A newly enacted information privacy law significantly increases financial penalties for breaches of personally identifiable information (Pll). Which of the following will MOST likely outcome for an organization affected by the new law?
Which of the following is the MOST important objective of establishing an enterprise risk management (ERM) function within an organization?
Which of the following is MOST important for a risk practitioner to ensure once a risk action plan has been completed?
Which of the following is the BEST key performance indicator (KPI) to measure the ability to deliver uninterrupted IT services?
Which of the following scenarios presents the GREATEST risk for a global organization when implementing a data classification policy?
A software developer has administrative access to a production application. Which of the following should be of GREATEST concern to a risk practitioner?
A key performance indicator (KPI) shows that a process is operating inefficiently, even though no control issues were noted during the most recent risk assessment. Which of the following should be done FIRST?
Which of the following is the BEST way to detect zero-day malware on an end user's workstation?
Of the following, who is responsible for approval when a change in an application system is ready for release to production?
Which of the following facilitates a completely independent review of test results for evaluating control effectiveness?
Which of the following should be of GREATEST concern to a risk practitioner when determining the effectiveness of IT controls?
Which of the following roles is BEST suited to help a risk practitioner understand the impact of IT-related events on business objectives?
Which of the following is the BEST approach to use when creating a comprehensive set of IT risk scenarios?
Which of the following would be the BEST way to help ensure the effectiveness of a data loss prevention (DLP) control that has been implemented to prevent the loss of credit card data?
An organization striving to be on the leading edge in regard to risk monitoring would MOST likely implement:
An unauthorized individual has socially engineered entry into an organization's secured physical premises. Which of the following is the BEST way to prevent future occurrences?
Which of the following BEST supports the integration of IT risk management into an organization's strategic planning?
Which of The following should be of GREATEST concern for an organization considering the adoption of a bring your own device (BYOD) initiative?
Which of me following is MOST helpful to mitigate the risk associated with an application under development not meeting business objectives?