Which of the following is the BEST course of action when an organization wants to reduce likelihood in order to reduce a risk level?
Which of the following should be determined FIRST when a new security vulnerability is made public?
Who is PRIMARILY accountable for identifying risk on a daily basis and ensuring adherence to the organization's policies?
When developing a response plan to address security incidents regarding sensitive data loss, it is MOST important
Which of the following BEST balances the costs and benefits of managing IT risk*?
An organization has decided to postpone the assessment and treatment of several risk scenarios because stakeholders are unavailable. As a result of this decision, the risk associated with these new entries has been;
Which of the following is MOST important for senior management to review during an acquisition?
From a risk management perspective, which of the following is the PRIMARY purpose of conducting a root cause analysis following an incident?
When an organization’s disaster recovery plan (DRP) has a reciprocal agreement, which of the following risk treatment options is being applied?
After the announcement of a new IT regulatory requirement, it is MOST important for a risk practitioner to;
A risk assessment has been completed on an application and reported to the application owner. The report includes validated vulnerability findings that require mitigation. Which of the following should be the NEXT step?
In addition to the risk register, what should a risk practitioner review to develop an understanding of the organization's risk profile?
A recent internal risk review reveals the majority of core IT application recovery time objectives (RTOs) have exceeded the maximum time defined by the business application owners. Which of the following is MOST likely to change as a result?
Winch of the following is the BEST evidence of an effective risk treatment plan?
Which of the following would prompt changes in key risk indicator {KRI) thresholds?
To effectively address ethical risk within an organization, who MUST ensure the ethics policy is enforced and equally applied to all levels of authority'?
Which of the following shortcomings of perimeter security does Zero Trust aim to resolve?
An organizations chief technology officer (CTO) has decided to accept the risk associated with the potential loss from a denial-of-service (DoS) attack. In this situation, the risk practitioner's BEST course of action is to:
Which of the following controls would BEST mitigate the risk of user passwords being compromised by a man in the middle technique?
Which of the following would be MOST helpful in assessing the risk associated with data loss due to human vulnerabilities?
An organization has experienced several incidents of extended network outages that have exceeded tolerance. Which of the following should be the risk practitioner's FIRST step to address this situation?
The number of tickets to rework application code has significantly exceeded the established threshold. Which of the following would be the risk practitioner s BEST recommendation?
Which of the following BEST indicates that security requirements have been incorporated into the system development life cycle (SDLC)?
An organization's stakeholders are unable to agree on appropriate risk responses. Which of the following would be the BEST course of action?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of an antivirus program?
An organization is planning to acquire a new financial system. Which of the following stakeholders would provide the MOST relevant information for analyzing the risk associated with the new IT solution?
A hospital recently implemented a new technology to allow virtual patient appointments. Which of the following should be the risk practitioner's FIRST course of action?
Which of the following is the GREATEST benefit for an organization with a strong risk awareness culture?
Which of the following would MOST likely result in updates to an IT risk appetite statement?
Which of the following is the GREATEST benefit of a three lines of defense structure?
Which of the following is MOST important to consider before determining a response to a vulnerability?
Which of the following statements describes the relationship between key risk indicators (KRIs) and key control indicators (KCIs)?
An organization has outsourced its lease payment process to a service provider who lacks evidence of compliance with a necessary regulatory standard. Which risk treatment was adopted by the organization?
Which of the following activities is a responsibility of the second line of defense?
The GREATEST benefit of introducing continuous monitoring to an IT control environment is that it:
A risk practitioner identifies a database application that has been developed and implemented by the business independently of IT. Which of the following is the BEST course of action?
Which of the following offers the SIMPLEST overview of changes in an organization's risk profile?
A risk practitioner wants to identify potential risk events that affect the continuity of a critical business process. Which of the following should the risk practitioner do FIRST?
Which of the following is MOST important to consider when selecting and designing key control indicators (KCIs)?
A data processing center operates in a jurisdiction where new regulations have significantly increased penalties for data breaches. Which of the following elements of the risk register is MOST important to update to reflect this change?
Which of the following is the MOST effective way to help ensure accountability for managing risk?
When of the following 15 MOST important when developing a business case for a proposed security investment?
An organization must make a choice among multiple options to respond to a risk. The stakeholders cannot agree and decide to postpone the decision. Which of the following risk responses has the organization adopted?