Who is responsible for IT security controls that are outsourced to an external service provider?
An application runs a scheduled job that compiles financial data from multiple business systems and updates the financial reporting system. If this job runs too long, it can delay financial reporting. Which of the following is the risk practitioner's BEST recommendation?
Who should be responsible for approving the cost of controls to be implemented for mitigating risk?
Which of the following is MOST important to enable well-informed cybersecurity risk decisions?
Which of the following is the MAIN reason to continuously monitor IT-related risk?
Who is MOST likely to be responsible for the coordination between the IT risk strategy and the business risk strategy?
Which of the following would BEST facilitate the maintenance of data classification requirements?
Which of the following is the GREATEST benefit of identifying appropriate risk owners?
Which of the following key risk indicators (KRIs) is MOST effective for monitoring risk related to a bring your own device (BYOD) program?
An organization learns of a new ransomware attack affecting organizations worldwide. Which of the following should be done FIRST to reduce the likelihood of infection from the attack?
An organization has an approved bring your own device (BYOD) policy. Which of the following would BEST mitigate the security risk associated with the inappropriate use of enterprise applications on the devices?
A risk practitioner is developing a set of bottom-up IT risk scenarios. The MOST important time to involve business stakeholders is when:
When a high number of approved exceptions are observed during a review of a control procedure, an organization should FIRST initiate a review of the:
Which of the following is the MOST important topic to cover in a risk awareness training program for all staff?
A business is conducting a proof of concept on a vendor's Al technology. Which of the following is the MOST important consideration for managing risk?
Which of the following is the BEST course of action when risk is found to be above the acceptable risk appetite?
Which of the following BEST enables a risk practitioner to understand management's approach to organizational risk?
A risk assessment has identified increased losses associated with an IT risk scenario. It is MOST important for the risk practitioner to:
Which of the following is the MOST relevant information to include in a risk management strategy?
Which of the following is the PRIMARY reason for a risk practitioner to review an organization's IT asset inventory?
An organizational policy requires critical security patches to be deployed in production within three weeks of patch availability. Which of the following is the BEST metric to verify adherence to the policy?
An organization has initiated a project to launch an IT-based service to customers and take advantage of being the first to market. Which of the following should be of GREATEST concern to senior management?
The patch management process is MOST effectively monitored through which of the following key control indicators (KCIs)?
The PRIMARY reason to have risk owners assigned to entries in the risk register is to ensure:
It is MOST important that entries in an organization’s risk register be updated:
A risk practitioner has been made aware of a problem in an IT system that was missed during a routine risk assessment. Which of the following is the practitioner's BEST course of action?
Which of the following is the GREATEST risk associated with inappropriate classification of data?
Which of the following is the PRIMARY risk management responsibility of the third line of defense?
Which of the following is MOST important for a risk practitioner to verify when evaluating the effectiveness of an organization's existing controls?
Which of the following is the BEST indication that key risk indicators (KRls) should be revised?
Which of the following is the BEST Key control indicator KCO to monitor the effectiveness of patch management?
During a control review, the control owner states that an existing control has deteriorated over time. What is the BEST recommendation to the control owner?
What is the BEST information to present to business control owners when justifying costs related to controls?
What should be the PRIMARY consideration related to data privacy protection when there are plans for a business initiative to make use of personal information?
An organization's IT team has proposed the adoption of cloud computing as a cost-saving measure for the business. Which of the following should be of GREATEST concern to the risk practitioner?
Which of the following is the GREATEST concern when an organization uses a managed security service provider as a firewall administrator?
Which of the following is the BEST key performance indicator (KPI) to measure the maturity of an organization's security incident handling process?
It is MOST appropriate for changes to be promoted to production after they are:
Which of the following roles should be assigned accountability for monitoring risk levels?
When preparing a risk status report for periodic review by senior management, it is MOST important to ensure the report includes
Which of the following is the MOST comprehensive resource for prioritizing the implementation of information systems controls?
A chief information officer (CIO) has identified risk associated with shadow systems being maintained by business units to address specific functionality gaps in the organization'senterprise resource planning (ERP) system. What is the BEST way to reduce this risk going forward?
Which of the following BEST enables a risk practitioner to identify the consequences of losing critical resources due to a disaster?
An organization's recovery team is attempting to recover critical data backups following a major flood in its data center. However, key team members do not know exactly what steps should be taken to address this crisis. Which of the following is the MOST likely cause of this situation?
An organization's risk profile indicates that residual risk levels have fallen significantly below management's risk appetite. Which of the following is the BEST course of action?
Which of the following should be the PRIMARY focus of an IT risk awareness program?
The BEST way to mitigate the high cost of retrieving electronic evidence associated with potential litigation is to implement policies and procedures for.
Which of the following roles would be MOST helpful in providing a high-level view of risk related to customer data loss?