An organization has just started accepting credit card payments from customers via the corporate website. Which of the following is MOST likely to increase as a result of this new initiative?
An organization's senior management is considering whether to acquire cyber insurance. Which of the following is the BEST way for the risk practitioner to enable management’s decision?
Which of the following management action will MOST likely change the likelihood rating of a risk scenario related to remote network access?
Key control indicators (KCls) help to assess the effectiveness of the internal control environment PRIMARILY by:
Which of the following would present the MOST significant risk to an organization when updating the incident response plan?
A software developer has administrative access to a production application. Which of the following should be of GREATEST concern to a risk practitioner?
The risk associated with data loss from a website which contains sensitive customer information is BEST owned by:
Which of the following indicates an organization follows IT risk management best practice?
Which of the following is the BEST way for a risk practitioner to present an annual risk management update to the board''
Which of the following s MOST likely to deter an employee from engaging in inappropriate use of company owned IT systems?
Which of the following BEST measures the efficiency of an incident response process?
When creating a separate IT risk register for a large organization, which of the following is MOST important to consider with regard to the existing corporate risk 'register?
Which of the following should be done FIRST when a new risk scenario has been identified
A risk practitioner is asked to present the results of the most recent technology risk assessment to executive management in a concise manner. Which of the following is MOST important to include in the presentation?
Which of the following is the PRIMARY risk management responsibility of the second line of defense?
After the implementation of internal of Things (IoT) devices, new risk scenarios were identified. What is the PRIMARY reason to report this information to risk owners?
An organization delegates its data processing to the internal IT team to manage information through its applications. Which of the following is the role of the internal IT team in this situation?
Which of the following methods is the BEST way to measure the effectiveness of automated information security controls prior to going live?
An organization is considering modifying its system to enable acceptance of credit card payments. To reduce the risk of data exposure, which of the following should the organization do FIRST?
A risk heat map is MOST commonly used as part of an IT risk analysis to facilitate risk:
The MOST effective way to increase the likelihood that risk responses will be implemented is to:
Using key risk indicators (KRIs) to illustrate changes in the risk profile PRIMARILY helps to:
An organization has outsourced its lease payment process to a service provider who lacks evidence of compliance with a necessary regulatory standard. Which risk treatment was adopted by the organization?
Which of the following should be of GREATEST concern to a risk practitioner reviewing an organization's disaster recovery plan (DRP)?
Which of the following would be MOST important for a risk practitioner to provide to the internal audit department during the audit planning process?
Which of the following is the BEST indicator of the effectiveness of a control?
Which of the following scenarios is MOST important to communicate to senior management?
Which of the following is MOST important to communicate to senior management during the initial implementation of a risk management program?
Who is BEST suited to provide objective input when updating residual risk to reflect the results of control effectiveness?
Which of the following is the MAIN reason to continuously monitor IT-related risk?
Once a risk owner has decided to implement a control to mitigate risk, it is MOST important to develop:
A risk practitioner is advising management on how to update the IT policy framework to account for the organization s cloud usage. Which of the following should be the FIRST step in this process?
Which of the following is the MOST important foundational element of an effective three lines of defense model for an organization?
An IT department has provided a shared drive for personnel to store information to which all employees have access. Which of the following parties is accountable for the risk of potential loss of confidential information?
Changes in which of the following would MOST likely cause a risk practitioner to adjust the risk impact rating in the risk register?
Which of the following is PRIMARILY a risk management responsibly of the first line of defense?
The BEST key performance indicator (KPI) to measure the effectiveness of a vulnerability remediation program is the number of:
Which of the following is the MOST important topic to cover in a risk awareness training program for all staff?
Whether the results of risk analyses should be presented in quantitative or qualitative terms should be based PRIMARILY on the: