From an IT risk perspective, which of the following has the GREATEST impact on organizational strategy?
During a review of the asset life cycle process, a risk practitioner identified several unreturned and unencrypted laptops belonging to former employees. Which of the following is the GREATEST concern with this finding?
Which of the following BEST enables risk mitigation associated with software licensing noncompliance?
A risk practitioner implemented a process to notify management of emergency changes that may not be approved. Which of the following is the BEST way to provide this information to management?
Which of the following is the PRIMARY purpose of conducting risk and control self-assessments?
The MOST appropriate key performance indicator (KPI) to communicate the effectiveness of an enterprise IT risk management program is:
Which of the following is the MOST important reason to communicate risk assessments to senior management?
When documenting a risk response, which of the following provides the STRONGEST evidence to support the decision?
A trusted third-party service provider has determined that the risk of a client ' s systems being hacked is low. Which of the following would be the client ' s BEST course of action?
Which of the following would be MOST helpful to a risk owner when making risk-aware decisions?
What is the PRIMARY reason an organization should include background checks on roles with elevated access to production as part of its hiring process?
An IT control gap has been identified in a key process. Who would be the MOST appropriate owner of the risk associated with this gap?
An organization plans to implement a new AI application, but the risk practitioner learns that IT policies do not address AI. Which of the following would be the risk practitioner ' s GREATEST concern?
When classifying and prioritizing risk responses, the areas to address FIRST are those with:
Senior management has requested more information regarding the risk associated with introducing a new application into the environment. Which of the following should be done FIRST?
A risk assessment has identified that departments have installed their own WiFi access points on the enterprise network. Which of the following would be MOST important to include in a report to senior management?
A software developer has administrative access to a production application. Which of the following should be of GREATEST concern to a risk practitioner?
From a business perspective, which of the following is the MOST important objective of a disaster recovery test?
What should be the PRIMARY consideration related to data privacy protection when there are plans for a business initiative to make use of personal information?
An organization ' s financial analysis department uses an in-house forecasting application for business projections. Who is responsible for defining access roles to protect the sensitive data within this application?
An IT project risk was identified during a monthly steering committee meeting. Which of the following roles is BEST positioned to approve the risk mitigation response?
Which of the following provides the MOST reliable evidence of a control ' s effectiveness?
A vendor ' s planned maintenance schedule will cause a critical application to temporarily lose failover capabilities. Of the following, who should approve this proposed schedule?
Which of the following should be the PRIMARY consideration when assessing the risk of using Internet of Things (loT) devices to collect and process personally identifiable information (PII)?
Which of the following is the BEST method to ensure a terminated employee ' s access to IT systems is revoked upon departure from the organization?
Which of the following provides the MOST insight into an organization ' s IT threat exposure?
Following a review of a third-party vendor, it is MOST important for an organization to ensure:
Which of the following would MOST likely require a risk practitioner to update the risk register?
Which of the following is the MAIN benefit of involving stakeholders in the selection of key risk indicators (KRIs)?
Which of the following is the MOST valuable data source to support the optimization of an existing key risk indicator (KRI)?
Which of the following should be the PRIMARY basis for establishing a priority sequence when restoring business processes after a disruption?
A risk practitioner has identified that the agreed recovery time objective (RTO) with a Software as a Service (SaaS) provider is longer than the business expectation. Which of the following is the risk practitioner ' s BEST course of action?
IT stakeholders have asked a risk practitioner for IT risk profile reports associated with specific departments to allocate resources for risk mitigation. The BEST way to address this request would be to use:
Which of the following is MOST important to compare against the corporate risk profile?
Who should be responsible for determining which stakeholders need to be involved in the development of a risk scenario?
While reviewing a contract of a cloud services vendor, it was discovered that the vendor refuses to accept liability for a sensitive data breach. Which of the following controls will BES reduce the risk associated with such a data breach?
Which of the following is the MOST important characteristic of an effective risk management program?
Which of the following should be considered FIRST when managing a risk event related to theft and disclosure of customer information?
Which of the following metrics is BEST used to communicate to senior management that the control environment manages risk within appetite and tolerance?
The BEST key performance indicator (KPI) to measure the effectiveness of a vendor risk management program is the percentage of:
A global organization is considering the transfer of its customer information systems to an overseas cloud service provider in the event of a disaster. Which of the following should be the MOST important risk consideration?
The PRIMARY reason for establishing various Threshold levels for a set of key risk indicators (KRIs) is to:
Which of the following should be the MAIN consideration when validating an organization ' s risk appetite?