The risk associated with data loss from a website which contains sensitive customer information is BEST owned by:
Which of the following is the PRIMARY reason for conducting peer reviews of risk analysis?
An engineer has been assigned to conduct data restoration after a server storage failure. However, the procedure was not successful. Which of the following is the MOST probable cause of this situation?
An IT risk practitioner has determined that mitigation activities differ from an approved risk action plan. Which of the following is the risk practitioner ' s BEST course of action?
Which of the following is MOST helpful in determining the effectiveness of an organization ' s IT risk mitigation efforts?
Which of the following activities is PRIMARILY the responsibility of senior management?
How should an organization approach the retention of data that is no longer needed for business operations?
When developing a risk awareness training program, which of the following training topics would BEST facilitate a thorough understanding of risk scenarios?
Which of the following is MOST helpful when prioritizing action plans for identified risk?
Which of the following is the MOST important benefit of reporting risk assessment results to senior management?
Which of the following is the PRIMARY objective of establishing an organization ' s risk tolerance and appetite?
An organization has recently updated its disaster recovery plan (DRP). Which of the following would be the GREATEST risk if the new plan is not tested?
Which of the following is the BEST key control indicator (KCI) for risk related to IT infrastructure failure?
Which of the following activities should be performed FIRST when establishing IT risk management processes?
Which of the following has the GREATEST impact on backup policies for a system supporting a critical process?
Which of the following would MOST likely result in agreement on accountability for risk scenarios?
Which of the following is the BEST way to determine software license compliance?
Which of the following would be the GREATEST concern for an IT risk practitioner when an employees.....
The PRIMARY reason to have risk owners assigned to entries in the risk register is to ensure:
When an organization ' s business continuity plan (BCP) states that it cannot afford to lose more than three hours of a critical application ' s data, the three hours is considered the application’s:
Which of the following is the MOST important factor affecting risk management in an organization?
Which of the following provides the MOST helpful reference point when communicating the results of a risk assessment to stakeholders?
An organization is developing a risk awareness program for contractors and consultants. Which of the following is MOST important for the organization to keep confidential?
A PRIMARY function of the risk register is to provide supporting information for the development of an organization ' s risk:
Which of the following is the FIRST step when developing a business case to drive the adoption of a risk remediation project by senior management?
Which of the following practices BEST mitigates risk related to enterprise-wide ethical decision making in a multi-national organization?
Which of the following BEST assists in justifying an investment in automated controls?
The implementation of a risk treatment plan will exceed the resources originally allocated for the risk response. Which of the following should be the risk owner ' s NEXT action?
Which of the following is the MOST essential characteristic of a good IT risk scenario?
An organization has established workflows in its service desk to support employee reports of security-related concerns. Which of the following is the MOST efficient approach to analyze these concerns?
Which of the following approaches MOST effectively enables accountability for data protection?
Which of the following is the PRIMARY purpose of creating and documenting control procedures?
Which of the following is the PRIMARY role of the board of directors in corporate risk governance?
A failed IT system upgrade project has resulted in the corruption of an organization ' s asset inventory database. Which of the following controls BEST mitigates the impact of this incident?
Who should be accountable for ensuring effective cybersecurity controls are established?
Which of the following is the MOST important objective of an enterprise risk management (ERM) program?
Which of the following is the MOST important reason for a risk practitioner to identify stakeholders for each IT risk scenario?
Which of the following is the BEST approach for a risk practitioner to use for identifying the level of technical debt in an organization?
Sensitive data has been lost after an employee inadvertently removed a file from the premises, in violation of organizational policy. Which of the following controls MOST likely failed?
Which of the following is the PRIMARY benefit when senior management periodically reviews and updates risk appetite and tolerance levels?
A monthly payment report is generated from the enterprise resource planning (ERP) software to validate data against the old and new payroll systems. What is the BEST way to mitigate the risk associated with data integrity loss in the new payroll system after data migration?
A risk practitioner has been asked to evaluate the adoption of a third-party blockchain integration platform based on the value added by the platform and the organization ' s risk appetite. Which of the following is the risk practitioner ' s BEST course of action?
A risk practitioner is summarizing the results of a high-profile risk assessment sponsored by senior management. The BEST way to support risk-based decisions by senior management would be to:
From a governance perspective, which of the following is MOST important to ensure when risk management policies are being updated to facilitate the pursuit of new opportunities?
Management has required information security awareness training to reduce the risk associated with credential compromise. What is the BEST way to assess the effectiveness of the training?
A risk practitioner is advising management on how to update the IT policy framework to account for the organization s cloud usage. Which of the following should be the FIRST step in this process?
Which of the following is the GREATEST concern when establishing key risk indicators (KRIs)?
Which of the following is MOST helpful in providing a high-level overview of current IT risk severity*?
It is MOST important that security controls for a new system be documented in: