Which of the following will BEST help in communicating strategic risk priorities?
A risk practitioner learns that the organization s industry is experiencing a trend of rising security incidents. Which of the following is the BEST course of action?
What should a risk practitioner do FIRST when a shadow IT application is identified in a business owner ' s business impact analysis (BIA)?
When a high number of approved exceptions are observed during a review of a control procedure, an organization should FIRST initiate a review of the:
An organization recently implemented an extensive risk awareness program after a cybersecurity incident. Which of the following is MOST likely to be affected by the implementation of the program?
Several newly identified risk scenarios are being integrated into an organization ' s risk register. The MOST appropriate risk owner would be the individual who:
Which of the following would BEST facilitate the implementation of data classification requirements?
Which of the following is the MOST important driver of an effective enterprise risk management (ERM) program?
Which of the following BEST supports the management of identified risk scenarios?
Which of the following would be a risk practitioner ' s MOST important action upon learning that an IT control has failed?
To minimize risk in a software development project, when is the BEST time to conduct a risk analysis?
When implementing an IT risk management program, which of the following is the BEST time to evaluate current control effectiveness?
Which of the following will BEST help to ensure that information system controls are effective?
Which of the following is the MOST important consideration when prioritizing risk response?
The PRIMARY advantage of involving end users in continuity planning is that they:
Which of the following will provide the BEST measure of compliance with IT policies?
Which of the following would present the MOST significant risk to an organization when updating the incident response plan?
The risk associated with an asset after controls are applied can be expressed as:
Which of the following statements describes the relationship between key risk indicators (KRIs) and key control indicators (KCIs)?
Which of the following is the MOST important requirement for monitoring key risk indicators (KRls) using log analysis?
Which of the following could BEST detect an in-house developer inserting malicious functions into a web-based application?
Which of the following is the BEST recommendation to senior management when the results of a risk and control assessment indicate a risk scenario can only be partially mitigated?
A risk owner has accepted a high-impact risk because the control was adversely affecting process efficiency. Before updating the risk register, it is MOST important for the risk practitioner to:
Which of the following is the PRIMARY reason to ensure policies and standards are properly documented within the risk management process?
Which of the following should be accountable for ensuring that media containing financial information are adequately destroyed per an organization ' s data disposal policy?
A risk practitioner is collaborating with key stakeholders to prioritize a large number of IT risk scenarios. Which scenarios should receive the PRIMARY focus?
A robotic process automation (RPA) project has implemented new robots to enhance the efficiency of a sales business process. Which of the following provides the BEST evidence that the new controls have been implemented successfully?
An organization has agreed to a 99% availability for its online services and will not accept availability that falls below 98.5%. This is an example of:
Which of the following would BEST help secure online financial transactions from improper users?
Which of the following would provide the MOST objective assessment of the effectiveness of an organization ' s security controls?
Which of the following would BEST provide early warning of a high-risk condition?
The PRIMARY goal of conducting a business impact analysis (BIA) as part of an overall continuity planning process is to:
Which of the following would be of GREATEST concern to a risk practitioner reviewing current key risk indicators (KRIs)?
Which of the following should be the PRIMARY basis for prioritizing risk responses?
Which of the following is MOST important to identify when developing top-down risk scenarios?
An organization ' s Internet-facing server was successfully attacked because the server did not have the latest security patches. The risk associated with poor patch management had been documented in the risk register and accepted. Who should be accountable for any related losses to the organization?
Which of the following should a risk practitioner recommend be done prior to disposal of server hardware containing confidential data?
An organization has recently hired a large number of part-time employees. During the annual audit, it was discovered that many user IDs and passwords were documented in procedure manuals for use by the part-time employees. Which of the following BEST describes this situation?
Which of the following is the BEST approach when a risk practitioner has been asked by a business unit manager for special consideration during a risk assessment of a system?
Days before the realization of an acquisition, a data breach is discovered at the company to be acquired. For the accruing organization, this situation represents which of the following?
A risk register BEST facilitates which of the following risk management functions?
Which of the following roles would be MOST helpful in providing a high-level view of risk related to customer data loss?
An organization has implemented a system capable of comprehensive employee monitoring. Which of the following should direct how the system is used?
An employee lost a personal mobile device that may contain sensitive corporate information. What should be the risk practitioner ' s recommendation?
Which of the following would be a risk practitioner’s BEST recommendation upon learning of an updated cybersecurity regulation that could impact the organization?
Which of The following should be of GREATEST concern for an organization considering the adoption of a bring your own device (BYOD) initiative?