Which of the following is the MOST important consideration when identifying stakeholders to review risk scenarios developed by a risk analyst? The reviewers are:
Which of the following is MOST helpful to review when identifying risk scenarios associated with the adoption of Internet of Things (loT) technology in an organization?
Who is responsible for IT security controls that are outsourced to an external service provider?
Which of the following risk activities is BEST facilitated by enterprise architecture (EA)?
Which of the following is the BEST indication of the effectiveness of a business continuity program?
Which of the following describes the relationship between risk appetite and risk tolerance?
Which of the following BEST indicates that an organization ' s disaster recovery plan (DRP) will mitigate the risk of the organization failing to recover from a major service disruption?
Which of the following is MOST important to include when reporting the effectiveness of risk management to senior management?
The operational risk associated with attacks on a web application should be owned by the individual in charge of:
Which of the following BEST helps to identify significant events that could impact an organization?
Vulnerability analysis
Which of the following is the BEST indicator of an effective IT security awareness program?
Which of the following is MOST essential for an effective change control environment?
During the control evaluation phase of a risk assessment, it is noted that multiple controls are ineffective. Which of the following should be the risk practitioner ' s FIRST course of action?
A recent regulatory requirement has the potential to affect an organization ' s use of a third party to supply outsourced business services. Which of the following is the BEST course of action?
A small organization finds it difficult to implement separation of duties necessary to mitigate the likelihood of system misuse. Which of the following would be the BEST compensating control?
An organization has established a contract with a vendor that includes penalties for loss of availability. Which risk treatment has been adopted by the organization?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of IT policies? The number of:
An organization has been made aware of a newly discovered critical vulnerability in a regulatory reporting system. Which of the following is the risk practitioner ' s BEST course of action?
When assessing the maturity level of an organization ' s risk management framework, which of the following should be of GREATEST concern to a risk practitioner?
Which of the following should be the FIRST consideration when a business unit wants to use personal information for a purpose other than for which it was originally collected?
A risk practitioner is evaluating policies defined by an organization as part of its IT security framework. Which of the following would be of GREATEST concern?
An organization striving to be on the leading edge in regard to risk monitoring would MOST likely implement:
An organization recently implemented new technologies that enable the use of robotic process automation. Which of the following is MOST important to reassess?
Which of the following is the MOST important reason to create risk scenarios?
Which of the following provides a risk practitioner with the MOST reliable evidence of a third party ' s ability to protect the confidentiality of sensitive corporate information?
Which of the following is the GREATEST concern when an organization uses a managed security service provider as a firewall administrator?
An organization ' s risk register contains a large volume of risk scenarios that senior management considers overwhelming. Which of the following would BEST help to improve the risk register?
Which of the following is the BEST key control indicator (KCI) for measuring the security of a blockchain network?
Which of the following is the MOST important component in a risk treatment plan?
Which of the following is MOST important for mitigating ethical risk when establishing accountability for control ownership?
Which of the following sources is MOST relevant to reference when updating security awareness training materials?
Which of the following should be the PRIMARY focus of a disaster recovery management (DRM) framework and related processes?
Which of the following is the BEST way to address IT regulatory compliance risk?
Which of the following is MOST likely to be impacted as a result of a new policy which allows staff members to remotely connect to the organization ' s IT systems via personal or public computers?
Which of the following is the BEST way to determine the value of information assets for risk management purposes?
Which of the following should be the PRIMARY objective of promoting a risk-aware culture within an organization?
Within the system development life cycle (SDLC), controls should be specified during:
Winch of the following key control indicators (KCIs) BEST indicates whether security requirements are identified and managed throughout a project He cycle?
A cloud service provider has completed upgrades to its cloud infrastructure to enhance service availability. Which of the following is the MOST important key risk indicator (KRI) for management to monitor?
Which of the following is a risk practitioner ' s BEST course of action after identifying risk scenarios related to noncompliance with new industry regulations?
An organization is adopting block chain for a new financial system. Which of the following should be the GREATEST concern for a risk practitioner evaluating the system ' s production readiness?
Which of the following should be the PRIMARY consideration when assessing the risk of using Internet of Things (loT) devices to collect and process personally identifiable information (Pll)?
Which of the following BEST indicates that additional or improved controls ate needed m the environment?
An organization has identified that terminated employee accounts are not disabled or deleted within the time required by corporate policy. Unsure of the reason, the organization has decided to monitor the situation for three months to obtain more information. As a result of this decision, the risk has been:
To effectively address ethical risk within an organization, who MUST ensure the ethics policy is enforced and equally applied to all levels of authority ' ?
Which of the following MUST be assessed before considering risk treatment options for a scenario with significant impact?