Which of the following helps ensure compliance with a nonrepudiation policy requirement for electronic transactions?
An external data source has released an advisory about a critical vulnerability affecting a widely used software application. Which of the following should the risk practitioner do FIRST?
Which of the following controls will BEST mitigate risk associated with excessive access privileges?
Performing a background check on a new employee candidate before hiring is an example of what type of control?
Which of the following is a risk practitioner ' s BEST course of action upon learning that a control under internal review may no longer be necessary?
Which of the following controls will BEST detect unauthorized modification of data by a database administrator?
Which of the following is the GREATEST benefit of a three lines of defense structure?
Which of the following is MOST important for an organization to have in place to identify unauthorized devices on the network?
Which of the following is the BEST key performance indicator (KPI) for determining how well an IT policy is aligned to business requirements?
The PRIMARY benefit of using a maturity model is that it helps to evaluate the:
Identifying which of the following would BEST help an organization define an IT asset ' s criticality?
Which of the following provides the BEST evidence that risk responses are effective?
Quantifying the value of a single asset helps the organization to understand the:
An organization has outsourced its backup and recovery procedures to a third-party cloud provider. Which of the following is the risk practitioner s BEST course of action?
Who is MOST likely to be responsible for the coordination between the IT risk strategy and the business risk strategy?
Which of the following scenarios is MOST likely to cause a risk practitioner to request a formal risk acceptance sign-off?
An organization has initiated a project to launch an IT-based service to customers and take advantage of being the first to market. Which of the following should be of GREATEST concern to senior management?
Which of the following approaches to bring your own device (BYOD) service delivery provides the BEST protection from data loss?
Which of the following would be the GREATEST risk associated with a new implementation of single sign-on?
A risk heat map is MOST commonly used as part of an IT risk analysis to facilitate risk:
Which of the following is the MOST important consideration for prioritizing risk treatment plans when faced with budget limitations?
During a routine check, a system administrator identifies unusual activity indicating an intruder within a firewall. Which of the following controls has MOST likely been compromised?
Which of the following practices MOST effectively safeguards the processing of personal data?
After several security incidents resulting in significant financial losses, IT management has decided to outsource the security function to a third party that provides 24/7 security operation services. Which risk response option has management implemented?
Who should be responsible (of evaluating the residual risk after a compensating control has been
An organization has built up its cash reserves and has now become financially able to support additional risk while meeting its objectives. What is this change MOST likely to impact?
Which of the following would BEST support the integrity of online financial transactions?
A risk practitioner is concerned with potential data loss in the event of a breach at a hosted third-party provider. Which of the following is the BEST way to mitigate this risk?
For no apparent reason, the time required to complete daily processing for a legacy application is approaching a risk threshold. Which of the following activities should be performed FIRST?
Which of the following is MOST important for an organization to update following a change in legislation requiring notification to individuals impacted by data breaches?
Which of the following is the MOST important consideration when sharing risk management updates with executive management?
A new regulator/ requirement imposes severe fines for data leakage involving customers ' personally identifiable information (Pll). The risk practitioner has recommended avoiding the risk. Which of the following actions would BEST align with this recommendation?
Which of the following would BEST assist in reconstructing the sequence of events following a security incident across multiple IT systems in the organization ' s network?
Which of the following is the MOST effective key performance indicator (KPI) for change management?
An organization has asked an IT risk practitioner to conduct an operational risk assessment on an initiative to outsource the organization ' s customer service operations overseas. Which of the following would MOST significantly impact management ' s decision?
An organization ' s finance team is proposing the adoption of a blockchain technology to provide a secure method for moving funds. Which of the following should the risk practitioner do FIRST?
Which of the following is the FIRST step in managing the security risk associated with wearable technology in the workplace?