A failed IT system upgrade project has resulted in the corruption of an organization's asset inventory database. Which of the following controls BEST mitigates the impact of this incident?
Of the following, who is BEST suited to assist a risk practitioner in developing a relevant set of risk scenarios?
A migration from an in-house developed system to an external cloud-based solution is affecting a previously rated key risk scenario related to payroll processing. Which part of the risk register should be updated FIRST?
Which of the following BEST enables an organization to address new risk associated with an Internet of Things (IoT) solution?
Which of the following would be MOST helpful to a risk owner when making risk-aware decisions?
Which of the following is MOST important to consider when assessing the likelihood that a recently discovered software vulnerability will be exploited?
Which of the following is the PRIMARY reason for sharing risk assessment reports with senior stakeholders?
Which of the following is the BEST way to validate whether controls to reduce user device vulnerabilities have been implemented according to management's action plan?
What is the MOST important consideration when aligning IT risk management with the enterprise risk management (ERM) framework?
Which component of a software inventory BEST enables the identification and mitigation of known vulnerabilities?
An organization's IT department wants to complete a proof of concept (POC) for a security tool. The project lead has asked for approval to use the production data for testing purposes as it will yield the best results. Which of the following is the risk practitioner's BEST recommendation?
Which of the following is the MOST important information to cover in a business continuity awareness training program for all employees of the organization?
When reporting to senior management on changes in trends related to IT risk, which of the following is MOST important?
Who is the BEST person to an application system used to process employee personal data?
Which of the following events is MOST likely to trigger the need to conduct a risk assessment?
Which of the following is the MOST important reason to validate that risk responses have been executed as outlined in the risk response plan''
Which of the following is the GREATEST benefit of incorporating IT risk scenarios into the corporate risk register?
Which of the following provides the MOST useful information for developing key risk indicators (KRIs)?
Which of the following is the BEST control to minimize the risk associated with scope creep in software development?
Which of the following BEST informs decision-makers about the value of a notice and consent control for the collection of personal information?
Which of the following is the BEST method to ensure a terminated employee's access to IT systems is revoked upon departure from the organization?
Following a review of a third-party vendor, it is MOST important for an organization to ensure:
A small organization finds it difficult to implement separation of duties necessary to mitigate the likelihood of system misuse. Which of the following would be the BEST compensating control?
A risk practitioner is MOST likely to use a SWOT analysis to assist with which risk process?
From a risk management perspective, the PRIMARY objective of using maturity models is to enable:
Which of the following is the MOST likely reason an organization would engage an independent reviewer to assess its IT risk management program?
Which of the following is the BEST approach to resolve a disagreement between stakeholders regarding the impact of a potential risk scenario?
Key risk indicators (KRIs) are MOST useful during which of the following risk management phases?
Which of the following BEST helps to identify significant events that could impact an organization?
After migrating a key financial system to a new provider, it was discovered that a developer could gain access to the production environment. Which of the following is the BEST way to mitigate the risk in this situation?
Which of the following would be MOST helpful to a risk practitioner when preparing a summary of current IT risk for senior management review?
Which of the following is the MOST important course of action to foster an ethical, risk-aware culture?
Reviewing historical risk events is MOST useful for which of the following processes within the risk management life cycle?
Which of the following management actions will MOST likely change the likelihood rating of a risk scenario related to remote network access?
A robotic process automation (RPA) project has implemented new robots to enhance the efficiency of a sales business process. Which of the following provides the BEST evidence that the new controls have been implemented successfully?
Which of the following BEST indicates that risk management is embedded into the responsibilities of all employees?
A risk practitioner identifies an increasing trend of employees copying company information unrelated to their job functions to USB drives. Which of the following elements of the risk register should be updated to reflect this observation?
Within the three lines of defense model, the PRIMARY responsibility for ensuring risk mitigation controls are properly configured belongs with:
Which of the following factors will have the GREATEST impact on the implementation of a risk mitigation strategy for an organization?
Which of the following is the MOST important reason to restrict access to the risk register on a need-to-know basis?
Which of the following would be the GREATEST concern for an IT risk practitioner when an employees.....
Which of the following is the BEST method for assessing control effectiveness against technical vulnerabilities that could be exploited to compromise an information system?
Which of the following is the PRIMARY reason to conduct risk assessments at periodic intervals?