Which of the following is the GREATEST concern associated with the transmission of healthcare data across the internet?
A risk heat map is MOST commonly used as part of an IT risk analysis to facilitate risk:
During a routine check, a system administrator identifies unusual activity indicating an intruder within a firewall. Which of the following controls has MOST likely been compromised?
Which of the following is the MOST important consideration when performing a risk assessment of a fire suppression system within a data center?
Which of the following should be of GREATEST concern to a risk practitioner when determining the effectiveness of IT controls?
In an organization where each division manages risk independently, which of the following would BEST enable management of risk at the enterprise level?
When performing a risk assessment of a new service to support a core business process, which of the following should be done FIRST to ensure continuity of operations?
Which of the following analyses is MOST useful for prioritizing risk scenarios associated with loss of IT assets?
Which of the following would provide the BEST evidence of an effective internal control environment/?
Which of the following is a KEY responsibility of the second line of defense?
Which of the following BEST indicates whether security awareness training is effective?
Which of the following should be the GREATEST concern for an organization that uses open source software applications?
Reviewing which of the following provides the BEST indication of an organizations risk tolerance?
In response to the threat of ransomware, an organization has implemented cybersecurity awareness activities. The risk practitioner's BEST recommendation to further reduce the impact of ransomware attacks would be to implement:
Which of the following is the BEST approach when a risk treatment plan cannot be completed on time?
An organization has decided to implement a new Internet of Things (loT) solution. Which of the following should be done FIRST when addressing security concerns associated with this new technology?
An organization uses a web application hosted by a cloud service that is populated by data sent to the vendor via email on a monthly basis. Which of the following should be the FIRST consideration when analyzing the risk associated with the application?
An organization has provided legal text explaining the rights and expected behavior of users accessing a system from geographic locations that have strong privacy regulations. Which of the following control types has been applied?
Which of the following is the PRIMARY concern for a risk practitioner regarding an organization's adoption of innovative big data analytics capabilities?
What should a risk practitioner do FIRST when vulnerability assessment results identify a weakness in an application?
Which of the following is the PRIMARY benefit of stakeholder involvement in risk scenario development?
A bank has outsourced its statement printing function to an external service provider. Which of the following is the MOST critical requirement to include in the contract?
After the announcement of a new IT regulatory requirement, it is MOST important for a risk practitioner to;
Which of the following should be the PRIMARY input to determine risk tolerance?
Which of the following is the GREATEST benefit of updating the risk register to include outcomes from a risk assessment?
Which of the following is the GREATEST concern when establishing key risk indicators (KRIs)?
Which of the following will be MOST effective to mitigate the risk associated with the loss of company data stored on personal devices?
Which of the following is the MOST important course of action to foster an ethical, risk-aware culture?
All business units within an organization have the same risk response plan for creating local disaster recovery plans. In an effort to achieve cost effectiveness, the BEST course of action would be to:
Which of the following should be the MOST important consideration when determining controls necessary for a highly critical information system?
An organization has been experiencing an increasing number of spear phishing attacks Which of the following would be the MOST effective way to mitigate the risk associated with these attacks?
Which of the following BEST reduces the likelihood of employees unintentionally disclosing sensitive information to outside parties?
Which of the following presents the GREATEST challenge for an IT risk practitioner who wants to report on trends in historical IT risk levels?
Which of the following would be the BEST justification to invest in the development of a governance, risk, and compliance (GRC) solution?
Which of the following is MOST important to sustainable development of secure IT services?
Which of the following is the MOST important consideration when prioritizing risk response?
The BEST indication that risk management is effective is when risk has been reduced to meet:
Which of the following is MOST important for a risk practitioner to update when a software upgrade renders an existing key control ineffective?
Which of the following provides the MOST up-to-date information about the effectiveness of an organization's overall IT control environment?
Which of the following is the BEST key performance indicator (KPI) for a server patch management process?
Which of the following is the PRIMARY objective of establishing an organization's risk tolerance and appetite?
A risk practitioner has identified that the agreed recovery time objective (RTO) with a Software as a Service (SaaS) provider is longer than the business expectation. Which of the following is the risk practitioner's BEST course of action?
Which of the following is MOST important when identifying an organization's risk exposure associated with Internet of Things (loT) devices?
Which of the following is the PRIMARY purpose of creating and documenting control procedures?
The PRIMARY advantage of implementing an IT risk management framework is the:
Which of the following will BEST help to ensure the continued effectiveness of the IT risk management function within an organization experiencing high employee turnover?
Which of the following would provide the MOST useful information to a risk owner when reviewing the progress of risk mitigation?