Which of the following should be the FIRST consideration when establishing a new risk governance program?
Which of the following is the MOST essential factor for managing risk in a highly dynamic environment?
What is the BEST recommendation to reduce the risk associated with potential system compromise when a vendor stops releasing security patches and updates for a business-critical legacy system?
Which of the following is the MOST comprehensive resource for prioritizing the implementation of information systems controls?
An organization has committed to a business initiative with the knowledge that the risk exposure is higher than the risk appetite. Which of the following is the risk practitioner's MOST important action related to this decision?
A global organization is planning to collect customer behavior data through social media advertising. Which of the following is the MOST important business risk to be considered?
Which of the following is the GREATEST concern when establishing key risk indicators (KRIs)?
The PRIMARY objective of collecting information and reviewing documentation when performing periodic risk analysis should be to:
IT stakeholders have asked a risk practitioner for IT risk profile reports associated with specific departments to allocate resources for risk mitigation. The BEST way to address this request would be to use:
Which of the following is the MOST important objective of embedding risk management practices into the initiation phase of the project management life cycle?
Which of the following is the BEST indication that an organization's risk management program has not reached the desired maturity level?
Which of the following shortcomings of perimeter security does Zero Trust aim to resolve?
A risk practitioner has learned that the number of emergency change management tickets without subsequent approval has doubled from the same period of the previous year. Which of the following is the MOST important action for the risk practitioner to take?
Which risk response strategy could management apply to both positive and negative risk that has been identified?
To drive effective risk management, it is MOST important that an organization's policy framework is:
Which of the following describes the relationship between Key risk indicators (KRIs) and key control indicators (KCIS)?
Which of the following is the MOST important for an organization to have in place to ensure IT asset protection?
Which of the following is the MOST effective way to help ensure an organization's current risk scenarios are relevant?
Which of the following is the MOST important reason to validate that risk responses have been executed as outlined in the risk response plan''
After several security incidents resulting in significant financial losses, IT management has decided to outsource the security function to a third party that provides 24/7 security operation services. Which risk response option has management implemented?
A risk heat map is MOST commonly used as part of an IT risk analysis to facilitate risk:
Which of the following would BEST prevent an unscheduled application of a patch?
Which of the following BEST protects organizational data within a production cloud environment?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of IT policies? The number of:
After a business unit implemented an Internet of Things (IoT) solution, the organization became aware of an emerging risk from the interoperability of IoT devices. Which of the following should be done FIRST in response to this situation?
An organization has made a decision to purchase a new IT system. During when phase of the system development life cycle (SDLC) will identified risk MOST likely lead to architecture and design trade-offs?
Which of the following is MOST important when identifying an organization's risk exposure associated with Internet of Things (loT) devices?
Which of the following is the MOST effective way to validate organizational awareness of cybersecurity risk?
It is MOST important to the effectiveness of an IT risk management function that the associated processes are:
An organization has experienced several incidents of extended network outages that have exceeded tolerance. Which of the following should be the risk practitioner's FIRST step to address this situation?
Which of the following is the GREATEST concern associated with the use of artificial intelligence (AI) language models?
An organization is analyzing the risk of shadow IT usage. Which of the following is the MOST important input into the assessment?
A new software package that could help mitigate risk in an organization has become available. Which of the following is the risk practitioner's BEST course of action?
Which of the following should be the risk practitioner s PRIMARY focus when determining whether controls are adequate to mitigate risk?
Which of the following would be the GREATEST risk associated with a new implementation of single sign-on?
Which of the following is the MOST significant indicator of the need to perform a penetration test?
The BEST way to determine the likelihood of a system availability risk scenario is by assessing the:
During the creation of an organization's IT risk management program, the BEST time to identify key risk indicators (KRIs) is while:
Which of the following is the PRIMARY advantage of aligning generic risk scenarios with business objectives?
Which of the following is the BEST evidence that risk management is driving business decisions in an organization?
Which of the following should be the starting point when performing a risk analysis for an asset?
An organization mandates the escalation of a service ticket when a key application is offline for 5 minutes or more due to potential risk exposure. The risk practitioner has been asked by management to prepare a report of application offline times using both 3- and 5-minute thresholds. What does the 3-minute threshold represent?
Which of the following BEST facilitates the process of documenting risk tolerance?
Which of the following observations would be GREATEST concern to a risk practitioner reviewing the implementation status of management action plans?
Which of the following activities BEST facilitates effective risk management throughout the organization?
An information system for a key business operation is being moved from an in-house application to a Software as a Service (SaaS) vendor. Which of the following will have the GREATEST impact on the ability to monitor risk?
From a risk management perspective, the PRIMARY objective of using maturity models is to enable:
Malware has recently affected an organization. The MOST effective way to resolve this situation and define a comprehensive risk treatment plan would be to perform: