During implementation of an intrusion detection system (IDS) to monitor network traffic, a high number of alerts is reported. The risk practitioner should recommend to:
Which of the following would be the BEST way to help ensure the effectiveness of a data loss prevention (DLP) control that has been implemented to prevent the loss of credit card data?
Which of the following would BEST help secure online financial transactions from improper users?
Which of the following is the MOST relevant information to include in a risk management strategy?
An organization has introduced risk ownership to establish clear accountability for each process. To ensure effective risk ownership, it is MOST important that:
Which of the following provides the MOST reliable evidence of a control's effectiveness?
Which of the following presents the GREATEST concern associated with the
use of artificial intelligence (Al) systems?
What information is MOST helpful to asset owners when classifying organizational assets for risk assessment?
Which of the following activities would BEST contribute to promoting an organization-wide risk-aware culture?
Which of the following would offer the MOST insight with regard to an organization's risk culture?
The PRIMARY reason for establishing various Threshold levels for a set of key risk indicators (KRIs) is to:
An organization has experienced several incidents of extended network outages that have exceeded tolerance. Which of the following should be the risk practitioner's FIRST step to address this situation?
Which of the following is the PRIMARY responsibility of the first line of defense related to computer-enabled fraud?
Which of the following is the BEST metric to demonstrate the effectiveness of an organization's patch management process?
During a recent security framework review, it was discovered that the marketing department implemented a non-fungible token asset program. This was done without following established risk procedures. Which of the following should the risk practitioner do FIRST?
Which of the following is MOST important when creating a program to reduce ethical risk?
Which of the following is the MOST important factor when deciding on a control to mitigate risk exposure?
When performing a risk assessment of a new service to support a core business process, which of the following should be done FIRST to ensure continuity of operations?
An organization has restructured its business processes, and the business continuity plan (BCP) needs to be revised accordingly. Which of the following should be identified FIRST?
Which of the following is MOST helpful to management when determining the resources needed to mitigate a risk?
Which of the following BEST enables the identification of trends in risk levels?
The PRIMARY reason for periodic penetration testing of Internet-facing applications is to:
An organization wants to launch a campaign to advertise a new product Using data analytics, the campaign can be targeted to reach potential customers. Which of the following should be of GREATEST concern to the risk practitioner?
Which of the following is the MAIN benefit to an organization using key risk indicators (KRIs)?
The BEST metric to demonstrate that servers are configured securely is the total number of servers:
Which of the following BEST confirms the existence and operating effectiveness of information systems controls?
An organization operates in an environment where reduced time-to-market for new software products is a top business priority. Which of the following should be the risk practitioner's GREATEST concern?
Which of the following should be the PRIMARY consideration when assessing the automation of control monitoring?
Which of the following key risk indicators (KRIs) is MOST effective for monitoring risk related to a bring your own device (BYOD) program?
The BEST way to test the operational effectiveness of a data backup procedure is to:
Which stakeholders are PRIMARILY responsible for determining enterprise IT risk appetite?
Which of the following is the MAIN benefit of involving stakeholders in the selection of key risk indicators (KRIs)?
When developing a risk awareness training program, which of the following training topics would BEST facilitate a thorough understanding of risk scenarios?
Which of the following is the BEST indicator of the effectiveness of a control monitoring program?
Which of the following is the BEST approach when a risk treatment plan cannot be completed on time?
Which of the following is MOST important for a risk practitioner to consider when analyzing the risk associated with migrating to a new cloud service provider?
Which of the following should be the PRIMARY basis for deciding whether to disclose information related to risk events that impact external stakeholders?
When confirming whether implemented controls are operating effectively, which of the following is MOST important to review?
Which of the following would MOST likely require a risk practitioner to update the risk register?
When developing a new risk register, a risk practitioner should focus on which of the following risk management activities?
Management has required information security awareness training to reduce the risk associated with credential compromise. What is the BEST way to assess the effectiveness of the training?
Which of the following is the PRIMARY advantage of having a single integrated business continuity plan (BCP) rather than each business unit developing its own BCP?
The software version of an enterprise's critical business application has reached end-of-life and is no longer supported by the vendor. IT has decided to develop an in-house replacement application. Which of the following should be the PRIMARY concern?
Which of the following has the GREATEST impact on backup policies for a system supporting a critical process?
Which of the following is the PRIMARY benefit of using a risk map with stakeholders?
Which of the following is the BEST way to determine whether system settings are in alignment with control baselines?