Which of the following is the BEST approach to mitigate the risk associated with outsourcing network management to an external vendor who will have access to sensitive information assets?
During the control evaluation phase of a risk assessment, it is noted that multiple controls are ineffective. Which of the following should be the risk practitioner ' s FIRST course of action?
An organization has implemented a cloud-based backup solution to help prevent loss of transactional data from offices in an earthquake zone. This strategy demonstrates risk:
Which of the following is the PRIMARY reason for sharing risk assessment reports with senior stakeholders?
Which of the following is the MOST important reason for integrating IT risk management practices into enterprise risk management (ERM)?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
Which of the following would MOST effectively reduce risk associated with an increased volume of online transactions on a retailer website?
Which of the following would BEST help minimize the risk associated with social engineering threats?
Which of the following would MOST likely result in updates to an IT risk appetite statement?
Which of the following is MOST important for a risk practitioner to understand about an organization in order to create an effective risk
awareness program?
Which of the following is MOST likely to introduce risk for financial institutions that use blockchain?
A recently purchased IT application does not meet project requirements. Of the following, who is accountable for the potential impact?
An application owner has specified the acceptable downtime in the event of an incident to be much lower than the actual time required for the response team to recover the application. Which of the following should be the NEXT course of action?
Which of the following is the MOST important reason for a risk practitioner to continuously monitor a critical security transformation program?
Which of the following is the MOST appropriate key control indicator (KCI) to help an organization prevent successful cyber risk events on the external-facing infrastructure?
Which of the following is the BEST key performance indicator (KPI) to measure how effectively risk management practices are embedded in the project management office (PMO)?
Which of the following is the BEST way to help ensure risk will be managed properly after a business process has been re-engineered?
During a post-implementation review for a new system, users voiced concerns about missing functionality. Which of the following is the BEST way for the organization to avoid this situation in the future?
Which of the following is the BEST recommendation to address recent IT risk trends that indicate social engineering attempts are increasing in the organization?
Which of the following roles is PRIMARILY accountable for risk associated with business information protection?
An organization is planning to implement a Zero Trust model. From a cybersecunty perspective, which of the following is MOST important to ensure successful alignment with the overall inten Zero Trust?
Which of the following statements BEST illustrates the relationship between key performance indicators (KPIs) and key control indicators (KCIs)?
Who is BEST suited to determine whether a new control properly mitigates data loss risk within a system?
Which of the following activities BEST facilitates effective risk management throughout the organization?
Which of the following is MOST important to review when an organization needs to transition the majority of its employees to remote work during a crisis?
A penetration test reveals several vulnerabilities in a web-facing application. Which of the following should be the FIRST step in selecting a risk response?
A risk practitioner notices a risk scenario associated with data loss at the organization ' s cloud provider is assigned to the provider who should the risk scenario be reassigned to.
Which of the following is the GREATEST risk to an organization when using a public AI system to process credit card transactions?
When developing risk treatment alternatives for a Business case, it is MOST helpful to show risk reduction based on:
Which of the following is MOST important to consider when determining a recovery time objective (RTO)?
As part of an overall IT risk management plan, an IT risk register BEST helps management:
Which of the following is the MOST efficient method for monitoring control effectiveness?
Which of the following will BEST mitigate the risk associated with IT and business misalignment?
Which of the following BEST mitigates reputational risk associated with disinformation campaigns against an organization?
Which of the following is the MOST effective way to validate organizational awareness of cybersecurity risk?
Controls should be defined during the design phase of system development because:
Which of the following BEST reduces the likelihood of employees unintentionally disclosing sensitive information to outside parties?
Which key performance indicator (KPI) BEST measures the effectiveness of an organization ' s disaster recovery program?
Which of the following is MOST important to add to the risk register for a remediated risk scenario?
An organization is implementing robotic process automation (RPA) to streamline business processes. Given that implementation of this technology is expected to impact existing controls, which of the following is the risk practitioner ' s BEST course of action?
An organization is developing a risk universe to create a holistic view of its overall risk profile. Which of the following is the GREATEST barrier to achieving the initiative ' s objectives?
Which of the following is the MOST useful information an organization can obtain from external sources about emerging threats?
Which of the following should be the GREATEST concern for an organization that uses open source software applications?
Which of the following is the GREATEST benefit of analyzing logs collected from different systems?
Which of the following is the MOST essential factor for managing risk in a highly dynamic environment?
In order to determining a risk is under-controlled the risk practitioner will need to
A risk practitioner is organizing risk awareness training for senior management. Which of the following is the MOST important topic to cover in the training session?