identifying threats and vulnerabilities

Buy Now
Questions 150

Which of the following should be the PRIMARY objective of a risk awareness training program?

Options:

A.

To enable risk-based decision making

B.

To promote awareness of the risk governance function

C.

To clarify fundamental risk management principles

D.

To ensure sufficient resources are available

Buy Now
Questions 151

Which of the following is the BEST evidence that a user account has been properly authorized?

Options:

A.

An email from the user accepting the account

B.

Notification from human resources that the account is active

C.

User privileges matching the request form

D.

Formal approval of the account by the user's manager

Buy Now
Questions 152

A multinational company needs to implement a new centralized security system. The risk practitioner has identified a conflict between the organization's data-handling policy and local privacy regulations. Which of the following would be the BEST recommendation?

Options:

A.

Request a policy exception from senior management.

B.

Comply with the organizational policy.

C.

Report the noncompliance to the local regulatory agency.

D.

Request an exception from the local regulatory agency.

Buy Now
Questions 153

Which of the following would BEST help to ensure that identified risk is efficiently managed?

Options:

A.

Reviewing the maturity of the control environment

B.

Regularly monitoring the project plan

C.

Maintaining a key risk indicator for each asset in the risk register

D.

Periodically reviewing controls per the risk treatment plan

Buy Now
Questions 154

Which of the following would be MOST helpful when estimating the likelihood of negative events?

Options:

A.

Business impact analysis

B.

Threat analysis

C.

Risk response analysis

D.

Cost-benefit analysis

Buy Now
Questions 155

Which of the following would be of MOST concern to a risk practitioner reviewing risk action plans for documented IT risk scenarios?

Options:

A.

Individuals outside IT are managing action plans for the risk scenarios.

B.

Target dates for completion are missing from some action plans.

C.

Senior management approved multiple changes to several action plans.

D.

Many action plans were discontinued after senior management accepted the risk.

Buy Now
Questions 156

Which risk response strategy could management apply to both positive and negative risk that has been identified?

Options:

A.

Transfer

B.

Accept

C.

Exploit

D.

Mitigate

Buy Now
Questions 157

Which of the following is the MOST important responsibility of a risk owner?

Options:

A.

Testing control design

B.

Accepting residual risk

C.

Establishing business information criteria

D.

Establishing the risk register

Buy Now
Questions 158

Which of the following describes the relationship between risk appetite and risk tolerance?

Options:

A.

Risk appetite is completely independent of risk tolerance.

B.

Risk tolerance is used to determine risk appetite.

C.

Risk appetite and risk tolerance are synonymous.

D.

Risk tolerance may exceed risk appetite.

Buy Now
Questions 159

An organization is reviewing a contract for a Software as a Service (SaaS) sales application with a 99.9% uptime service level agreement (SLA). Which of the following BEST describes ownership of availability risk?

Options:

A.

The risk is shared by both organizations.

B.

The liability for the risk is owned by the cloud provider.

C.

The risk is transferred to the cloud provider.

D.

The liability for the risk is owned by the sales department.

Buy Now
Questions 160

When determining which control deficiencies are most significant, which of the following would provide the MOST useful information?

Options:

A.

Risk analysis results

B.

Exception handling policy

C.

Vulnerability assessment results

D.

Benchmarking assessments

Buy Now
Questions 161

The PRIMARY reason to implement a formalized risk taxonomy is to:

Options:

A.

reduce subjectivity in risk management.

B.

comply with regulatory requirements.

C.

demonstrate best industry practice.

D.

improve visibility of overall risk exposure.

Buy Now
Questions 162

The PRIMARY reason for a risk practitioner to review business processes is to:

Options:

A.

Benchmark against peer organizations.

B.

Identify appropriate controls within business processes.

C.

Assess compliance with global standards.

D.

Identify risk owners related to business processes.

Buy Now
Questions 163

An organization has experienced a cyber-attack that exposed customer personally identifiable information (Pll) and caused extended outages of network services. Which of the following stakeholders are MOST important to include in the cyber response team to determine response actions?

Options:

A.

Security control owners based on control failures

B.

Cyber risk remediation plan owners

C.

Risk owners based on risk impact

D.

Enterprise risk management (ERM) team

Buy Now
Questions 164

Which of the following is MOST helpful to facilitate the decision of recovery priorities in a disaster situation?

Options:

A.

Business Impact Analysis (BIA)

B.

Key Risk Indicators (KRIs)

C.

Recovery Point Objective (RPO)

D.

Risk Scenario Analysis

Buy Now
Questions 165

Which of the following is MOST important to add to the risk register for a remediated risk scenario?

Options:

A.

Notification to technical teams of implementation schedules

B.

Sign-off by senior executives

C.

Evidence of successfully implemented controls

D.

Minutes from control design meetings

Buy Now
Questions 166

Which of the following is MOST useful input when developing risk scenarios?

Options:

A.

Common attacks in other industries.

B.

Identification of risk events.

C.

Impact on critical assets.

D.

Probability of disruptive risk events.

Buy Now
Questions 167

Which of the following is the MOST important consideration when sharing risk management updates with executive management?

Options:

A.

Including trend analysis of risk metrics

B.

Using an aggregated view of organizational risk

C.

Relying on key risk indicator (KRI) data

D.

Ensuring relevance to organizational goals

Buy Now
Questions 168

Which element of an organization's risk register is MOST important to update following the commissioning of a new financial reporting system?

Options:

A.

Key risk indicators (KRIs)

B.

The owner of the financial reporting process

C.

The risk rating of affected financial processes

D.

The list of relevant financial controls

Buy Now
Questions 169

What is the PRIMARY benefit of risk monitoring?

Options:

A.

It reduces the number of audit findings.

B.

It provides statistical evidence of control efficiency.

C.

It facilitates risk-aware decision making.

D.

It facilitates communication of threat levels.

Buy Now
Questions 170

An organization is developing a risk universe to create a holistic view of its overall risk profile. Which of the following is the GREATEST barrier to achieving the initiative's objectives?

Options:

A.

Lack of cross-functional risk assessment workshops within the organization

B.

Lack of common understanding of the organization's risk culture

C.

Lack of quantitative methods to aggregate the total risk exposure

D.

Lack of an integrated risk management system to aggregate risk scenarios

Buy Now
Questions 171

An application owner has specified the acceptable downtime in the event of an incident to be much lower than the actual time required for the response team to recover the application. Which of the following should be the NEXT course of action?

Options:

A.

Invoke the disaster recovery plan during an incident.

B.

Prepare a cost-benefit analysis of alternatives available

C.

Implement redundant infrastructure for the application.

D.

Reduce the recovery time by strengthening the response team.

Buy Now
Questions 172

Effective risk communication BEST benefits an organization by:

Options:

A.

helping personnel make better-informed decisions

B.

assisting the development of a risk register.

C.

improving the effectiveness of IT controls.

D.

increasing participation in the risk assessment process.

Buy Now
Questions 173

Which of the following is the MOST important reason to create risk scenarios?

Options:

A.

To assist with risk identification

B.

To determine risk tolerance

C.

To determine risk appetite

D.

To assist in the development of risk responses

Buy Now
Questions 174

What is the MAIN benefit of using a top-down approach to develop risk scenarios?

Options:

A.

It describes risk events specific to technology used by the enterprise.

B.

It establishes the relationship between risk events and organizational objectives.

C.

It uses hypothetical and generic risk events specific to the enterprise.

D.

It helps management and the risk practitioner to refine risk scenarios.

Buy Now
Questions 175

The PRIMARY focus of an ongoing risk awareness program should be to:

Options:

A.

enable better risk-based decisions.

B.

define appropriate controls to mitigate risk.

C.

determine impact of risk scenarios.

D.

expand understanding of risk indicators.

Buy Now
Questions 176

Which of the following criteria is MOST important when developing a response to an attack that would compromise data?

Options:

A.

The recovery time objective (RTO)

B.

The likelihood of a recurring attack

C.

The organization's risk tolerance

D.

The business significance of the information

Buy Now
Questions 177

Which of the following is MOST important to promoting a risk-aware culture?

Options:

A.

Regular testing of risk controls

B.

Communication of audit findings

C.

Procedures for security monitoring

D.

Open communication of risk reporting

Buy Now
Questions 178

An organization has initiated a project to implement an IT risk management program for the first time. The BEST time for the risk practitioner to start populating the risk register is when:

Options:

A.

identifying risk scenarios.

B.

determining the risk strategy.

C.

calculating impact and likelihood.

D.

completing the controls catalog.

Buy Now
Questions 179

An organization has determined a risk scenario is outside the defined risk tolerance level. What should be the NEXT course of action?

Options:

A.

Develop a compensating control.

B.

Allocate remediation resources.

C.

Perform a cost-benefit analysis.

D.

Identify risk responses

Buy Now
Questions 180

A risk practitioner's BEST guidance to help an organization develop relevant risk scenarios is to ensure the scenarios are:

Options:

A.

Aligned with risk management capabilities.

B.

Based on industry trends.

C.

Related to probable events.

D.

Mapped to incident response plans.

Buy Now
Questions 181

Which of the following provides the MOST important information to facilitate a risk response decision?

Options:

A.

Audit findings

B.

Risk appetite

C.

Key risk indicators

D.

Industry best practices

Buy Now
Questions 182

Which of the following is MOST helpful to ensure effective security controls for a cloud service provider?

Options:

A.

A control self-assessment

B.

A third-party security assessment report

C.

Internal audit reports from the vendor

D.

Service level agreement monitoring

Buy Now
Questions 183

When using a third party to perform penetration testing, which of the following is the MOST important control to minimize operational impact?

Options:

A.

Perform a background check on the vendor.

B.

Require the vendor to sign a nondisclosure agreement.

C.

Require the vendor to have liability insurance.

D.

Clearly define the project scope

Buy Now
Questions 184

An organization's recovery team is attempting to recover critical data backups following a major flood in its data center. However, key team members do not know exactly what steps should be taken to address this crisis. Which of the following is the MOST likely cause of this situation?

Options:

A.

Failure to test the disaster recovery plan (DRP)

B.

Lack of well-documented business impact analysis (BIA)

C.

Lack of annual updates to the disaster recovery plan (DRP)

D.

Significant changes in management personnel

Buy Now
Questions 185

The PRIMARY benefit of conducting a risk workshop using a top-down approach instead of a bottom-up approach is the ability to:

Options:

A.

identify specific project risk.

B.

obtain a holistic view of IT strategy risk.

C.

understand risk associated with complex processes.

D.

incorporate subject matter expertise.

Buy Now
Questions 186

In addition to the risk register, what should a risk practitioner review to develop an understanding of the organization's risk profile?

Options:

A.

The control catalog

B.

The asset profile

C.

Business objectives

D.

Key risk indicators (KRls)

Buy Now
Questions 187

Which of the following is MOST helpful in developing key risk indicator (KRl) thresholds?

Options:

A.

Loss expectancy information

B.

Control performance predictions

C.

IT service level agreements (SLAs)

D.

Remediation activity progress

Buy Now
Questions 188

Which of the following is the MOST critical factor to consider when determining an organization's risk appetite?

Options:

A.

Fiscal management practices

B.

Business maturity

C.

Budget for implementing security

D.

Management culture

Buy Now
Questions 189

Which of the following is the MOST important consideration for effectively maintaining a risk register?

Options:

A.

An IT owner is assigned for each risk scenario.

B.

The register is updated frequently.

C.

The register is shared with executive management.

D.

Compensating controls are identified.

Buy Now
Questions 190

An organization's IT team has proposed the adoption of cloud computing as a cost-saving measure for the business. Which of the following should be of GREATEST concern to the risk practitioner?

Options:

A.

Due diligence for the recommended cloud vendor has not been performed.

B.

The business can introduce new Software as a Service (SaaS) solutions without IT approval.

C.

The maintenance of IT infrastructure has been outsourced to an Infrastructure as a Service (laaS) provider.

D.

Architecture responsibilities may not be clearly defined.

Buy Now
Questions 191

A control process has been implemented in response to a new regulatory requirement, but has significantly reduced productivity. Which of the following is the BEST way to resolve this concern?

Options:

A.

Absorb the loss in productivity.

B.

Request a waiver to the requirements.

C.

Escalate the issue to senior management

D.

Remove the control to accommodate business objectives.

Buy Now
Questions 192

After a business unit implemented an Internet of Things (IoT) solution, the organization became aware of an emerging risk from the interoperability of IoT devices. Which of the following should be done FIRST in response to this situation?

Options:

A.

Implement new controls.

B.

Update the risk profile.

C.

Re-evaluate the risk tolerance.

D.

Inform executive leadership.

Buy Now
Questions 193

An audit reveals that several terminated employee accounts maintain access. Which of the following should be the FIRST step to address the risk?

Options:

A.

Perform a risk assessment

B.

Disable user access.

C.

Develop an access control policy.

D.

Perform root cause analysis.

Buy Now
Questions 194

Which of the following is the BEST key performance indicator (KPI) for a server patch management process?

Options:

A.

The percentage of servers with allowed patching exceptions

B.

The number of servers with local credentials to install patches

C.

The percentage of servers patched within required service level agreements

D.

The number of servers running the software patching service

Buy Now
Questions 195

All business units within an organization have the same risk response plan for creating local disaster recovery plans. In an effort to achieve cost effectiveness, the BEST course of action would be to:

Options:

A.

select a provider to standardize the disaster recovery plans.

B.

outsource disaster recovery to an external provider.

C.

centralize the risk response function at the enterprise level.

D.

evaluate opportunities to combine disaster recovery plans.

Buy Now
Questions 196

Improvements in the design and implementation of a control will MOST likely result in an update to:

Options:

A.

inherent risk.

B.

residual risk.

C.

risk appetite

D.

risk tolerance

Buy Now
Questions 197

In a public company, which group is PRIMARILY accountable for ensuring sufficient attention and resources are applied to the risk management process?

Options:

A.

Board of directors

B.

Risk officers

C.

Line management

D.

Senior management

Buy Now
Questions 198

Which of the following is the BEST control to minimize the risk associated with scope creep in software development?

Options:

A.

An established process for project change management

B.

Retention of test data and results for review purposes

C.

Business managements review of functional requirements

D.

Segregation between development, test, and production

Buy Now
Questions 199

A systems interruption has been traced to a personal USB device plugged into the corporate network by an IT employee who bypassed internal control procedures. Of the following, who should be accountable?

Options:

A.

Business continuity manager (BCM)

B.

Human resources manager (HRM)

C.

Chief risk officer (CRO)

D.

Chief information officer (CIO)

Buy Now
Questions 200

Which of the following should be the starting point when performing a risk analysis for an asset?

Options:

A.

Assess risk scenarios.

B.

Update the risk register.

C.

Evaluate threats.

D.

Assess controls.

Buy Now
Questions 201

Which of the following is the MOST important foundational element of an effective three lines of defense model for an organization?

Options:

A.

A robust risk aggregation tool set

B.

Clearly defined roles and responsibilities

C.

A well-established risk management committee

D.

Well-documented and communicated escalation procedures

Buy Now
Questions 202

Which of the following provides The BEST information when determining whether to accept residual risk of a critical system to be implemented?

Options:

A.

Single loss expectancy (SLE)

B.

Cost of the information system

C.

Availability of additional compensating controls

D.

Potential business impacts are within acceptable levels

Buy Now
Questions 203

An organization operates in an environment where the impact of ransomware attacks is high, with a low likelihood. After quantifying the impact of the risk associated with ransomware attacks exceeds the organization's risk appetite and tolerance, which of the following is the risk practitioner's BEST recommendation?

Options:

A.

Obtain adequate cybersecurity insurance coverage.

B.

Ensure business continuity assessments are up to date.

C.

Adjust the organization's risk appetite and tolerance.

D.

Obtain certification to a global information security standard.

Buy Now
Questions 204

Which of the following is MOST important when developing key risk indicators (KRIs)?

Options:

A.

Alignment with regulatory requirements

B.

Availability of qualitative data

C.

Properly set thresholds

D.

Alignment with industry benchmarks

Buy Now
Questions 205

Which of the following is the MOST important characteristic of an effective risk management program?

Options:

A.

Risk response plans are documented

B.

Controls are mapped to key risk scenarios.

C.

Key risk indicators are defined.

D.

Risk ownership is assigned

Buy Now
Questions 206

Which of the following is the MOST effective key performance indicator (KPI) for change management?

Options:

A.

Percentage of changes with a fallback plan

B.

Number of changes implemented

C.

Percentage of successful changes

D.

Average time required to implement a change

Buy Now
Questions 207

Which of the following BEST indicates the condition of a risk management program?

Options:

A.

Number of risk register entries

B.

Number of controls

C.

Level of financial support

D.

Amount of residual risk

Buy Now
Questions 208

Which of the following will BEST help to improve an organization's risk culture?

Options:

A.

Maintaining a documented risk register

B.

Establishing a risk awareness program

C.

Rewarding employees for reporting security incidents

D.

Allocating resources for risk remediation

Buy Now
Questions 209

Which of the following would MOST effectively enable a business operations manager to identify events exceeding risk thresholds?

Options:

A.

Continuous monitoring

B.

A control self-assessment

C.

Transaction logging

D.

Benchmarking against peers

Buy Now
Questions 210

An organization has outsourced its backup and recovery procedures to a third-party cloud provider. Which of the following should be the risk practitioner's NEXT course of action?

Options:

A.

Remove the associated risk from the register.

B.

Validate control effectiveness and update the risk register.

C.

Review the contract and service level agreements (SLAs).

D.

Obtain an assurance report from the third-party provider.

Buy Now
Questions 211

Which of the following is the BEST metric to measure employee adherence to organizational security policies?

Options:

A.

Total number of security policy audit findings

B.

Total number of regulatory violations

C.

Total number of security policy exceptions

D.

Total number of opened phishing emails

Buy Now
Questions 212

A risk practitioner is performing a risk assessment of recent external advancements in quantum computing. Which of the following would pose the GREATEST concern for the risk practitioner?

Options:

A.

The organization has not adopted Infrastructure as a Service (IaaS) for its operations

B.

The organization has incorporated blockchain technology in its operations

C.

The organization has implemented heuristics on its network firewall

D.

The organization has not reviewed its encryption standards

Buy Now
Questions 213

A deficient control has been identified which could result in great harm to an organization should a low frequency threat event occur. When communicating the associated risk to senior management the risk practitioner should explain:

Options:

A.

mitigation plans for threat events should be prepared in the current planning period.

B.

this risk scenario is equivalent to more frequent but lower impact risk scenarios.

C.

the current level of risk is within tolerance.

D.

an increase in threat events could cause a loss sooner than anticipated.

Buy Now
Questions 214

The patch management process is MOST effectively monitored through which of the following key control indicators (KCIs)?

Options:

A.

Number of legacy servers out of support

B.

Percentage of patches deployed within the target time frame

C.

Number of patches deployed outside of business hours

D.

Percentage of patched systems tested

Buy Now
Questions 215

The MAIN reason for creating and maintaining a risk register is to:

Options:

A.

assess effectiveness of different projects.

B.

define the risk assessment methodology.

C.

ensure assets have low residual risk.

D.

account for identified key risk factors.

Buy Now
Questions 216

Which of the following is the MOST important factor when deciding on a control to mitigate risk exposure?

Options:

A.

Relevance to the business process

B.

Regulatory compliance requirements

C.

Cost-benefit analysis

D.

Comparison against best practice

Buy Now
Questions 217

A large organization needs to report risk at all levels for a new centralized visualization project to reduce cost and improve performance. Which of the following would MOST effectively represent the overall risk of the project to senior management?

Options:

A.

Aggregated key performance indicators (KPls)

B.

Key risk indicators (KRIs)

C.

Centralized risk register

D.

Risk heat map

Buy Now
Questions 218

A zero-day vulnerability has been discovered in a globally used brand of hardware server that allows hackers to gain

access to affected IT systems. Which of the following is MOST likely to change as a result of this situation?

Options:

A.

Control effectiveness

B.

Risk appetite

C.

Risk likelihood

D.

Key risk indicator (KRI)

Buy Now
Questions 219

An organization's internal audit department is considering the implementation of robotics process automation (RPA) to automate certain continuous auditing tasks. Who would own the risk associated with ineffective design of the software bots?

Options:

A.

Lead auditor

B.

Project manager

C.

Chief audit executive (CAE)

D.

Chief information officer (CIO)

Buy Now
Questions 220

Which of the following is the MOST effective way to assess the risk associated with outsourcing IT processes?

Options:

A.

Review the vendor's penetration test results

B.

Review the contract and service level agreements (SLAs) periodically

C.

Benchmark industry peers using the same vendor services

D.

Analyze gaps between the current and future state

Buy Now
Questions 221

Which of the following is the MOST effective way to reduce potential losses due to ongoing expense fraud?

Options:

A.

Implement user access controls

B.

Perform regular internal audits

C.

Develop and communicate fraud prevention policies

D.

Conduct fraud prevention awareness training.

Buy Now
Questions 222

Which of the following is the MOST important driver of an effective enterprise risk management (ERM) program?

Options:

A.

Risk policy

B.

Risk committee

C.

Risk culture

D.

Risk management plan

Buy Now
Questions 223

Which of the following would be MOST helpful when communicating roles associated with the IT risk management process?

Options:

A.

Skills matrix

B.

Job descriptions

C.

RACI chart

D.

Organizational chart

Buy Now
Questions 224

Which of the following is the BEST course of action when risk is found to be above the acceptable risk appetite?

Options:

A.

Review risk tolerance levels

B.

Maintain the current controls.

C.

Analyze the effectiveness of controls.

D.

Execute the risk response plan

Buy Now
Questions 225

Which of the following provides the MOST insight into an organization's IT threat exposure?

Options:

A.

Industry benchmarks

B.

Risk assessment reports

C.

External audit results

D.

Tabletop exercises

Buy Now
Questions 226

Which of the following provides the MOST useful information for developing key risk indicators (KRIs)?

Options:

A.

Business impact analysis (BIA) results

B.

Risk scenario ownership

C.

Risk thresholds

D.

Possible causes of materialized risk

Buy Now
Questions 227

From a risk management perspective, which of the following is the PRIMARY purpose of conducting a root cause analysis following an incident?

Options:

A.

To reduce incident response times defined in SLAs

B.

To satisfy senior management expectations for incident response

C.

To ensure risk has been reduced to acceptable levels

D.

To minimize the likelihood of future occurrences

Buy Now
Questions 228

An organization has determined that risk is not being adequately tracked and

managed due to a distributed operating model. Which of the following is the

BEST way to address this issue?

Options:

A.

Increase the frequency of risk assessments.

B.

Revalidate the organization's risk appetite

C.

Create a centralized portfolio of risk scenarios.

D.

Create dashboards for risk metrics.

Buy Now
Questions 229

An organization recently implemented a cybersecurity awareness program that includes phishing simul-ation exercises for all employees. What type of control is being utilized?

Options:

A.

Deterrent

B.

Preventive

C.

Compensating

D.

Detective

Buy Now
Questions 230

The BEST metric to monitor the risk associated with changes deployed to production is the percentage of:

Options:

A.

changes due to emergencies.

B.

changes that cause incidents.

C.

changes not requiring user acceptance testing.

D.

personnel that have rights to make changes in production.

Buy Now
Questions 231

Which of the following should be done FIRST when information is no longer required to support business objectives?

Options:

A.

Archive the information to a backup database.

B.

Protect the information according to the classification policy.

C.

Assess the information against the retention policy.

D.

Securely and permanently erase the information

Buy Now
Questions 232

Which of me following is MOST helpful to mitigate the risk associated with an application under development not meeting business objectives?

Options:

A.

Identifying tweets that may compromise enterprise architecture (EA)

B.

Including diverse Business scenarios in user acceptance testing (UAT)

C.

Performing risk assessments during the business case development stage

D.

Including key stakeholders in review of user requirements

Buy Now
Questions 233

An IT risk practitioner has been asked to regularly report on the overall status and effectiveness of the IT risk management program. Which of the following is MOST useful for this purpose?

Options:

A.

Balanced scorecard

B.

Capability maturity level

C.

Internal audit plan

D.

Control self-assessment (CSA)

Buy Now
Questions 234

An organization has outsourced its IT security operations to a third party. Who is ULTIMATELY accountable for the risk associated with the outsourced operations?

Options:

A.

The third party s management

B.

The organization's management

C.

The control operators at the third party

D.

The organization's vendor management office

Buy Now
Questions 235

Which of the following is MOST important to the successful development of IT risk scenarios?

Options:

A.

Cost-benefit analysis

B.

Internal and external audit reports

C.

Threat and vulnerability analysis

D.

Control effectiveness assessment

Buy Now
Questions 236

A global organization is considering the acquisition of a competitor. Senior management has requested a review of the overall risk profile from the targeted organization. Which of the following components of this review would provide the MOST useful information?

Options:

A.

Risk appetite statement

B.

Enterprise risk management framework

C.

Risk management policies

D.

Risk register

Buy Now
Questions 237

Which of the following is MOST helpful in reducing the likelihood of inaccurate risk assessment results?

Options:

A.

Involving relevant stakeholders in the risk assessment process

B.

Updating organizational risk tolerance levels

C.

Reviewing the applicable risk assessment methodologies

D.

Having internal audit validate control effectiveness

Buy Now
Questions 238

A risk practitioner has collaborated with subject matter experts from the IT department to develop a large list of potential key risk indicators (KRIs) for all IT operations within theorganization of the following, who should review the completed list and select the appropriate KRIs for implementation?

Options:

A.

IT security managers

B.

IT control owners

C.

IT auditors

D.

IT risk owners

Buy Now
Questions 239

Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of IT policies? The number of:

Options:

A.

IT policy exceptions granted.

B.

Senior management approvals.

C.

Key technology controls covered by IT policies.

D.

Processes covered by IT policies.

Buy Now
Questions 240

Which of the following is the MAIN benefit to an organization using key risk indicators (KRIs)?

Options:

A.

KRIs assist in the preparation of the organization's risk profile.

B.

KRIs signal that a change in the control environment has occurred.

C.

KRIs provide a basis to set the risk appetite for an organization

D.

KRIs provide an early warning that a risk threshold is about to be reached.

Buy Now
Questions 241

Which of the following should be the PRIMARY consideration when assessing the automation of control monitoring?

Options:

A.

impact due to failure of control

B.

Frequency of failure of control

C.

Contingency plan for residual risk

D.

Cost-benefit analysis of automation

Buy Now
Questions 242

Which of the following will help ensure the elective decision-making of an IT risk management committee?

Options:

A.

Key stakeholders are enrolled as members

B.

Approved minutes ate forwarded to senior management

C.

Committee meets at least quarterly

D.

Functional overlap across the business is minimized

Buy Now
Questions 243

Options:

A.

Internal email communications are not encrypted.

B.

Data transmission within the corporate network is not encrypted.

C.

Internally created documents are not automatically classified.

D.

Data transmission across public networks is not encrypted.

Buy Now
Questions 244

Which of the following is a KEY outcome of risk ownership?

Options:

A.

Risk responsibilities are addressed.

B.

Risk-related information is communicated.

C.

Risk-oriented tasks are defined.

D.

Business process risk is analyzed.

Buy Now
Questions 245

Which of the following should be a risk practitioner's NEXT step after learning of an incident that has affected a competitor?

Options:

A.

Activate the incident response plan.

B.

Implement compensating controls.

C.

Update the risk register.

D.

Develop risk scenarios.

Buy Now
Questions 246

Which of the following is the GREATEST concern when using a generic set of IT risk scenarios for risk analysis?

Options:

A.

Quantitative analysis might not be possible.

B.

Risk factors might not be relevant to the organization

C.

Implementation costs might increase.

D.

Inherent risk might not be considered.

Buy Now
Questions 247

Options:

A.

Risk tolerance

B.

Risk velocity

C.

Risk appetite

D.

Risk capacity

Buy Now
Questions 248

Which of the following should be considered FIRST when creating a comprehensive IT risk register?

Options:

A.

Risk management budget

B.

Risk mitigation policies

C.

Risk appetite

D.

Risk analysis techniques

Buy Now
Questions 249

Which of the following is the MOST effective control to maintain the integrity of system configuration files?

Options:

A.

Recording changes to configuration files

B.

Implementing automated vulnerability scanning

C.

Restricting access to configuration documentation

D.

Monitoring against the configuration standard

Buy Now
Questions 250

Which of the following is MOST important for an organization that wants to reduce IT operational risk?

Options:

A.

Increasing senior management's understanding of IT operations

B.

Increasing the frequency of data backups

C.

Minimizing complexity of IT infrastructure

D.

Decentralizing IT infrastructure

Buy Now
Questions 251

The risk associated with an asset before controls are applied can be expressed as:

Options:

A.

a function of the likelihood and impact

B.

the magnitude of an impact

C.

a function of the cost and effectiveness of control.

D.

the likelihood of a given threat

Buy Now
Questions 252

Who should be responsible for approving the cost of controls to be implemented for mitigating risk?

Options:

A.

Risk practitioner

B.

Risk owner

C.

Control owner

D.

Control implementer

Buy Now
Questions 253

A violation of segregation of duties is when the same:

Options:

A.

user requests and tests the change prior to production.

B.

user authorizes and monitors the change post-implementation.

C.

programmer requests and tests the change prior to production.

D.

programmer writes and promotes code into production.

Buy Now
Questions 254

Which of the following is MOST likely to be impacted as a result of a new policy which allows staff members to remotely connect to the organization's IT systems via personal or public computers?

Options:

A.

Risk appetite

B.

Inherent risk

C.

Key risk indicator (KRI)

D.

Risk tolerance

Buy Now
Questions 255

Deviation from a mitigation action plan's completion date should be determined by which of the following?

Options:

A.

Change management as determined by a change control board

B.

Benchmarking analysis with similar completed projects

C.

Project governance criteria as determined by the project office

D.

The risk owner as determined by risk management processes

Buy Now
Questions 256

An organization has outsourced its ERP application to an external SaaS provider. Which of the following provides the MOST useful information to identify risk scenarios involving data loss?

Options:

A.

Data classification schemes

B.

Industry data breach reports

C.

Data storage locations

D.

Data flow documentation

Buy Now
Questions 257

Management has required information security awareness training to reduce the risk associated with credential compromise. What is the BEST way to assess the effectiveness of the training?

Options:

A.

Conduct social engineering testing.

B.

Audit security awareness training materials.

C.

Administer an end-of-training quiz.

D.

Perform a vulnerability assessment.

Buy Now
Questions 258

Which of the following should be the PRIMARY focus of an IT risk awareness program?

Options:

A.

Ensure compliance with the organization's internal policies

B.

Cultivate long-term behavioral change.

C.

Communicate IT risk policy to the participants.

D.

Demonstrate regulatory compliance.

Buy Now
Questions 259

An external security audit has reported multiple findings related to control noncompliance. Which of the following would be MOST important for the risk practitioner to communicate to senior management?

Options:

A.

A recommendation for internal audit validation

B.

Plans for mitigating the associated risk

C.

Suggestions for improving risk awareness training

D.

The impact to the organization’s risk profile

Buy Now
Questions 260

An employee lost a personal mobile device that may contain sensitive corporate information. What should be the risk practitioner's recommendation?

Options:

A.

Conduct a risk analysis.

B.

Initiate a remote data wipe.

C.

Invoke the incident response plan

D.

Disable the user account.

Buy Now
Questions 261

Participants in a risk workshop have become focused on the financial cost to mitigate risk rather than choosing the most appropriate response. Which of the following is the BEST way to address this type of issue in the long term?

Options:

A.

Perform a return on investment analysis.

B.

Review the risk register and risk scenarios.

C.

Calculate annualized loss expectancy of risk scenarios.

D.

Raise the maturity of organizational risk management.

Buy Now
Questions 262

Which of the following would MOST likely require a risk practitioner to update the risk register?

Options:

A.

An alert being reported by the security operations center.

B.

Development of a project schedule for implementing a risk response

C.

Completion of a project for implementing a new control

D.

Engagement of a third party to conduct a vulnerability scan

Buy Now
Questions 263

Which of the following should be a risk practitioner's PRIMARY focus when tasked with ensuring organization records are being retained for a sufficient period of time to meet legal obligations?

Options:

A.

Data duplication processes

B.

Data archival processes

C.

Data anonymization processes

D.

Data protection processes

Buy Now
Questions 264

The MOST essential content to include in an IT risk awareness program is how to:

Options:

A.

populate risk register entries and build a risk profile for management reporting.

B.

prioritize IT-related actions by considering risk appetite and risk tolerance.

C.

define the IT risk framework for the organization.

D.

comply with the organization's IT risk and information security policies.

Buy Now
Questions 265

Which of the following criteria associated with key risk indicators (KRIs) BEST enables effective risk monitoring?

Options:

A.

Approval by senior management

B.

Low cost of development and maintenance

C.

Sensitivity to changes in risk levels

D.

Use of industry risk data sources

Buy Now
Questions 266

A business unit is implementing a data analytics platform to enhance its customer relationship management (CRM) system primarily to process data that has been provided by its customers. Which of the following presents the GREATEST risk to the organization's reputation?

Options:

A.

Third-party software is used for data analytics.

B.

Data usage exceeds individual consent.

C.

Revenue generated is not disclosed to customers.

D.

Use of a data analytics system is not disclosed to customers.

Buy Now
Questions 267

Which of the following BEST indicates effective information security incident management?

Options:

A.

Monthly trend of information security-related incidents

B.

Average time to identify critical information security incidents

C.

Frequency of information security incident response plan testing

D.

Percentage of high-risk security incidents

Buy Now
Questions 268

An organization is adopting block chain for a new financial system. Which of the following should be the GREATEST concern for a risk practitioner evaluating the system's production readiness?

Options:

A.

Limited organizational knowledge of the underlying technology

B.

Lack of commercial software support

C.

Varying costs related to implementation and maintenance

D.

Slow adoption of the technology across the financial industry

Buy Now
Questions 269

Which of the following statements describes the relationship between key risk indicators (KRIs) and key control indicators (KCIs)?

Options:

A.

KRI design must precede definition of KCIs.

B.

KCIs and KRIs are independent indicators and do not impact each other.

C.

A decreasing trend of KRI readings will lead to changes to KCIs.

D.

Both KRIs and KCIs provide insight to potential changes in the level of risk.

Buy Now
Questions 270

External auditors have found that management has not effectively monitored key security technologies that support regulatory objectives. Which type of indicator would BEST enable the organization to identify and correct this situation?

Options:

A.

Key Performance Indicator (KPI)

B.

Key Management Indicator (KMI)

C.

Key Risk Indicator (KRI)

D.

Key Control Indicator (KCI)

Buy Now
Questions 271

The risk associated with data loss from a website which contains sensitive customer information is BEST owned by:

Options:

A.

the third-party website manager

B.

the business process owner

C.

IT security

D.

the compliance manager

Buy Now
Questions 272

Which of the following provides the BEST evidence that risk responses have been executed according to their risk action plans?

Options:

A.

Risk policy review

B.

Business impact analysis (B1A)

C.

Control catalog

D.

Risk register

Buy Now
Questions 273

While reviewing an organization's monthly change management metrics, a risk practitioner notes that the number of emergency changes has increased substantially Which of the following would be the BEST approach for the risk practitioner to take?

Options:

A.

Temporarily suspend emergency changes.

B.

Document the control deficiency in the risk register.

C.

Conduct a root cause analysis.

D.

Continue monitoring change management metrics.

Buy Now
Questions 274

The MOST important measure of the effectiveness of risk management in project implementation is the percentage of projects:

Options:

A.

introduced into production without high-risk issues.

B.

having the risk register updated regularly.

C.

having key risk indicators (KRIs) established to measure risk.

D.

having an action plan to remediate overdue issues.

Buy Now
Questions 275

An IT department has organized training sessions to improve user awareness of organizational information security policies. Which of the following is the BEST key performance indicator (KPI) to reflect effectiveness of the training?

Options:

A.

Number of training sessions completed

B.

Percentage of staff members who complete the training with a passing score

C.

Percentage of attendees versus total staff

D.

Percentage of staff members who attend the training with positive feedback

Buy Now
Questions 276

After a high-profile systems breach at an organization s key vendor, the vendor has implemented additional mitigating controls. The vendor has voluntarily shared the following set of assessments:

Which of the assessments provides the MOST reliable input to evaluate residual risk in the vendor's control environment?

Options:

A.

External audit

B.

Internal audit

C.

Vendor performance scorecard

D.

Regulatory examination

Buy Now
Questions 277

Which of the following should an organization perform to forecast the effects of a disaster?

Options:

A.

Develop a business impact analysis (BIA).

B.

Define recovery time objectives (RTO).

C.

Analyze capability maturity model gaps.

D.

Simulate a disaster recovery.

Buy Now
Questions 278

Management has determined that it will take significant time to remediate exposures in the current IT control environment. Which of the following is the BEST course of action?

Options:

A.

Implement control monitoring.

B.

Improve project management methodology.

C.

Reassess the risk periodically.

D.

Identify compensating controls.

Buy Now
Questions 279

Determining if organizational risk is tolerable requires:

Options:

A.

mapping residual risk with cost of controls

B.

comparing against regulatory requirements

C.

comparing industry risk appetite with the organizations.

D.

understanding the organization's risk appetite.

Buy Now
Questions 280

Which of the following would present the GREATEST challenge for a risk practitioner during a merger of two organizations?

Options:

A.

Variances between organizational risk appetites

B.

Different taxonomies to categorize risk scenarios

C.

Disparate platforms for governance, risk, and compliance (GRC) systems

D.

Dissimilar organizational risk acceptance protocols

Buy Now
Questions 281

A cloud service provider has completed upgrades to its cloud infrastructure to enhance service availability. Which of the following is the MOST important key risk indicator (KRI) for management to monitor?

Options:

A.

Peak demand on the cloud service during business hours

B.

Percentage of technology upgrades resulting in security breaches

C.

Number of incidents with downtime exceeding contract threshold

D.

Percentage of servers not patched per policy

Buy Now
Questions 282

Which of the following BEST indicates how well a web infrastructure protects critical information from an attacker?

Options:

A.

Failed login attempts

B.

Simulating a denial of service attack

C.

Absence of IT audit findings

D.

Penetration test

Buy Now
Questions 283

To reduce the risk introduced when conducting penetration tests, the BEST mitigating control would be to:

Options:

A.

require the vendor to sign a nondisclosure agreement

B.

clearly define the project scope.

C.

perform background checks on the vendor.

D.

notify network administrators before testing

Buy Now
Questions 284

When establishing an enterprise IT risk management program, it is MOST important to:

Options:

A.

review alignment with the organizations strategy.

B.

understand the organization's information security policy.

C.

validate the organization's data classification scheme.

D.

report identified IT risk scenarios to senior management.

Buy Now
Questions 285

Which of the following is MOST important for management to consider when deciding whether to invest in an IT initiative that exceeds management's risk appetite?

Options:

A.

Risk management budget

B.

Risk management industry trends

C.

Risk tolerance

D.

Risk capacity

Buy Now
Questions 286

Which of the following BEST reduces the likelihood of fraudulent activity that occurs through use of a digital wallet?

Options:

A.

Require multi-factor authentication (MFA) to access the digital wallet.

B.

Use a digital key to encrypt the contents of the wallet.

C.

Enable audit logging on the digital wallet's device.

D.

Require public key infrastructure (PKI) to authorize transactions.

Buy Now
Questions 287

When implementing an IT risk management program, which of the following is the BEST time to evaluate current control effectiveness?

Options:

A.

Before defining a framework

B.

During the risk assessment

C.

When evaluating risk response

D.

When updating the risk register

Buy Now
Questions 288

After conducting a risk assessment for regulatory compliance, an organization has identified only one possible mitigating control. The cost of the control has been determined to be higher than the penalty of noncompliance. Which of the following would be the risk practitioner's BEST recommendation?

Options:

A.

Accept the risk with management sign-off.

B.

Ignore the risk until the regulatory body conducts a compliance check.

C.

Mitigate the risk with the identified control.

D.

Transfer the risk by buying insurance.

Buy Now
Questions 289

Which of the following is MOST important to communicate to senior management during the initial implementation of a risk management program?

Options:

A.

Regulatory compliance

B.

Risk ownership

C.

Best practices

D.

Desired risk level

Buy Now
Questions 290

Which of the following should be reported periodically to the risk committee?

Options:

A.

System risk and control matrix

B.

Emerging IT risk scenarios

C.

Changes to risk assessment methodology

D.

Audit committee charter

Buy Now
Questions 291

Which of the following is MOST important to consider when developing an organization's risk management strategy?

Options:

A.

Complexity of technology architecture

B.

Disaster recovery strategy

C.

Business operational requirements

D.

Criteria for assessing risk

Buy Now
Questions 292

Which of the following is the BEST risk management approach for the strategic IT planning process?

Options:

A.

Key performance indicators (KPIs) are established to track IT strategic initiatives.

B.

The IT strategic plan is reviewed by the chief information security officer (CISO) and enterprise risk management (ERM).

C.

The IT strategic plan is developed from the organization-wide risk management plan.

D.

Risk scenarios associated with IT strategic initiatives are identified and assessed.

Buy Now
Questions 293

A risk practitioner recently discovered that personal information from the production environment is required for testing purposes in non-production environments. Which of the following is the BEST recommendation to address this situation?

Options:

A.

Enable data encryption in the test environment.

B.

Prevent the use of production data in the test environment

C.

De-identify data before being transferred to the test environment.

D.

Enforce multi-factor authentication within the test environment.

Buy Now
Questions 294

Which of the following is the BEST way to ensure data is properly sanitized while in cloud storage?

Options:

A.

Deleting the data from the file system

B.

Cryptographically scrambling the data

C.

Formatting the cloud storage at the block level

D.

Degaussing the cloud storage media

Buy Now
Questions 295

A risk assessment has revealed that the probability of a successful cybersecurity attack is increasing. The potential loss could exceed the organization's risk appetite. Which of the following ould be the MOST effective course of action?

Options:

A.

Re-evaluate the organization's risk appetite.

B.

Outsource the cybersecurity function.

C.

Purchase cybersecurity insurance.

D.

Review cybersecurity incident response procedures.

Buy Now
Questions 296

An organization is subject to a new regulation that requires nearly real-time recovery of its services following a disruption. Which of the following is the BEST way to manage the risk in this situation?

Options:

A.

Move redundant IT infrastructure to a closer location.

B.

Obtain insurance and ensure sufficient funds are available for disaster recovery.

C.

Review the business continuity plan (BCP) and align it with the new business needs.

D.

Outsource disaster recovery services to a third-party IT service provider.

Buy Now
Questions 297

The risk associated with inadvertent disclosure of database records from a public cloud service provider (CSP) would MOST effectively be reduced by:

Options:

A.

encrypting the data

B.

including a nondisclosure clause in the CSP contract

C.

assessing the data classification scheme

D.

reviewing CSP access privileges

Buy Now
Questions 298

Which of the following BEST indicates that security requirements have been incorporated into the system development life cycle (SDLC)?

Options:

A.

Comprehensive security training of developers

B.

Validated security requirements and design documents

C.

Completed user acceptance testing (UAT)

D.

Compliance with laws and regulatory requirements

Buy Now
Questions 299

Which of the following provides the BEST measurement of an organization's risk management maturity level?

Options:

A.

Level of residual risk

B.

The results of a gap analysis

C.

IT alignment to business objectives

D.

Key risk indicators (KRIs)

Buy Now
Questions 300

Which of the following will BEST help to ensure implementation of corrective action plans?

Options:

A.

Contracting to third parties

B.

Establishing employee awareness training

C.

Setting target dates to complete actions

D.

Assigning accountability to risk owners

Buy Now
Questions 301

A risk practitioner wants to identify potential risk events that affect the continuity of a critical business process. Which of the following should the risk practitioner do FIRST?

Options:

A.

Evaluate current risk management alignment with relevant regulations

B.

Determine if business continuity procedures are reviewed and updated on a regular basis

C.

Conduct a benchmarking exercise against industry peers

D.

Review the methodology used to conduct the business impact analysis (BIA)

Buy Now
Questions 302

Which of the following is the MOST comprehensive resource for prioritizing the implementation of information systems controls?

Options:

A.

Data classification policy

B.

Emerging technology trends

C.

The IT strategic plan

D.

The risk register

Buy Now
Questions 303

What is the MOST important consideration when aligning IT risk management with the enterprise risk management (ERM) framework?

Options:

A.

Risk and control ownership

B.

Senior management participation

C.

Business unit support

D.

Risk nomenclature and taxonomy

Buy Now
Questions 304

Which of the following BEST enables an organization to address new risk associated with an Internet of Things (IoT) solution?

Options:

A.

Transferring the risk

B.

Introducing control procedures early in the life cycle

C.

Updating the risk tolerance to include the new risk

D.

Implementing IoT device monitoring software

Buy Now
Questions 305

The MOST important reason for implementing change control procedures is to ensure:

Options:

A.

only approved changes are implemented

B.

timely evaluation of change events

C.

an audit trail exists.

D.

that emergency changes are logged.

Buy Now
Questions 306

As part of an overall IT risk management plan, an IT risk register BEST helps management:

Options:

A.

align IT processes with business objectives.

B.

communicate the enterprise risk management policy.

C.

stay current with existing control status.

D.

understand the organizational risk profile.

Buy Now
Questions 307

Which of the following is the BEST key performance indicator (KPI) to measure how effectively risk management practices are embedded in the project management office (PMO)?

Options:

A.

Percentage of projects with key risk accepted by the project steering committee

B.

Reduction in risk policy noncompliance findings

C.

Percentage of projects with developed controls on scope creep

D.

Reduction in audits involving external risk consultants

Buy Now
Questions 308

An organization requires a third party for processing customer personal data. Which of the following is the BEST approach when sharing data over a public network?

Options:

A.

Include a nondisclosure agreement (NDA) for personal data in the contract.

B.

Implement a digital rights protection tool to monitor data.

C.

Use a virtual private network (VPN) to communicate data.

D.

Transfer a read-only version of the data.

Buy Now
Questions 309

Which of the following is a risk practitioner's BEST course of action upon learning that regulatory authorities have concerns with an emerging technology the organization is considering?

Options:

A.

Redesign key risk indicators (KRIs).

B.

Update risk responses.

C.

Conduct a SWOT analysis.

D.

Perform a threat assessment.

Buy Now
Questions 310

Which of the following is the PRIMARY advantage of having a single integrated business continuity plan (BCP) rather than each business unit developing its own BCP?

Options:

A.

It provides assurance of timely business process response and effectiveness.

B.

It supports effective use of resources and provides reasonable confidence of recoverability.

C.

It enables effective BCP maintenance and updates to reflect organizational changes.

D.

It decreases the risk of downtime and operational losses in the event of a disruption.

Buy Now
Questions 311

Which of the following should be included in a risk scenario to be used for risk analysis?

Options:

A.

Risk appetite

B.

Threat type

C.

Risk tolerance

D.

Residual risk

Buy Now
Questions 312

In order to determining a risk is under-controlled the risk practitioner will need to

Options:

A.

understand the risk tolerance

B.

monitor and evaluate IT performance

C.

identify risk management best practices

D.

determine the sufficiency of the IT risk budget

Buy Now
Questions 313

Which of the following would BEST indicate to senior management that IT processes are improving?

Options:

A.

Changes in the number of intrusions detected

B.

Changes in the number of security exceptions

C.

Changes in the position in the maturity model

D.

Changes to the structure of the risk register

Buy Now
Questions 314

An organization uses one centralized single sign-on (SSO) control to cover many applications. Which of the following is the BEST course of action when a new application is added to the environment after testing of the SSO control has been completed?

Options:

A.

Initiate a retest of the full control

B.

Retest the control using the new application as the only sample.

C.

Review the corresponding change control documentation

D.

Re-evaluate the control during (he next assessment

Buy Now
Questions 315

Which of the following is the PRIMARY purpose of periodically reviewing an organization's risk profile?

Options:

A.

Align business objectives with risk appetite.

B.

Enable risk-based decision making.

C.

Design and implement risk response action plans.

D.

Update risk responses in the risk register

Buy Now
Questions 316

A legacy application used for a critical business function relies on software that has reached the end of extended support Which of the following is the MOST effective control to manage this application?

Options:

A.

Subscribe to threat intelligence to monitor external attacks.

B.

Apply patches for a newer version of the application.

C.

Segment the application within the existing network.

D.

Increase the frequency of regular system and data backups.

Buy Now
Questions 317

A risk owner has accepted a high-impact risk because the control was adversely affecting process efficiency. Before updating the risk register, it is MOST important for the risk practitioner to:

Options:

A.

ensure suitable insurance coverage is purchased.

B.

negotiate with the risk owner on control efficiency.

C.

reassess the risk to confirm the impact.

D.

obtain approval from senior management.

Buy Now
Questions 318

Which of the following analyses is MOST useful for prioritizing risk scenarios associated with loss of IT assets?

Options:

A.

SWOT analysis

B.

Business impact analysis (BIA)

C.

Cost-benefit analysis

D.

Root cause analysis

Buy Now
Questions 319

Which of the following is the MOST important consideration when selecting key risk indicators (KRIs) to monitor risk trends over time?

Options:

A.

Ongoing availability of data

B.

Ability to aggregate data

C.

Ability to predict trends

D.

Availability of automated reporting systems

Buy Now
Questions 320

Which of the following is the PRIMARY objective of risk management?

Options:

A.

Identify and analyze risk.

B.

Achieve business objectives

C.

Minimi2e business disruptions.

D.

Identify threats and vulnerabilities.

Buy Now
Questions 321

Which of the following is MOST important for a risk practitioner to verify when periodically reviewing risk response action plans?

Options:

A.

The action plans have documented schedules

B.

The action plans treat the corresponding risk

C.

Budget has been allocated for the action plans

D.

Key risk indicators (KRIs) are defined in the action plans

Buy Now
Questions 322

Following a significant change to a business process, a risk practitioner believes the associated risk has been reduced. The risk practitioner should advise the risk owner to FIRST

Options:

A.

review the key risk indicators.

B.

conduct a risk analysis.

C.

update the risk register

D.

reallocate risk response resources.

Buy Now
Questions 323

An organization operates in a jurisdiction where heavy fines are imposed for leakage of customer data. Which of the following provides the BEST input to assess the inherent risk impact?

Options:

A.

Number of customer records held

B.

Number of databases that host customer data

C.

Number of encrypted customer databases

D.

Number of staff members having access to customer data

Buy Now
Questions 324

A risk practitioner is defining metrics for security threats that were not identified by antivirus software. Which type of metric is being developed?

Options:

A.

Key control indicator (KCI)

B.

Key risk indicator (KRI)

C.

Operational level agreement (OLA)

D.

Service level agreement (SLA)

Buy Now
Questions 325

Which of the following is the PRIMARY reason to have the risk management process reviewed by a third party?

Options:

A.

Obtain objective assessment of the control environment.

B.

Ensure the risk profile is defined and communicated.

C.

Validate the threat management process.

D.

Obtain an objective view of process gaps and systemic errors.

Buy Now
Questions 326

When updating a risk register with the results of an IT risk assessment, the risk practitioner should log:

Options:

A.

high impact scenarios.

B.

high likelihood scenarios.

C.

treated risk scenarios.

D.

known risk scenarios.

Buy Now
Questions 327

Which of the following would be MOST useful when measuring the progress of a risk response action plan?

Options:

A.

Percentage of mitigated risk scenarios

B.

Annual loss expectancy (ALE) changes

C.

Resource expenditure against budget

D.

An up-to-date risk register

Buy Now
Questions 328

When reporting on the performance of an organization's control environment including which of the following would BEST inform stakeholders risk decision-making?

Options:

A.

The audit plan for the upcoming period

B.

Spend to date on mitigating control implementation

C.

A report of deficiencies noted during controls testing

D.

A status report of control deployment

Buy Now
Questions 329

An organization has raised the risk appetite for technology risk. The MOST likely result would be:

Options:

A.

increased inherent risk.

B.

higher risk management cost

C.

decreased residual risk.

D.

lower risk management cost.

Buy Now
Questions 330

An organization has implemented a policy requiring staff members to take a minimum of five consecutive days' leave per year to mitigate the risk of malicious insider activities. Which of the following is the BEST key performance indicator (KPI) of the effectiveness of this policy?

Options:

A.

Percentage of staff turnover following five consecutive days of leave

B.

Average number of consecutive days of leave per staff member

C.

Number of suspected malicious activities reported since policy implementation

D.

Financial loss incurred due to malicious activities since policy implementation

Buy Now
Questions 331

When communicating changes in the IT risk profile, which of the following should be included to BEST enable stakeholder decision making?

Options:

A.

List of recent incidents affecting industry peers

B.

Results of external attacks and related compensating controls

C.

Gaps between current and desired states of the control environment

D.

Review of leading IT risk management practices within the industry

Buy Now
Questions 332

A recent vulnerability assessment of a web-facing application revealed several weaknesses. Which of the following should be done NEXT to determine the risk exposure?

Options:

A.

Code review

B.

Penetration test

C.

Gap assessment

D.

Business impact analysis (BIA)

Buy Now
Questions 333

Which of the following is the PRIMARY purpose of a risk register?

Options:

A.

To assign control ownership of risk

B.

To provide a centralized view of risk

C.

To identify opportunities to transfer risk

D.

To mitigate organizational risk

Buy Now
Questions 334

Key control indicators (KCls) help to assess the effectiveness of the internal control environment PRIMARILY by:

Options:

A.

ensuring controls are operating efficiently and facilitating productivity.

B.

enabling senior leadership to better understand the level of risk the organization is facing.

C.

monitoring changes in the likelihood of adverse events due to ineffective controls.

D.

providing information on the degree to which controls are meeting intended objectives.

Buy Now
Questions 335

Which of the following is MOST important to consider when determining risk appetite?

Options:

A.

Service level agreements (SLAs)

B.

Risk heat map

C.

IT capacity

D.

Risk culture

Buy Now
Questions 336

Which of the following is the MAIN reason to continuously monitor IT-related risk?

Options:

A.

To redefine the risk appetite and risk tolerance levels based on changes in risk factors

B.

To update the risk register to reflect changes in levels of identified and new IT-related risk

C.

To ensure risk levels are within acceptable limits of the organization's risk appetite and risk tolerance

D.

To help identify root causes of incidents and recommend suitable long-term solutions

Buy Now
Questions 337

A global organization is planning to collect customer behavior data through social media advertising. Which of the following is the MOST important business risk to be considered?

Options:

A.

Regulatory requirements may differ in each country.

B.

Data sampling may be impacted by various industry restrictions.

C.

Business advertising will need to be tailored by country.

D.

The data analysis may be ineffective in achieving objectives.

Buy Now
Questions 338

How should an organization approach the retention of data that is no longer needed for business operations?

Options:

A.

Data should be retained for a reasonable period of time in case of system rollback.

B.

Data should be destroyed or retained on the basis of a cost-benefit analysis.

C.

Data should be retained based on regulatory requirements.

D.

Data should be destroyed to avoid any risk exposure.

Buy Now
Questions 339

A risk practitioner has been asked to propose a risk acceptance framework for an organization. Which of the following is the MOST important consideration for the risk practitioner to address in the framework?

Options:

A.

Consistent forms to document risk acceptance rationales

B.

Acceptable scenarios to override risk appetite or tolerance thresholds

C.

Individuals or roles authorized to approve risk acceptance

D.

Communication protocols when a risk is accepted

Buy Now
Questions 340

The BEST way to validate that a risk treatment plan has been implemented effectively is by reviewing:

Options:

A.

results of a business impact analysis (BIA).

B.

the original risk response plan.

C.

training program and user awareness documentation.

D.

a post-implementation risk and control self-assessment (RCSA).

Buy Now
Questions 341

The BEST way to obtain senior management support for investment in a control implementation would be to articulate the reduction in:

Options:

A.

detected incidents.

B.

residual risk.

C.

vulnerabilities.

D.

inherent risk.

Buy Now
Questions 342

The GREATEST concern when maintaining a risk register is that:

Options:

A.

impacts are recorded in qualitative terms.

B.

executive management does not perform periodic reviews.

C.

IT risk is not linked with IT assets.

D.

significant changes in risk factors are excluded.

Buy Now
Questions 343

Which of the following is a KEY consideration for a risk practitioner to communicate to senior management evaluating the introduction of artificial intelligence (Al) solutions into the organization?

Options:

A.

Al requires entirely new risk management processes.

B.

Al potentially introduces new types of risk.

C.

Al will result in changes to business processes.

D.

Third-party Al solutions increase regulatory obligations.

Buy Now
Questions 344

During a risk assessment, a key external technology supplier refuses to provide control design and effectiveness information, citing confidentiality concerns. What should the risk practitioner do NEXT?

Options:

A.

Escalate the non-cooperation to management

B.

Exclude applicable controls from the assessment.

C.

Review the supplier's contractual obligations.

D.

Request risk acceptance from the business process owner.

Buy Now
Questions 345

A risk practitioner is organizing risk awareness training for senior management. Which of the following is the MOST important topic to cover in the training session?

Options:

A.

The organization's strategic risk management projects

B.

Senior management roles and responsibilities

C.

The organizations risk appetite and tolerance

D.

Senior management allocation of risk management resources

Buy Now
Questions 346

Which of the following would BEST ensure that identified risk scenarios are addressed?

Options:

A.

Reviewing the implementation of the risk response

B.

Creating a separate risk register for key business units

C.

Performing real-time monitoring of threats

D.

Performing regular risk control self-assessments

Buy Now
Questions 347

An organization has contracted with a cloud service provider to support the deployment of a new product. Of the following, who should own the associated risk?

Options:

A.

The head of enterprise architecture (EA)

B.

The IT risk manager

C.

The information security manager

D.

The product owner

Buy Now
Questions 348

Which of the following BEST facilitates the development of relevant risk scenarios?

Options:

A.

Perform quantitative risk analysis of historical data.

B.

Adopt an industry-recognized risk framework.

C.

Use qualitative risk assessment methodologies.

D.

Conduct brainstorming sessions with key stakeholders.

Buy Now
Questions 349

Which of the following is a detective control?

Options:

A.

Limit check

B.

Periodic access review

C.

Access control software

D.

Rerun procedures

Buy Now
Questions 350

Which of the following is MOST important for a risk practitioner to consider when evaluating plans for changes to IT services?

Options:

A.

Change testing schedule

B.

Impact assessment of the change

C.

Change communication plan

D.

User acceptance testing (UAT)

Buy Now
Questions 351

Which of the following should be the MOST important consideration when performing a vendor risk assessment?

Options:

A.

Results of the last risk assessment of the vendor

B.

Inherent risk of the business process supported by the vendor

C.

Risk tolerance of the vendor

D.

Length of time since the last risk assessment of the vendor

Buy Now
Questions 352

A risk practitioner is summarizing the results of a high-profile risk assessment sponsored by senior management. The BEST way to support risk-based decisions by senior management would be to:

Options:

A.

map findings to objectives.

B.

provide quantified detailed analysis

C.

recommend risk tolerance thresholds.

D.

quantify key risk indicators (KRls).

Buy Now
Questions 353

Which of the following is the BEST way to determine whether new controls mitigate security gaps in a business system?

Options:

A.

Complete an offsite business continuity exercise.

B.

Conduct a compliance check against standards.

C.

Perform a vulnerability assessment.

D.

Measure the change in inherent risk.

Buy Now
Questions 354

Who is accountable for risk treatment?

Options:

A.

Enterprise risk management team

B.

Risk mitigation manager

C.

Business process owner

D.

Risk owner

Buy Now
Questions 355

An organization has decided to implement a new Internet of Things (loT) solution. Which of the following should be done FIRST when addressing security concerns associated with this new technology?

Options:

A.

Develop new loT risk scenarios.

B.

Implement loT device monitoring software.

C.

Introduce controls to the new threat environment.

D.

Engage external security reviews.

Buy Now
Questions 356

Which of the following would have the GREATEST impact on reducing the risk associated with the implementation of a big data project?

Options:

A.

Data processing

B.

Data quality

C.

Data scalability

D.

Data governance

Buy Now
Questions 357

Which of the following is the BEST method to track asset inventory?

Options:

A.

Periodic asset review by management

B.

Asset registration form

C.

Automated asset management software

D.

IT resource budgeting process

Buy Now
Questions 358

Which of the following should be the PRIMARY driver for an organization on a multi-year cloud implementation to publish a cloud security policy?

Options:

A.

Evaluating gaps in the on-premise and cloud security profiles

B.

Establishing minimum cloud security requirements

C.

Enforcing compliance with cloud security parameters

D.

Educating IT staff on variances between on premise and cloud security

Buy Now
Questions 359

Which of the following management action will MOST likely change the likelihood rating of a risk scenario related to remote network access?

Options:

A.

Updating the organizational policy for remote access

B.

Creating metrics to track remote connections

C.

Implementing multi-factor authentication

D.

Updating remote desktop software

Buy Now
Questions 360

Which of the following is MOST helpful in identifying gaps between the current and desired state of the IT risk environment?

Options:

A.

Analyzing risk appetite and tolerance levels

B.

Assessing identified risk and recording results in the risk register

C.

Evaluating risk scenarios and assessing current controls

D.

Reviewing guidance from industry best practices and standards

Buy Now
Questions 361

An organization is implementing internet of Things (loT) technology to control temperature and lighting in its headquarters. Which of the following should be of GREATEST concern?

Options:

A.

Insufficient network isolation

B.

impact on network performance

C.

insecure data transmission protocols

D.

Lack of interoperability between sensors

Buy Now
Questions 362

Which of the following is the MOST important characteristic of a key risk indicator (KRI) to enable decision-making?

Options:

A.

Monitoring the risk until the exposure is reduced

B.

Setting minimum sample sizes to ensure accuracy

C.

Listing alternative causes for risk events

D.

Illustrating changes in risk trends

Buy Now
Questions 363

When creating a separate IT risk register for a large organization, which of the following is MOST important to consider with regard to the existing corporate risk 'register?

Options:

A.

Leveraging business risk professionals

B.

Relying on generic IT risk scenarios

C.

Describing IT risk in business terms

D.

Using a common risk taxonomy

Buy Now
Questions 364

Which of the following is the BEST way for a risk practitioner to verify that management has addressed control issues identified during a previous external audit?

Options:

A.

Interview control owners.

B.

Observe the control enhancements in operation.

C.

Inspect external audit documentation.

D.

Review management's detailed action plans.

Buy Now
Questions 365

Which of these documents is MOST important to request from a cloud service

provider during a vendor risk assessment?

Options:

A.

Nondisclosure agreement (NDA)

B.

Independent audit report

C.

Business impact analysis (BIA)

D.

Service level agreement (SLA)

Buy Now
Questions 366

A risk practitioner has been notified that an employee sent an email in error containing customers' personally identifiable information (Pll). Which of the following is the risk practitioner's BEST course of action?

Options:

A.

Report it to the chief risk officer.

B.

Advise the employee to forward the email to the phishing team.

C.

follow incident reporting procedures.

D.

Advise the employee to permanently delete the email.

Buy Now
Questions 367

Which of the following attributes of a key risk indicator (KRI) is MOST important?

Options:

A.

Repeatable

B.

Automated

C.

Quantitative

D.

Qualitative

Buy Now
Questions 368

Which of the following is the PRIMARY reason for logging in a production database environment?

Options:

A.

To provide evidence of activities

B.

To prevent illicit actions of database administrators (DBAs)

C.

To ensure that changes are authorized

D.

To ensure that changes made are correctly applied

Buy Now
Questions 369

Which of the following would BEST support the integrity of online financial transactions?

Options:

A.

Developing an integrated audit facility

B.

Implementing audit trail logs

C.

Deploying multi-factor authentication (MFA)

D.

Implementing blockchain technology

Buy Now
Questions 370

A change management process has recently been updated with new testing procedures. What is the NEXT course of action?

Options:

A.

Monitor processes to ensure recent updates are being followed.

B.

Communicate to those who test and promote changes.

C.

Conduct a cost-benefit analysis to justify the cost of the control.

D.

Assess the maturity of the change management process.

Buy Now
Questions 371

The PRIMARY reason for tracking the status of risk mitigation plans is to ensure:

Options:

A.

the proposed controls are implemented as scheduled.

B.

security controls are tested prior to implementation.

C.

compliance with corporate policies.

D.

the risk response strategy has been decided.

Buy Now
Questions 372

The risk associated with an asset after controls are applied can be expressed as:

Options:

A.

a function of the cost and effectiveness of controls.

B.

the likelihood of a given threat.

C.

a function of the likelihood and impact.

D.

the magnitude of an impact.

Buy Now
Questions 373

A vendor's planned maintenance schedule will cause a critical application to temporarily lose failover capabilities. Of the following, who should approve this proposed schedule?

Options:

A.

IT infrastructure manager

B.

Chief Risk Officer (CRO)

C.

Business continuity manager

D.

Business application owner

Buy Now
Questions 374

An organization has recently hired a large number of part-time employees. During the annual audit, it was discovered that many user IDs and passwords were documented in procedure manuals for use by the part-time employees. Which of the following BEST describes this situation?

Options:

A.

Threat

B.

Risk

C.

Vulnerability

D.

Policy violation

Buy Now
Questions 375

When developing a risk awareness training program, which of the following training topics would BEST facilitate a thorough understanding of risk scenarios?

Options:

A.

Mapping threats to organizational objectives

B.

Reviewing past audits

C.

Analyzing key risk indicators (KRIs)

D.

Identifying potential sources of risk

Buy Now
Questions 376

Which of the following is the BEST way to determine the potential organizational impact of emerging privacy regulations?

Options:

A.

Evaluate the security architecture maturity.

B.

Map the new requirements to the existing control framework.

C.

Charter a privacy steering committee.

D.

Conduct a privacy impact assessment (PIA).

Buy Now
Questions 377

The MAIN purpose of having a documented risk profile is to:

Options:

A.

comply with external and internal requirements.

B.

enable well-informed decision making.

C.

prioritize investment projects.

D.

keep the risk register up-to-date.

Buy Now
Questions 378

Options:

A.

To gain stakeholder support for the implementation of controls

B.

To address multiple risk scenarios mitigated by technical controls

C.

To comply with industry best practices by balancing multiple types of controls

D.

To improve the effectiveness of controls that mitigate risk

Buy Now
Questions 379

Which of the following is MOST essential for an effective change control environment?

Options:

A.

Business management approval of change requests

B.

Separation of development and production environments

C.

Requirement of an implementation rollback plan

D.

IT management review of implemented changes

Buy Now
Questions 380

An organization moved its payroll system to a Software as a Service (SaaS) application. A new data privacy regulation stipulates that data can only be processed within the countrywhere it is collected. Which of the following should be done FIRST when addressing this situation?

Options:

A.

Analyze data protection methods.

B.

Understand data flows.

C.

Include a right-to-audit clause.

D.

Implement strong access controls.

Buy Now
Questions 381

After undertaking a risk assessment of a production system, the MOST appropriate action is for the risk manager to:

Options:

A.

recommend a program that minimizes the concerns of that production system.

B.

inform the development team of the concerns, and together formulate risk reduction measures.

C.

inform the process owner of the concerns and propose measures to reduce them

D.

inform the IT manager of the concerns and propose measures to reduce them.

Buy Now
Questions 382

Which of the following BEST contributes to the implementation of an effective risk response action plan?

Options:

A.

An IT tactical plan

B.

Disaster recovery and continuity testing

C.

Assigned roles and responsibilities

D.

A business impact analysis

Buy Now
Questions 383

When formulating a social media policy lo address information leakage, which of the following is the MOST important concern to address?

Options:

A.

Sharing company information on social media

B.

Sharing personal information on social media

C.

Using social media to maintain contact with business associates

D.

Using social media for personal purposes during working hours

Buy Now
Questions 384

Which of the following would be a weakness in procedures for controlling the migration of changes to production libraries?

Options:

A.

The programming project leader solely reviews test results before approving the transfer to production.

B.

Test and production programs are in distinct libraries.

C.

Only operations personnel are authorized to access production libraries.

D.

A synchronized migration of executable and source code from the test environment to the production environment is allowed.

Buy Now
Questions 385

Which of the following is the MOST important topic to cover in a risk awareness training program for all staff?

Options:

A.

Internal and external information security incidents

B.

The risk department's roles and responsibilities

C.

Policy compliance requirements and exceptions process

D.

The organization's information security risk profile

Buy Now
Questions 386

An organization's risk register contains a large volume of risk scenarios that senior management considers overwhelming. Which of the following would BEST help to improve the risk register?

Options:

A.

Analyzing the residual risk components

B.

Performing risk prioritization

C.

Validating the risk appetite level

D.

Conducting a risk assessment

Buy Now
Questions 387

Which of the following BEST enables a risk practitioner to understand management's approach to organizational risk?

Options:

A.

Organizational structure and job descriptions

B.

Risk appetite and risk tolerance

C.

Industry best practices for risk management

D.

Prior year's risk assessment results

Buy Now
Questions 388

A global organization has implemented an application that does not address all privacy requirements across multiple jurisdictions. Which of the following risk responses has the organization adopted with regard to privacy requirements?

Options:

A.

Risk avoidance

B.

Risk transfer

C.

Risk mitigation

D.

Risk acceptance

Buy Now
Questions 389

An organization with a large number of applications wants to establish a security risk assessment program. Which of the following would provide the MOST useful information when determining the frequency of risk assessments?

Options:

A.

Feedback from end users

B.

Results of a benchmark analysis

C.

Recommendations from internal audit

D.

Prioritization from business owners

Buy Now
Questions 390

Which of the following is the GREATEST concern associated with the use of artificial intelligence (AI) language models?

Options:

A.

The model could be hacked or exploited.

B.

The model could be used to generate inaccurate content.

C.

Staff could become overly reliant on the model.

D.

It could lead to biased recommendations.

Buy Now
Questions 391

Which of the following should be a risk practitioner's NEXT action after identifying a high probability of data loss in a system?

Options:

A.

Enhance the security awareness program.

B.

Increase the frequency of incident reporting.

C.

Purchase cyber insurance from a third party.

D.

Conduct a control assessment.

Buy Now
Questions 392

What should a risk practitioner do FIRST upon learning a risk treatment owner has implemented a different control than what was specified in the IT risk action plan?

Options:

A.

Seek approval from the control owner.

B.

Update the action plan in the risk register.

C.

Reassess the risk level associated with the new control.

D.

Validate that the control has an established testing method.

Buy Now
Questions 393

An organization has identified the need to implement an asset tiering model to establish the appropriate level of impact. Which of the following is the MOST effective risk assessment methodology for a risk practitioner to use for this initiative?

Options:

A.

Qualitative method

B.

Industry calibration method

C.

Threat-based method

D.

Quantitative method

Buy Now
Questions 394

A risk practitioner has observed that there is an increasing trend of users sending sensitive information by email without using encryption. Which of the following would be the MOST effective approach to mitigate the risk associated with data loss?

Options:

A.

Implement a tool to create and distribute violation reports

B.

Raise awareness of encryption requirements for sensitive data.

C.

Block unencrypted outgoing emails which contain sensitive data.

D.

Implement a progressive disciplinary process for email violations.

Buy Now
Questions 395

Options:

A.

Conduct targeted risk assessments.

B.

Recommend management accept the low risk scenarios.

C.

Assess management's risk tolerance.

D.

Propose mitigating controls.

Buy Now
Questions 396

Which of the following is the BEST measure of the effectiveness of an employee deprovisioning process?

Options:

A.

Number of days taken to remove access after staff separation dates

B.

Number of days taken for IT to remove access after receipt of HR instructions

C.

Number of termination requests processed per reporting period

D.

Number of days taken for HR to provide instructions to IT after staff separation dates

Buy Now
Questions 397

Which of the following presents the GREATEST challenge to managing an organization's end-user devices?

Options:

A.

Incomplete end-user device inventory

B.

Unsupported end-user applications

C.

Incompatible end-user devices

D.

Multiple end-user device models

Buy Now
Questions 398

Which of the following BEST protects an organization against breaches when using a software as a service (SaaS) application?

Options:

A.

Control self-assessment (CSA)

B.

Security information and event management (SIEM) solutions

C.

Data privacy impact assessment (DPIA)

D.

Data loss prevention (DLP) tools

Buy Now
Questions 399

Which of the following approaches would BEST help to identify relevant risk scenarios?

Options:

A.

Engage line management in risk assessment workshops.

B.

Escalate the situation to risk leadership.

C.

Engage internal audit for risk assessment workshops.

D.

Review system and process documentation.

Buy Now
Questions 400

Who is accountable for the process when an IT stakeholder operates a key control to address a risk scenario?

Options:

A.

Data custodian

B.

Risk owner

C.

System owner

D.

IT manager

Buy Now
Questions 401

An organization has outsourced a critical process involving highly regulated data to a third party with servers located in a foreign country. Who is accountable for the confidentiality of this data?

Options:

A.

Third-party data custodian

B.

Data custodian

C.

Regional office executive

D.

Data owner

Buy Now
Questions 402

Which of the following is the MOST important information to cover a business continuity awareness Ira nine, program for all employees of the organization?

Options:

A.

Recovery time objectives (RTOs)

B.

Segregation of duties

C.

Communication plan

D.

Critical asset inventory

Buy Now
Questions 403

Which of the following is MOST important for mitigating ethical risk when establishing accountability for control ownership?

Options:

A.

Ensuring processes are documented to enable effective control execution

B.

Ensuring regular risk messaging is Included in business communications from leadership

C.

Ensuring schedules and deadlines for control-related deliverables are strictly monitored

D.

Ensuring performance metrics balance business goals with risk appetite

Buy Now
Questions 404

The BEST way to determine the likelihood of a system availability risk scenario is by assessing the:

Options:

A.

availability of fault tolerant software.

B.

strategic plan for business growth.

C.

vulnerability scan results of critical systems.

D.

redundancy of technical infrastructure.

Buy Now
Questions 405

When determining risk ownership, the MAIN consideration should be:

Options:

A.

who owns the business process.

B.

the amount of residual risk.

C.

who is responsible for risk mitigation.

D.

the total cost of risk treatment.

Buy Now
Questions 406

Which of the following BEST enables detection of ethical violations committed by employees?

Options:

A.

Transaction log monitoring

B.

Access control attestation

C.

Periodic job rotation

D.

Whistleblower program

Buy Now
Questions 407

Which of the following is the MOST important objective of regularly presenting the project risk register to the project steering committee?

Options:

A.

To allocate budget for resolution of risk issues

B.

To determine if new risk scenarios have been identified

C.

To ensure the project timeline is on target

D.

To track the status of risk mitigation actions

Buy Now
Questions 408

Which of the following is the MOST likely reason an organization would engage an independent reviewer to assess its IT risk management program?

Options:

A.

To ensure IT risk management is focused on mitigating emerging risk

B.

To confirm that IT risk assessment results are expressed in quantitative terms

C.

To evaluate threats to the organization's operations and strategy

D.

To identify gaps in the alignment of IT risk management processes and strategy

Buy Now
Questions 409

A root because analysis indicates a major service disruption due to a lack of competency of newly hired IT system administrators Who should be accountable for resolving the situation?

Options:

A.

HR training director

B.

Business process owner

C.

HR recruitment manager

D.

Chief information officer (CIO)

Buy Now
Questions 410

An organization has asked an IT risk practitioner to conduct an operational risk assessment on an initiative to outsource the organization's customer service operations overseas. Which of the following would MOST significantly impact management's decision?

Options:

A.

Time zone difference of the outsourcing location

B.

Ongoing financial viability of the outsourcing company

C.

Cross-border information transfer restrictions in the outsourcing country

D.

Historical network latency between the organization and outsourcing location

Buy Now
Questions 411

The GREATEST benefit of including low-probability, high-impact events in a risk assessment is the ability to:

Options:

A.

develop a comprehensive risk mitigation strategy

B.

develop understandable and realistic risk scenarios

C.

identify root causes for relevant events

D.

perform an aggregated cost-benefit analysis

Buy Now
Questions 412

Which of the following is MOST important to the integrity of a security log?

Options:

A.

Least privilege access

B.

Inability to edit

C.

Ability to overwrite

D.

Encryption

Buy Now
Questions 413

Which of the following is the BEST way to help ensure risk will be managed properly after a business process has been re-engineered?

Options:

A.

Reassessing control effectiveness of the process

B.

Conducting a post-implementation review to determine lessons learned

C.

Reporting key performance indicators (KPIs) for core processes

D.

Establishing escalation procedures for anomaly events

Buy Now
Questions 414

A recently purchased IT application does not meet project requirements. Of the following, who is accountable for the potential impact?

Options:

A.

Business analyst

B.

Project sponsor

C.

IT project team

D.

IT project management office (PMO)

Buy Now
Questions 415

A chief information officer (CIO) has identified risk associated with shadow systems being maintained by business units to address specific functionality gaps in the organization'senterprise resource planning (ERP) system. What is the BEST way to reduce this risk going forward?

Options:

A.

Align applications to business processes.

B.

Implement an enterprise architecture (EA).

C.

Define the software development life cycle (SDLC).

D.

Define enterprise-wide system procurement requirements.

Buy Now
Questions 416

A business impact analysis (BIA) has documented the duration of maximum allowable outage for each of an organization's applications. Which of the following MUST be aligned with the maximum allowable outage?

Options:

A.

Mean time to restore (MTTR)

B.

Recovery time objective (RTO)

C.

Recovery point objective (RPO)

D.

Mean time to detect (MTTD)

Buy Now
Questions 417

Which of the following is the BEST way to validate privileged access to database accounts?

Options:

A.

Regular reviews of privileged access

B.

Confirmation from users with privileged access

C.

Management approval of access requests

D.

Confirmation from the database administrator (DBA)

Buy Now
Questions 418

During a risk assessment, the risk practitioner finds a new risk scenario without controls has been entered into the risk register. Which of the following is the MOST appropriate action?

Options:

A.

Include the new risk scenario in the current risk assessment.

B.

Postpone the risk assessment until controls are identified.

C.

Request the risk scenario be removed from the register.

D.

Exclude the new risk scenario from the current risk assessment

Buy Now
Questions 419

WhichT5f the following is the MOST effective way to promote organization-wide awareness of data security in response to an increase in regulatory penalties for data leakage?

Options:

A.

Enforce sanctions for noncompliance with security procedures.

B.

Conduct organization-w>de phishing simulations.

C.

Require training on the data handling policy.

D.

Require regular testing of the data breach response plan.

Buy Now
Questions 420

A business is conducting a proof of concept on a vendor’s AI technology. Which of the following is the MOST important consideration for managing risk?

Options:

A.

Use of a non-production environment

B.

Regular security updates

C.

Third-party management plan

D.

Adequate vendor support

Buy Now
Questions 421

Which of the following provides the MOST up-to-date information about the effectiveness of an organization's overall IT control environment?

Options:

A.

Key performance indicators (KPIs)

B.

Risk heat maps

C.

Internal audit findings

D.

Periodic penetration testing

Buy Now
Questions 422

Which of the following would provide the MOST helpful input to develop risk scenarios associated with hosting an organization's key IT applications in a cloud environment?

Options:

A.

Reviewing the results of independent audits

B.

Performing a site visit to the cloud provider's data center

C.

Performing a due diligence review

D.

Conducting a risk workshop with key stakeholders

Buy Now
Questions 423

Implementing which of the following controls would BEST reduce the impact of a vulnerability that has been exploited?

Options:

A.

Detective control

B.

Deterrent control

C.

Preventive control

D.

Corrective control

Buy Now
Questions 424

What is the PRIMARY reason to periodically review key performance indicators (KPIs)?

Options:

A.

Ensure compliance.

B.

Identify trends.

C.

Promote a risk-aware culture.

D.

Optimize resources needed for controls

Buy Now
Questions 425

Concerned about system load capabilities during the month-end close process, management requires monitoring of the average time to complete tasks and monthly reporting of the findings. What type of measure has been established?

Options:

A.

Service level agreement (SLA)

B.

Critical success factor (CSF)

C.

Key risk indicator (KRI)

D.

Key performance indicator (KPI)

Buy Now
Questions 426

Which of the following presents the GREATEST risk to change control in business application development over the complete life cycle?

Options:

A.

Emphasis on multiple application testing cycles

B.

Lack of an integrated development environment (IDE) tool

C.

Introduction of requirements that have not been approved

D.

Bypassing quality requirements before go-live

Buy Now
Questions 427

Which of the following would be of GREATEST concern regarding an organization's asset management?

Options:

A.

Lack of a mature records management program

B.

Lack of a dedicated asset management team

C.

Decentralized asset lists

D.

Incomplete asset inventory

Buy Now
Questions 428

Which of the following provides a risk practitioner with the MOST reliable evidence of a third party's ability to protect the confidentiality of sensitive corporate information?

Options:

A.

A signed nondisclosure agreement (NDA)

B.

Control self-assessment (CSA) results

C.

External audit reports

D.

Internal audit reports

Buy Now
Questions 429

Which of the following BEST assists in justifying an investment in automated controls?

Options:

A.

Cost-benefit analysis

B.

Alignment of investment with risk appetite

C.

Elimination of compensating controls

D.

Reduction in personnel costs

Buy Now
Questions 430

An organization has made a decision to purchase a new IT system. During when phase of the system development life cycle (SDLC) will identified risk MOST likely lead to architecture and design trade-offs?

Options:

A.

Acquisition

B.

Implementation

C.

Initiation

D.

Operation and maintenance

Buy Now
Questions 431

A risk practitioner is MOST likely to use a SWOT analysis to assist with which risk process?

Options:

A.

Risk assessment

B.

Risk reporting

C.

Risk mitigation

D.

Risk identification

Buy Now
Questions 432

When assessing the maturity level of an organization's risk management framework, which of the following should be of GREATEST concern to a risk practitioner?

Options:

A.

Reliance on qualitative analysis methods

B.

Lack of a governance, risk, and compliance (GRC) tool

C.

Lack of senior management involvement

D.

Use of multiple risk registers

Buy Now
Questions 433

An organization's senior management is considering whether to acquire cyber insurance. Which of the following is the BEST way for the risk practitioner to enable management’s decision?

Options:

A.

Perform a cost-benefit analysis.

B.

Conduct a SWOT analysis.

C.

Provide data on the number of risk events from the last year.

D.

Report on recent losses experienced by industry peers.

Buy Now
Questions 434

When developing a risk awareness training program, which of the following is the BEST way to promote a risk-aware culture?

Options:

A.

Emphasize individual responsibility for managing risk.

B.

Communicate incident escalation procedures.

C.

Illustrate methods to identify threats and vulnerabilities.

D.

Challenge the effectiveness of business processes.

Buy Now
Questions 435

Which of the following is the GREATEST benefit of updating the risk register to include outcomes from a risk assessment?

Options:

A.

It maintains evidence of compliance with risk policy.

B.

It facilitates timely risk-based decisions.

C.

It validates the organization's risk appetite.

D.

It helps to mitigate internal and external risk factors.

Buy Now
Questions 436

Which of the following is the PRIMARY reason for sharing risk assessment reports with senior stakeholders?

Options:

A.

To support decision-making for risk response

B.

To hold risk owners accountable for risk action plans

C.

To secure resourcing for risk treatment efforts

D.

To enable senior management to compile a risk profile

Buy Now
Questions 437

Senior management has asked a risk practitioner to develop technical risk scenarios related to a recently developed enterprise resource planning (ERP) system. These scenarios will be owned by the system manager. Which of the following would be the BEST method to use when developing the scenarios?

Options:

A.

Cause-and-effect diagram

B.

Delphi technique

C.

Bottom-up approach

D.

Top-down approach

Buy Now
Questions 438

An organization is analyzing the risk of shadow IT usage. Which of the following is the MOST important input into the assessment?

Options:

A.

Business benefits of shadow IT

B.

Application-related expresses

C.

Classification of the data

D.

Volume of data

Buy Now
Questions 439

Which of the following is the PRIMARY advantage of aligning generic risk scenarios with business objectives?

Options:

A.

It establishes where controls should be implemented.

B.

It ensures relevance to the organization.

C.

It quantifies the materiality of any losses that may occur.

D.

It provides better estimates of the impact of current threats.

Buy Now
Questions 440

Which of the following will BEST help to ensure key risk indicators (KRIs) provide value to risk owners?

Options:

A.

Ongoing training

B.

Timely notification

C.

Return on investment (ROI)

D.

Cost minimization

Buy Now
Questions 441

Senior management is deciding whether to share confidential data with the organization's business partners. The BEST course of action for a risk practitioner would be to submit a report to senior management containing the:

Options:

A.

possible risk and suggested mitigation plans.

B.

design of controls to encrypt the data to be shared.

C.

project plan for classification of the data.

D.

summary of data protection and privacy legislation.

Buy Now
Questions 442

An organizational policy requires critical security patches to be deployed in production within three weeks of patch availability. Which of the following is the BEST metric to verify adherence to the policy?

Options:

A.

Maximum time gap between patch availability and deployment

B.

Percentage of critical patches deployed within three weeks

C.

Minimum time gap between patch availability and deployment

D.

Number of critical patches deployed within three weeks

Buy Now
Questions 443

It is MOST important to the effectiveness of an IT risk management function that the associated processes are:

Options:

A.

aligned to an industry-accepted framework.

B.

reviewed and approved by senior management.

C.

periodically assessed against regulatory requirements.

D.

updated and monitored on a continuous basis.

Buy Now
Questions 444

Which of the following scenarios presents the GREATEST risk for a global organization when implementing a data classification policy?

Options:

A.

Data encryption has not been applied to all sensitive data across the organization.

B.

There are many data assets across the organization that need to be classified.

C.

Changes to information handling procedures are not documented.

D.

Changes to data sensitivity during the data life cycle have not been considered.

Buy Now
Questions 445

Which of the following is the MOST important concern when assigning multiple risk owners for an identified risk?

Options:

A.

Accountability may not be clearly defined.

B.

Risk ratings may be inconsistently applied.

C.

Different risk taxonomies may be used.

D.

Mitigation efforts may be duplicated.

Buy Now
Questions 446

Which of the following should be the PRIMARY area of focus when reporting changes to an organization's risk profile to executive management?

Options:

A.

Risk management resources

B.

Risk tolerance

C.

Cyberattack threats

D.

Risk trends

Buy Now
Questions 447

Which of the following is the MOST important consideration when performing a risk assessment of a fire suppression system within a data center?

Options:

A.

Insurance coverage

B.

Onsite replacement availability

C.

Maintenance procedures

D.

Installation manuals

Buy Now
Questions 448

An organization has allowed several employees to retire early in order to avoid layoffs Many of these employees have been subject matter experts for critical assets Which type of risk is MOST likely to materialize?

Options:

A.

Confidentiality breach

B.

Institutional knowledge loss

C.

Intellectual property loss

D.

Unauthorized access

Buy Now
Questions 449

A risk practitioner is involved in a comprehensive overhaul of the organizational risk management program. Which of the following should be reviewed FIRST to help identify relevant IT risk scenarios?

Options:

A.

Technology threats

B.

IT assets

C.

Security vulnerabilities

D.

IT risk register

Buy Now
Questions 450

Which of the following BEST enables an organization to determine whether external emerging risk factors will impact the organization's risk profile?

Options:

A.

Control identification and mitigation

B.

Adoption of a compliance-based approach

C.

Prevention and detection techniques

D.

Scenario analysis and stress testing

Buy Now
Questions 451

Following the implementation of an Internet of Things (loT) solution, a risk practitioner identifies new risk factors with impact to existing controls. Which of the following is MOST important to include in a report to stakeholders?

Options:

A.

Identified vulnerabilities

B.

Business managers' concerns

C.

Changes to residual risk

D.

Risk strategies of peer organizations

Buy Now
Questions 452

A global organization is considering the transfer of its customer information systems to an overseas cloud service provider in the event of a disaster. Which of the following should be the MOST important risk consideration?

Options:

A.

Regulatory restrictions for cross-border data transfer

B.

Service level objectives in the vendor contract

C.

Organizational culture differences between each country

D.

Management practices within each company

Buy Now
Questions 453

Who is MOST important lo include in the assessment of existing IT risk scenarios?

Options:

A.

Technology subject matter experts

B.

Business process owners

C.

Business users of IT systems

D.

Risk management consultants

Buy Now
Questions 454

A new software package that could help mitigate risk in an organization has become available. Which of the following is the risk practitioner's BEST course of action?

Options:

A.

Perform a business impact analysis (BIA).

B.

Perform a cost-benefit analysis.

C.

Review industry best practice.

D.

Review risk governance policies.

Buy Now
Questions 455

What should be the PRIMARY driver for periodically reviewing and adjusting key risk indicators (KRIs)?

Options:

A.

Risk impact

B.

Risk likelihood

C.

Risk appropriate

D.

Control self-assessments (CSAs)

Buy Now
Questions 456

Which of the following BEST indicates whether security awareness training is effective?

Options:

A.

User self-assessment

B.

User behavior after training

C.

Course evaluation

D.

Quality of training materials

Buy Now
Questions 457

Which of the following is the MOST effective way to help ensure an organization's current risk scenarios are relevant?

Options:

A.

Adoption of industry best practices

B.

Involvement of stakeholders in risk assessment

C.

Review of risk scenarios by independent parties

D.

Documentation of potential risk in business cases

Buy Now
Questions 458

Which of the following key risk indicators (KRIs) is MOST effective for monitoring risk related to a bring your own device (BYOD) program?

Options:

A.

Number of users who have signed a BYOD acceptable use policy

B.

Number of incidents originating from BYOD devices

C.

Budget allocated to the BYOD program security controls

D.

Number of devices enrolled in the BYOD program

Buy Now
Questions 459

An IT license audit has revealed that there are several unlicensed copies of co be to:

Options:

A.

immediately uninstall the unlicensed software from the laptops

B.

centralize administration rights on laptops so that installations are controlled

C.

report the issue to management so appropriate action can be taken.

D.

procure the requisite licenses for the software to minimize business impact.

Buy Now
Questions 460

Which of the following should be included in a risk assessment report to BEST facilitate senior management's understanding of the results?

Options:

A.

Benchmarking parameters likely to affect the results

B.

Tools and techniques used by risk owners to perform the assessments

C.

A risk heat map with a summary of risk identified and assessed

D.

The possible impact of internal and external risk factors on the assessment results

Buy Now
Questions 461

Which of the following is the MOST important information to be communicated during security awareness training?

Options:

A.

Management's expectations

B.

Corporate risk profile

C.

Recent security incidents

D.

The current risk management capability

Buy Now
Questions 462

An organization is planning to acquire a new financial system. Which of the following stakeholders would provide the MOST relevant information for analyzing the risk associated with the new IT solution?

Options:

A.

Project sponsor

B.

Process owner

C.

Risk manager

D.

Internal auditor

Buy Now
Questions 463

Which of the following is the GREATEST risk associated with the transition of a sensitive data backup solution from on-premise to a cloud service provider?

Options:

A.

More complex test restores

B.

Inadequate service level agreement (SLA) with the provider

C.

More complex incident response procedures

D.

Inadequate data encryption

Buy Now
Questions 464

Which of the following is the BEST key control indicator (KCI) for risk related to IT infrastructure failure?

Options:

A.

Number of times the recovery plan is reviewed

B.

Number of successful recovery plan tests

C.

Percentage of systems with outdated virus protection

D.

Percentage of employees who can work remotely

Buy Now
Questions 465

Which of the following MOST effectively limits the impact of a ransomware attack?

Options:

A.

Cyber insurance

B.

Cryptocurrency reserve

C.

Data backups

D.

End user training

Buy Now
Questions 466

Which of the following is the BEST approach for performing a business impact analysis (BIA) of a supply-chain management application?

Options:

A.

Reviewing the organization's policies and procedures

B.

Interviewing groups of key stakeholders

C.

Circulating questionnaires to key internal stakeholders

D.

Accepting IT personnel s view of business issues

Buy Now
Questions 467

Which of the following resources is MOST helpful to a risk practitioner when updating the likelihood rating in the risk register?

Options:

A.

Risk control assessment

B.

Audit reports with risk ratings

C.

Penetration test results

D.

Business impact analysis (BIA)

Buy Now
Questions 468

A peer review of a risk assessment finds that a relevant threat community was not included. Mitigation of the risk will require substantial changes to a software application. Which of the following is the BEST course of action?

Options:

A.

Ask the business to make a budget request to remediate the problem.

B.

Build a business case to remediate the fix.

C.

Research the types of attacks the threat can present.

D.

Determine the impact of the missing threat.

Buy Now
Questions 469

From a business perspective, which of the following is the MOST important objective of a disaster recovery test?

Options:

A.

The organization gains assurance it can recover from a disaster

B.

Errors are discovered in the disaster recovery process.

C.

All business-critical systems are successfully tested.

D.

All critical data is recovered within recovery time objectives (RTOs).

Buy Now
Questions 470

Which of the following would be considered a vulnerability?

Options:

A.

Delayed removal of employee access

B.

Authorized administrative access to HR files

C.

Corruption of files due to malware

D.

Server downtime due to a denial of service (DoS) attack

Buy Now
Questions 471

A risk assessment has identified that departments have installed their own WiFi access points on the enterprise network. Which of the following would be MOST important to include in a report to senior management?

Options:

A.

The network security policy

B.

Potential business impact

C.

The WiFi access point configuration

D.

Planned remediation actions

Buy Now
Questions 472

Which of the following can be affected by the cost of risk mitigation alternatives?

Options:

A.

Risk appetite

B.

Risk factors

C.

Risk tolerance

D.

Current risk rating

Buy Now
Questions 473

A bank is experiencing an increasing incidence of customer identity theft. Which of the following is the BEST way to mitigate this risk?

Options:

A.

Implement monitoring techniques.

B.

Implement layered security.

C.

Outsource to a local processor.

D.

Conduct an awareness campaign.

Buy Now
Questions 474

An organization's financial analysis department uses an in-house forecasting application for business projections. Who is responsible for defining access roles to protect the sensitive data within this application?

Options:

A.

IT risk manager

B.

IT system owner

C.

Information security manager

D.

Business owner

Buy Now
Questions 475

Which of the following is MOST helpful when determining whether a system security control is effective?

Options:

A.

Control standard operating procedures

B.

Latest security assessment

C.

Current security threat report

D.

Updated risk register

Buy Now
Questions 476

The BEST way to demonstrate alignment of the risk profile with business objectives is through:

Options:

A.

risk scenarios.

B.

risk tolerance.

C.

risk policy.

D.

risk appetite.

Buy Now
Questions 477

Risk mitigation is MOST effective when which of the following is optimized?

Options:

A.

Operational risk

B.

Residual risk

C.

Inherent risk

D.

Regulatory risk

Buy Now
Questions 478

Which of the following is MOST important to ensure before using risk reports in decision making?

Options:

A.

Root cause analysis is included.

B.

Risk analysis results are validated.

C.

Real-time risk information is provided.

D.

Quantitative risk data is provided.

Buy Now
Questions 479

Which of the following is the MOST effective way for a large and diversified organization to minimize risk associated with unauthorized software on company devices?

Options:

A.

Scan end points for applications not included in the asset inventory.

B.

Prohibit the use of cloud-based virtual desktop software.

C.

Conduct frequent reviews of software licenses.

D.

Perform frequent internal audits of enterprise IT infrastructure.

Buy Now
Questions 480

Key risk indicators (KRIs) are MOST useful during which of the following risk management phases?

Options:

A.

Monitoring

B.

Analysis

C.

Identification

D.

Response selection

Buy Now
Questions 481

Which of the following is a risk practitioner's BEST course of action after identifying risk scenarios related to noncompliance with new industry regulations?

Options:

A.

Escalate to senior management.

B.

Transfer the risk.

C.

Implement monitoring controls.

D.

Recalculate the risk.

Buy Now
Questions 482

Which of the following will BEST support management reporting on risk?

Options:

A.

Control self-assessment (CSA)

B.

Risk policy requirements

C.

A risk register

D.

Key performance indicators (KPIs)

Buy Now
Questions 483

An organization wants to grant remote access to a system containing sensitive data to an overseas third party. Which of the following should be of GREATEST concern to management?

Options:

A.

Transborder data transfer restrictions

B.

Differences in regional standards

C.

Lack of monitoring over vendor activities

D.

Lack of after-hours incident management support

Buy Now
Questions 484

Which of the following is the MOST important outcome of reviewing the risk management process?

Options:

A.

Assuring the risk profile supports the IT objectives

B.

Improving the competencies of employees who performed the review

C.

Determining what changes should be made to IS policies to reduce risk

D.

Determining that procedures used in risk assessment are appropriate

Buy Now
Questions 485

Which of the following BEST enables a risk practitioner to enhance understanding of risk among stakeholders?

Options:

A.

Key risk indicators (KRIs)

B.

Risk scenarios

C.

Business impact analysis (BIA)

D.

Threat analysis

Buy Now
Questions 486

During a risk assessment of a financial institution, a risk practitioner discovers that tellers can initiate and approve transactions of significant value. This team is also responsible for ensuring transactions are recorded and balances are reconciled by the end of the day. Which of the following is the risk practitioner's BEST recommendation to mitigate the associated risk?

Options:

A.

Implement continuous monitoring.

B.

Require a second level of approval.

C.

Implement separation of duties.

D.

Require a code of ethics.

Buy Now
Questions 487

Which of the following BEST enables the timely detection of changes in the security control environment?

Options:

A.

Control self-assessment (CSA)

B.

Log analysis

C.

Security control reviews

D.

Random sampling checks

Buy Now
Questions 488

Which of the following is the BEST way to determine the value of information assets for risk management purposes?

Options:

A.

Assess the loss impact if the information is inadvertently disclosed

B.

Calculate the overhead required to keep the information secure throughout its life cycle

C.

Calculate the replacement cost of obtaining the information from alternate sources

D.

Assess the market value offered by consumers of the information

Buy Now
Questions 489

Whether the results of risk analyses should be presented in quantitative or qualitative terms should be based PRIMARILY on the:

Options:

A.

requirements of management.

B.

specific risk analysis framework being used.

C.

organizational risk tolerance

D.

results of the risk assessment.

Buy Now
Questions 490

Which of the following is the MOST important enabler of effective risk management?

Options:

A.

User awareness of policies and procedures

B.

Implementation of proper controls

C.

Senior management support

D.

Continuous monitoring of threats and vulnerabilities

Buy Now
Questions 491

Which of the following is the GREATEST benefit to an organization when updates to the risk register are made promptly after the completion of a risk assessment?

Options:

A.

Improved senior management communication

B.

Optimized risk treatment decisions

C.

Enhanced awareness of risk management

D.

Improved collaboration among risk professionals

Buy Now
Questions 492

Which of the following BEST enables risk-based decision making in support of a business continuity plan (BCP)?

Options:

A.

Impact analysis

B.

Control analysis

C.

Root cause analysis

D.

Threat analysis

Buy Now
Questions 493

Which of the following is the BEST indication that key risk indicators (KRls) should be revised?

Options:

A.

A decrease in the number of critical assets covered by risk thresholds

B.

An Increase In the number of risk threshold exceptions

C.

An increase in the number of change events pending management review

D.

A decrease In the number of key performance indicators (KPls)

Buy Now
Questions 494

Which of the following risk impacts should be the PRIMARY consideration for determining recovery priorities in a disaster recovery situation?

Options:

A.

Data security

B.

Recovery costs

C.

Business disruption

D.

Recovery resource availability

Buy Now
Questions 495

Which of the following would BEST enable a risk practitioner to embed risk management within the organization?

Options:

A.

Provide risk management feedback to key stakeholders.

B.

Collect and analyze risk data for report generation.

C.

Monitor and prioritize risk data according to the heat map.

D.

Engage key stakeholders in risk management practices.

Buy Now
Questions 496

Which of the following BEST indicates the effectiveness of anti-malware software?

Options:

A.

Number of staff hours lost due to malware attacks

B.

Number of downtime hours in business critical servers

C.

Number of patches made to anti-malware software

D.

Number of successful attacks by malicious software

Buy Now
Questions 497

The BEST key performance indicator (KPI) for monitoring adherence to an organization's user accounts provisioning practices is the percentage of:

Options:

A.

accounts without documented approval

B.

user accounts with default passwords

C.

active accounts belonging to former personnel

D.

accounts with dormant activity.

Buy Now
Questions 498

An organization is preparing to transfer a large number of customer service representatives to the sales department. Of the following, who is responsible for mitigating the risk associated with residual system access?

Options:

A.

IT service desk manager

B.

Sales manager

C.

Customer service manager

D.

Access control manager

Buy Now
Questions 499

A large organization recently restructured the IT department and has decided to outsource certain functions. What action should the control owners in the IT department take?

Options:

A.

Conduct risk classification for associated IT controls.

B.

Determine whether risk responses still effectively address risk.

C.

Perform vulnerability and threat assessments.

D.

Analyze and update IT control assessments.

Buy Now
Questions 500

Which of the following is the BEST criterion to determine whether higher residual risk ratings in the risk register should be accepted?

Options:

A.

Risk maturity

B.

Risk policy

C.

Risk appetite

D.

Risk culture

Buy Now
Questions 501

Which of the following will BEST help to ensure new IT policies address the enterprise's requirements?

Options:

A.

involve IT leadership in the policy development process

B.

Require business users to sign acknowledgment of the poises

C.

involve business owners in the pokey development process

D.

Provide policy owners with greater enforcement authority

Buy Now
Questions 502

A risk practitioner discovers that an IT operations team manager bypassed web filtering controls by using a mobile device, in violation of the network security policy. Which of the following should the risk practitioner do FIRST?

Options:

A.

Report the incident.

B.

Plan a security awareness session.

C.

Assess the new risk.

D.

Update the risk register.

Buy Now
Questions 503

The acceptance of control costs that exceed risk exposure is MOST likely an example of:

Options:

A.

low risk tolerance.

B.

corporate culture misalignment.

C.

corporate culture alignment.

D.

high risk tolerance

Buy Now
Questions 504

To minimize the risk of a potential acquisition being exposed externally, an organization has selected a few key employees to be engaged in the due diligence process. A member of the due diligence team realizes a close acquaintance is a high-ranking IT professional at a subsidiary of the company about to be acquired. What is the BEST course of action for this team member?

Options:

A.

Enforce segregation of duties.

B.

Disclose potential conflicts of interest.

C.

Delegate responsibilities involving the acquaintance.

D.

Notify the subsidiary's legal team.

Buy Now
Questions 505

The design of procedures to prevent fraudulent transactions within an enterprise resource planning (ERP) system should be based on:

Options:

A.

stakeholder risk tolerance.

B.

benchmarking criteria.

C.

suppliers used by the organization.

D.

the control environment.

Buy Now
Questions 506

An organization has granted a vendor access to its data in order to analyze customer behavior. Which of the following would be the MOST effective control to mitigate the risk of customer data leakage?

Options:

A.

Enforce criminal background checks.

B.

Mask customer data fields.

C.

Require vendor to sign a confidentiality agreement.

D.

Restrict access to customer data on a "need to know'' basis.

Buy Now
Questions 507

A risk practitioner is collaborating with key stakeholders to prioritize a large number of IT risk scenarios. Which scenarios should receive the PRIMARY focus?

Options:

A.

Scenarios with the highest number of open audit issues

B.

Scenarios with the highest frequency of incidents

C.

Scenarios with the largest budget allocation for risk mitigation

D.

Scenarios with the highest risk impact to the business

Buy Now
Questions 508

A risk practitioner has been asked to assess the risk associated with a new critical application used by a financial process team that the risk practitioner was a member of two years ago. Which of the following is the GREATEST concern with this request?

Options:

A.

The risk assessment team may be overly confident of its ability to identify issues.

B.

The risk practitioner may be unfamiliar with recent application and process changes.

C.

The risk practitioner may still have access rights to the financial system.

D.

Participation in the risk assessment may constitute a conflict of interest.

Buy Now
Questions 509

Which of the following MUST be updated to maintain an IT risk register?

Options:

A.

Expected frequency and potential impact

B.

Risk tolerance

C.

Enterprise-wide IT risk assessment

D.

Risk appetite

Buy Now
Questions 510

An organization's risk management team wants to develop IT risk scenarios to show the impact of collecting and storing credit card information. Which of the following is the MOST comprehensive approach to capture this scenario?

Options:

A.

Top-down analysis

B.

Event tree analysis

C.

Control gap analysis

D.

Bottom-up analysis

Buy Now
Questions 511

Warning banners on login screens for laptops provided by an organization to its employees are an example of which type of control?

Options:

A.

Corrective

B.

Preventive

C.

Detective

D.

Deterrent

Buy Now
Questions 512

Which of the following should be a risk practitioner's NEXT step upon learning the impact of an organization's noncompliance with a specific legal regulation?

Options:

A.

Identify risk response options.

B.

Implement compensating controls.

C.

Invoke the incident response plan.

D.

Document the penalties for noncompliance.

Buy Now
Questions 513

Which of the following BEST enables effective risk reporting to the board of directors?

Options:

A.

Presenting case studies of breaches from other similar organizations

B.

Mapping risk scenarios to findings identified by internal audit

C.

Communicating in terms that correlate to corporate objectives and business value

D.

Reporting key metrics that indicate the efficiency and effectiveness of risk governance

Buy Now
Questions 514

Which of the following is the BEST method for identifying vulnerabilities?

Options:

A.

Batch job failure monitoring

B.

Periodic network scanning

C.

Annual penetration testing

D.

Risk assessments

Buy Now
Questions 515

An organization has agreed to a 99% availability for its online services and will not accept availability that falls below 98.5%. This is an example of:

Options:

A.

risk mitigation.

B.

risk evaluation.

C.

risk appetite.

D.

risk tolerance.

Buy Now
Questions 516

Which of the following would BEST help an enterprise define and communicate its risk appetite?

Options:

A.

Gap analysis

B.

Risk assessment

C.

Heat map

D.

Risk register

Buy Now
Questions 517

Malware has recently affected an organization. The MOST effective way to resolve this situation and define a comprehensive risk treatment plan would be to perform:

Options:

A.

a gap analysis

B.

a root cause analysis.

C.

an impact assessment.

D.

a vulnerability assessment.

Buy Now
Questions 518

The MOST significant benefit of using a consistent risk ranking methodology across an organization is that it enables:

Options:

A.

allocation of available resources

B.

clear understanding of risk levels

C.

assignment of risk to the appropriate owners

D.

risk to be expressed in quantifiable terms

Buy Now
Questions 519

Which of the following is the BEST course of action to reduce risk impact?

Options:

A.

Create an IT security policy.

B.

Implement corrective measures.

C.

Implement detective controls.

D.

Leverage existing technology

Buy Now
Questions 520

Which of the following BEST mitigates the risk associated with inadvertent data leakage by users who work remotely?

Options:

A.

Conducting training on the protection of organizational assets

B.

Configuring devices to use virtual IP addresses

C.

Ensuring patching for end-user devices

D.

Providing encrypted access to organizational assets

Buy Now
Questions 521

When establishing leading indicators for the information security incident response process it is MOST important to consider the percentage of reported incidents:

Options:

A.

that results in a full root cause analysis.

B.

used for verification within the SLA.

C.

that are verified as actual incidents.

D.

resolved within the SLA.

Buy Now
Questions 522

An organization must make a choice among multiple options to respond to a risk. The stakeholders cannot agree and decide to postpone the decision. Which of the following risk responses has the organization adopted?

Options:

A.

Transfer

B.

Mitigation

C.

Avoidance

D.

Acceptance

Buy Now
Questions 523

The MOST effective way to increase the likelihood that risk responses will be implemented is to:

Options:

A.

create an action plan

B.

assign ownership

C.

review progress reports

D.

perform regular audits.

Buy Now
Exam Code: CRISC
Exam Name: Certified in Risk and Information Systems Control
Last Update: Aug 17, 2025
Questions: 1745
CRISC pdf

CRISC PDF

$29.75  $84.99
CRISC Engine

CRISC Testing Engine

$35  $99.99
CRISC PDF + Engine

CRISC PDF + Testing Engine

$47.25  $134.99