Concerned about system load capabilities during the month-end close process, management requires monitoring of the average time to complete tasks and monthly reporting of the findings. What type of measure has been established?
Deviation from a mitigation action plan's completion date should be determined by which of the following?
An organization's risk register contains a large volume of risk scenarios that senior management considers overwhelming. Which of the following would BEST help to improve the risk register?
Which of the following analyses is MOST useful for prioritizing risk scenarios associated with loss of IT assets?
Which of the following should be management's PRIMARY focus when key risk indicators (KRIs) begin to rapidly approach defined thresholds?
A PRIMARY function of the risk register is to provide supporting information for the development of an organization's risk:
Which of the following should be the PRIMARY concern when changes to firewall rules do not follow change management requirements?
To reduce costs, an organization is combining the second and third tines of defense in a new department that reports to a recently appointed C-level executive. Which of the following is the GREATEST concern with this situation?
Which of the following is the BEST indication that key risk indicators (KRIs) should be revised?
A risk practitioner is reviewing the status of an action plan to mitigate an emerging IT risk and finds the risk level has increased. The BEST course of action would be to:
Following an acquisition, the acquiring company's risk practitioner has been asked to update the organization's IT risk profile What is the MOST important information to review from the acquired company to facilitate this task?
Which of the following is MOST important for management to consider when deciding whether to invest in an IT initiative that exceeds management's risk appetite?
Which of the following should be of GREATEST concern to a risk practitioner when determining the effectiveness of IT controls?
A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?
Which of the following is the PRIMARY role of the board of directors in corporate risk governance?
An organization's Internet-facing server was successfully attacked because the server did not have the latest security patches. The risk associated with poor patch management had been documented in the risk register and accepted. Who should be accountable for any related losses to the organization?
Which of the following is the MOST important reason to restrict access to the risk register on a need-to-know basis?
What should a risk practitioner do FIRST when a shadow IT application is identified in a business owner's business impact analysis (BIA)?
Which of the following should be a risk practitioner's NEXT step after learning of an incident that has affected a competitor?
Analyzing trends in key control indicators (KCIs) BEST enables a risk practitioner to proactively identify impacts on an organization's:
Which of the following is the GREATEST benefit of identifying appropriate risk owners?
An organization is planning to move its application infrastructure from on-premises to the cloud. Which of the following is the BEST course of the actin to address the risk associated with data transfer if the relationship is terminated with the vendor?
Periodically reviewing and updating a risk register with details on identified risk factors PRIMARILY helps to:
The BEST way to justify the risk mitigation actions recommended in a risk assessment would be to:
Which of the following BEST mitigates the risk associated with inadvertent data leakage by users who work remotely?
when developing IT risk scenarios associated with a new line of business, which of the following would be MOST helpful to review?
Which of the following should be management's PRIMARY consideration when approving risk response action plans?
IT stakeholders have asked a risk practitioner for IT risk profile reports associated with specific departments to allocate resources for risk mitigation. The BEST way to address this request would be to use:
Which of the following attributes of a key risk indicator (KRI) is MOST important?
A financial institution has identified high risk of fraud in several business applications. Which of the following controls will BEST help reduce the risk of fraudulent internal transactions?
Which of the following key performance indicators (KPis) would BEST measure me risk of a service outage when using a Software as a Service (SaaS) vendors
Which of the following provides the MOST up-to-date information about the effectiveness of an organization's overall IT control environment?
Which of the following presents the GREATEST security risk associated with Internet of Things (IoT) technology?
When of the following 15 MOST important when developing a business case for a proposed security investment?
A service organization is preparing to adopt an IT control framework to comply with the contractual requirements of a new client. Which of the following would be MOST helpful to the risk practitioner?
Which of the following is MOST important to include in a risk assessment of an emerging technology?
Which of the following is the GREATEST risk associated with inappropriate classification of data?
Which of the following is the MOST important consideration for protecting data assets m a Business application system?
Which of the following would BEST enable mitigation of newly identified risk factors related to internet of Things (loT)?
Which of the following is MOST important when considering risk in an enterprise risk management (ERM) process?
A risk practitioner has collaborated with subject matter experts from the IT department to develop a large list of potential key risk indicators (KRIs) for all IT operations within theorganization of the following, who should review the completed list and select the appropriate KRIs for implementation?
An external security audit has reported multiple findings related to control noncompliance. Which of the following would be MOST important for the risk practitioner to communicate to senior management?
Which of the following should be the PRIMARY focus of a risk owner once a decision is made to mitigate a risk?
Which of the following is the BEST control to prevent unauthorized access to an organization's critical assets?
When outsourcing a business process to a cloud service provider, it is MOST important to understand that:
Which of the following would be MOST helpful to a risk practitioner when ensuring that mitigated risk remains within acceptable limits?
Which of the following enterprise architecture (EA) controls BEST mitigates the risk of increasingly complex systems becoming compromised by unauthorized network access?
A web-based service provider with a low risk appetite for system outages is reviewing its current risk profile for online security. Which of the following observations would be MOST relevant to escalate to senior management?