Which of the following should be the HIGHEST priority when developing a risk response?
Which of the following key risk indicators (KRIs) provides the BEST insight into the risk associated with IT systems being unable to meet the required availability service level in the future?
Which of the following is MOST helpful in identifying new risk exposures due to changes in the business environment?
Which of the following should be initiated when a high number of noncompliant conditions are observed during review of a control procedure?
Which of the following is a risk practitioner's BEST recommendation upon learning that an employee inadvertently disclosed sensitive data to a vendor?
A risk practitioner learns that the organization s industry is experiencing a trend of rising security incidents. Which of the following is the BEST course of action?
After entering a large number of low-risk scenarios into the risk register, it is MOST important for the risk practitioner to:
What is the MAIN benefit of using a top-down approach to develop risk scenarios?
When a risk practitioner is building a key risk indicator (KRI) from aggregated data, it is CRITICAL that the data is derived from:
Which of the following is the BEST way to mitigate the risk to IT infrastructure availability?
An organizational policy requires critical security patches to be deployed in production within three weeks of patch availability. Which of the following is the BEST metric to verify adherence to the policy?
Which of the following is MOST important to review when evaluating the ongoing effectiveness of the IT risk register?
Which of the following issues should be of GREATEST concern when evaluating existing controls during a risk assessment?
The BEST way to justify the risk mitigation actions recommended in a risk assessment would be to:
Which of the following would BEST mitigate the ongoing risk associated with operating system (OS) vulnerabilities?
Which of the following should be considered FIRST when assessing risk associated with the adoption of emerging technologies?
Which of the following is the BEST measure of the effectiveness of an employee deprovisioning process?
When developing risk treatment alternatives for a Business case, it is MOST helpful to show risk reduction based on:
Which of the following would cause the GREATEST concern for a risk practitioner reviewing the IT risk scenarios recorded in an organization’s IT risk register?
Which of the following criteria for assigning owners to IT risk scenarios provides the GREATEST benefit to an organization?
A risk practitioner identifies a database application that has been developed and implemented by the business independently of IT. Which of the following is the BEST course of action?
Which of the following is the GREATEST risk associated with the transition of a sensitive data backup solution from on-premise to a cloud service provider?
A recently purchased IT application does not meet project requirements. Of the following, who is accountable for the potential impact?
Which of the following is the GREATEST benefit of analyzing logs collected from different systems?
Who is BEST suited to provide objective input when updating residual risk to reflect the results of control effectiveness?
Which of the following describes the relationship between risk appetite and risk tolerance?
Which of the following would be MOST beneficial as a key risk indicator (KRI)?
Which of the following should be done FIRST when a new risk scenario has been identified
Which of the following is MOST important to the effective monitoring of key risk indicators (KRIS)?
While evaluating control costs, management discovers that the annual cost exceeds the annual loss expectancy (ALE) of the risk. This indicates the:
Which of the following would be the GREATEST concern for an IT risk practitioner when an employees.....
An organization is making significant changes to an application. At what point should the application risk profile be updated?
Which of the following is MOST important to ensure when continuously monitoring the performance of a client-facing application?
An organization's IT department wants to complete a proof of concept (POC) for a security tool. The project lead has asked for approval to use the production data for testing purposes as it will yield the best results. Which of the following is the risk practitioner's BEST recommendation?
A company has located its computer center on a moderate earthquake fault. Which of the following is the MOST important consideration when establishing a contingency plan and an alternate processing site?
When developing a new risk register, a risk practitioner should focus on which of the following risk management activities?
An organization is considering adopting artificial intelligence (AI). Which of the
following is the risk practitioner's MOST important course of action?
Which of the following is a risk practitioner's BEST course of action after identifying risk scenarios related to noncompliance with new industry regulations?
Which of the following is the BEST indication of an effective risk management program?
The risk associated with an asset before controls are applied can be expressed as:
An organization has outsourced its IT security operations to a third party. Who is ULTIMATELY accountable for the risk associated with the outsourced operations?
Which of the following would be of MOST concern to a risk practitioner reviewing risk action plans for documented IT risk scenarios?
A risk practitioner has learned that an effort to implement a risk mitigation action plan has stalled due to lack of funding. The risk practitioner should report that the associated risk has been: