Which of the following process controls BEST mitigates the risk of an employee issuing fraudulent payments to a vendor?
Which of the following is MOST important for a risk practitioner to confirm once a risk action plan has been completed?
An organization has experienced a cyber-attack that exposed customer personally identifiable information (Pll) and caused extended outages of network services. Which of the following stakeholders are MOST important to include in the cyber response team to determine response actions?
Due to a change in business processes, an identified risk scenario no longer requires mitigation. Which of the following is the MOST important reason the risk should remain in the risk register?
The results of a risk assessment reveal risk scenarios with high impact and low likelihood of occurrence. Which of the following would be the BEST action to address these scenarios?
Following a significant change to a business process, a risk practitioner believes the associated risk has been reduced. The risk practitioner should advise the risk owner to FIRST
Which of the following should be the MOST important consideration when performing a vendor risk assessment?
Which of the following is the GREATEST benefit of having a mature enterprise architecture (EA) in place?
Which of the following should be the PRIMARY input to determine risk tolerance?
What is MOST important for the risk practitioner to understand when creating an initial IT risk register?
An organization has agreed to a 99% availability for its online services and will not accept availability that falls below 98.5%. This is an example of:
When using a third party to perform penetration testing, which of the following is the MOST important control to minimize operational impact?
Days before the realization of an acquisition, a data breach is discovered at the company to be acquired. For the accruing organization, this situation represents which of the following?
Which of the following is the MOST important key performance indicator (KPI) for monitoring the user access management process?
When of the following standard operating procedure (SOP) statements BEST illustrates appropriate risk register maintenance?
Which of the following BEST supports the communication of risk assessment results to stakeholders?
An organization has detected unauthorized logins to its client database servers. Which of the following should be of GREATEST concern?
In an organization where each division manages risk independently, which of the following would BEST enable management of risk at the enterprise level?
Which of the following BEST enables a proactive approach to minimizing the potential impact of unauthorized data disclosure?
Which of the following is MOST helpful when determining whether a system security control is effective?
Which of the following techniques would be used during a risk assessment to demonstrate to stakeholders that all known alternatives were evaluated?
Which of the following will BEST help to ensure key risk indicators (KRIs) provide value to risk owners?
Which of the following is the BEST approach for an organization in a heavily regulated industry to comprehensively test application functionality?
Which of the following would MOST effectively reduce the potential for inappropriate exposure of vulnerabilities documented in an organization's risk register?
A service organization is preparing to adopt an IT control framework to comply with the contractual requirements of a new client. Which of the following would be MOST helpful to the risk practitioner?
The analysis of which of the following will BEST help validate whether suspicious network activity is malicious?
A risk practitioner notes control design changes when comparing risk response to a previously approved action plan. Which of the following is MOST important for the practitioner to confirm?
Which of the following would BEST assist in reconstructing the sequence of events following a security incident across multiple IT systems in the organization's network?
Which of the following is the BEST way to determine the value of information assets for risk management purposes?
Which of the following is the MOST important objective of regularly presenting the project risk register to the project steering committee?
Which of the following should be the PRIMARY consideration when prioritizing limited resources needed to implement overdue corrective actions arising from a recent internal audit?
Which of the following is a business asset for an organization that runs only in a Software as a Service (SaaS) cloud computing environment?
Several network user accounts were recently created without the required management approvals. Which of the following would be the risk practitioner's BEST recommendation to address this situation?
Which of the following is the GREATEST concern when using a generic set of IT risk scenarios for risk analysis?
Which of the following is the MOST important consideration for protecting data assets m a Business application system?
Which of the following introduces the GREATEST amount of risk during the software development life cycle (SDLC)?
Who should be responsible for implementing and maintaining security controls?
The FIRST step for a startup company when developing a disaster recovery plan (DRP) should be to identify:
A key performance indicator (KPI) has been established to monitor the number of software changes that fail and must be re-implemented. An increase in the KPI indicates an ineffective:
Which types of controls are BEST used to minimize the risk associated with a vulnerability?
An organization has recently updated its disaster recovery plan (DRP). Which of the following would be the GREATEST risk if the new plan is not tested?
The PRIMARY advantage of implementing an IT risk management framework is the:
Which of the following would provide executive management with the BEST information to make risk decisions as a result of a risk assessment?
The risk associated with an asset before controls are applied can be expressed as:
The BEST indication that risk management is effective is when risk has been reduced to meet:
Which of the following provides the BEST evidence that robust risk management practices are in place within an organization?