A new software package that could help mitigate risk in an organization has become available. Which of the following is the risk practitioner's BEST course of action?
A risk assessment indicates the residual risk associated with a new bring your own device (BYOD) program is within organizational risk tolerance. Which of the following should the risk practitioner
recommend be done NEXT?
Which of the following provides the BEST assurance of the effectiveness of vendor security controls?
Which of the following is a risk practitioner's MOST important responsibility in managing risk acceptance that exceeds risk tolerance?
Which of the following situations would cause the GREATEST concern around the integrity of application logs?
An organization is considering allowing users to access company data from their personal devices. Which of the following is the MOST important factor when assessing the risk?
Which of the following is the BEST success criterion for control implementation?
Which of the following is the MOST effective way to incorporate stakeholder concerns when developing risk scenarios?
Warning banners on login screens for laptops provided by an organization to its employees are an example of which type of control?
An organization wants to transfer risk by purchasing cyber insurance. Which of the following would be MOST important for the risk practitioner to communicate to senior management for contract negotiation purposes?
Which of the following is the MOST important metric to monitor the performance of the change management process?
The results of a risk assessment reveal risk scenarios with high impact and low likelihood of occurrence. Which of the following would be the BEST action to address these scenarios?
Which of the following should a risk practitioner do NEXT after learning that Internet of Things (loT) devices installed in the production environment lack appropriate security controls for
sensitive data?
Which of the following is the MOST important reason for a risk practitioner to identify stakeholders for each IT risk scenario?
Which of the following is the ULTIMATE objective of utilizing key control indicators (KCIs) in the risk management process?
An organization discovers significant vulnerabilities in a recently purchased commercial off-the-shelf software product which will not be corrected until the next release. Which of the following is the risk manager's BEST course of action?
When using a third party to perform penetration testing, which of the following is the MOST important control to minimize operational impact?
Which of the following BEST enables the risk profile to serve as an effective resource to support business objectives?
An organization is preparing to transfer a large number of customer service representatives to the sales department. Of the following, who is responsible for mitigating the risk associated with residual system access?
Who should be responsible (of evaluating the residual risk after a compensating control has been
Which of the following is the PRIMARY reason for monitoring activities performed in a production database environment?
An organization has recently been experiencing frequent data corruption incidents. Implementing a file corruption detection tool as a risk response strategy will help to:
Which of the following provides the MOST useful input to the development of realistic risk scenarios?
After undertaking a risk assessment of a production system, the MOST appropriate action is for the risk manager to:
Which of the following is the BEST indicator of executive management's support for IT risk mitigation efforts?
A failure in an organization s IT system build process has resulted in several computers on the network missing the corporate endpoint detection and response (EDR) software. Which of the following should be the risk practitioner’s IMMEDIATE concern?
Which of the following is the GREATEST concern associated with insufficient focus on addressing blockchain interoperability in the SDLC?
A risk practitioner is involved in a comprehensive overhaul of the organizational risk management program. Which of the following should be reviewed FIRST to help identify relevant IT risk scenarios?
Which of the following is MOST important to review when an organization needs to transition the majority of its employees to remote work during a crisis?
Which of the following emerging technologies is frequently used for botnet distributed denial of service (DDoS) attacks?
What is a risk practitioner's BEST approach to monitor and measure how quickly an exposure to a specific risk can affect the organization?
Which of the following BEST enables the development of a successful IT strategy focused on business risk mitigation?
Which of the following is the MOST appropriate key risk indicator (KRI) for backup media that is recycled monthly?
An organization has outsourced its ERP application to an external SaaS provider. Which of the following provides the MOST useful information to identify risk scenarios involving data loss?
Which of the following would BEST facilitate the implementation of data classification requirements?
Which of the following should be a risk practitioner’s MOST important consideration when developing IT risk scenarios?
Which of the following would MOST likely cause a risk practitioner to reassess risk scenarios?
Which of the following is MOST important for maintaining the effectiveness of an IT risk register?
Which of the following facilitates a completely independent review of test results for evaluating control effectiveness?
Which of the following is the PRIMARY reason to establish the root cause of an IT security incident?
Which of the following requirements is MOST important to include in an outsourcing contract to help ensure sensitive data stored with a service provider is secure?
A risk practitioner wants to identify potential risk events that affect the continuity of a critical business process. Which of the following should the risk practitioner do FIRST?
Winch of the following is the BEST evidence of an effective risk treatment plan?
What are the MOST essential attributes of an effective Key control indicator (KCI)?
When reviewing a business continuity plan (BCP). which of the following would be the MOST significant deficiency?
Which organization is implementing a project to automate the purchasing process, including the modification of approval controls. Which of the following tasks is lie responsibility of the risk practitioner*?
The PRIMARY reason a risk practitioner would be interested in an internal audit report is to:
Which of the following should be of GREATEST concern when reviewing the results of an independent control assessment to determine the effectiveness of a vendor's control environment?