Which of the following BEST assists in justifying an investment in automated controls?
An organization is implementing data warehousing infrastructure. Senior management is concerned about safeguarding client data security in this new environment. Which of the following should the risk practitioner recommend be done NEXT?
Which of the following is the BEST key control indicator (KCI) for a vulnerability management program?
Which of the following is the PRIMARY purpose for ensuring senior management understands the organization’s risk universe in relation to the IT risk management program?
Which of the following is the GREATEST benefit to an organization when updates to the risk register are made promptly after the completion of a risk assessment?
Which of the following would MOST likely result in updates to an IT risk appetite statement?
An organization's business gap analysis reveals the need for a robust IT risk strategy. Which of the following should be the risk practitioner's PRIMARY consideration when participating in development of the new strategy?
An organization's finance team is proposing the adoption of a blockchain technology to provide a secure method for moving funds. Which of the following should the risk practitioner do FIRST?
Which of the following is the BEST method to mitigate the risk of an unauthorized employee viewing confidential data in a database''
Which of the following elements of a risk register is MOST likely to change as a result of change in management's risk appetite?
The BEST key performance indicator (KPI) to measure the effectiveness of a backup process would be the number of:
Which of the following is the PRIMARY reason for an organization to include an acceptable use banner when users log in?
An organization has experienced a cyber-attack that exposed customer personally identifiable information (Pll) and caused extended outages of network services. Which of the following stakeholders are MOST important to include in the cyber response team to determine response actions?
A risk practitioner has been asked to evaluate a new cloud-based service to enhance an organization's access management capabilities. When is the BEST time for the risk practitioner to provide opinions on control strength?
A company has recently acquired a customer relationship management (CRM) application from a certified software vendor. Which of the following will BE ST help lo prevent technical vulnerabilities from being exploded?
While conducting an organization-wide risk assessment, it is noted that many of the information security policies have not changed in the past three years. The BEST course of action is to:
Reviewing which of the following provides the BEST indication of an organizations risk tolerance?
Which of the following controls are BEST strengthened by a clear organizational code of ethics?
Which of the following management actions will MOST likely change the likelihood rating of a risk scenario related to remote network access?
Which of the following controls BEST helps to ensure that transaction data reaches its destination?
A third-party vendor has offered to perform user access provisioning and termination. Which of the following control accountabilities is BEST retained within the organization?
An organizational policy requires critical security patches to be deployed in production within three weeks of patch availability. Which of the following is the BEST metric to verify adherence to the policy?
Which of the following is the MOST important objective of embedding risk management practices into the initiation phase of the project management life cycle?
A recent audit identified high-risk issues in a business unit though a previous control self-assessment (CSA) had good results. Which of the following is the MOST likely reason for the difference?
To mitigate the risk of using a spreadsheet to analyze financial data, IT has engaged a third-party vendor to deploy a standard application to automate the process. Which of the following parties should own the risk associated with calculation errors?
Which of the following roles would be MOST helpful in providing a high-level view of risk related to customer data loss?
Which of the following should a risk practitioner recommend FIRST when an increasing trend of risk events and subsequent losses has been identified?
Which of the following BEST enables an organization to increase the likelihood of identifying risk associated with unethical employee behavior?
A risk practitioner has been asked to evaluate the adoption of a third-party blockchain integration platform based on the value added by the platform and the organization's risk appetite. Which of the following is the risk practitioner's BEST course of action?
An organization wants to grant remote access to a system containing sensitive data to an overseas third party. Which of the following should be of GREATEST concern to management?
The BEST way to obtain senior management support for investment in a control implementation would be to articulate the reduction in:
Which of the following scenarios is MOST likely to cause a risk practitioner to request a formal risk acceptance sign-off?
An organization's decision to remain noncompliant with certain laws or regulations is MOST likely influenced by:
Which of the following is the FIRST step in managing the security risk associated with wearable technology in the workplace?
A global organization is considering the transfer of its customer information systems to an overseas cloud service provider in the event of a disaster. Which of the following should be the MOST important risk consideration?
An organization is subject to a new regulation that requires nearly real-time recovery of its services following a disruption. Which of the following is the BEST way to manage the risk in this situation?
An internal audit report reveals that not all IT application databases have encryption in place. Which of the following information would be MOST important for assessing the risk impact?
Which of the following is the BEST indication of an enhanced risk-aware culture?
Which of the following BEST enforces access control for an organization that uses multiple cloud technologies?
An organization's capability to implement a risk management framework is PRIMARILY influenced by the:
Which of the following BEST informs decision-makers about the value of a notice and consent control for the collection of personal information?
Which of the following is the MOST important benefit of implementing a data classification program?
A risk practitioner learns that the organization s industry is experiencing a trend of rising security incidents. Which of the following is the BEST course of action?
Which of the following provides the BEST protection for Internet of Things (loT) devices that are accessed within an organization?
For a large software development project, risk assessments are MOST effective when performed:
An unauthorized individual has socially engineered entry into an organization's secured physical premises. Which of the following is the BEST way to prevent future occurrences?