Which of the following deficiencies identified during a review of an organization's cybersecurity policy should be of MOST concern?
Which of the following is the PRIMARY reason to update a risk register with risk assessment results?
An organization is moving its critical assets to the cloud. Which of the following is the MOST important key performance indicator (KPI) to include in the service level agreement (SLA)?
Which of the following is the MOST important input when developing risk scenarios?
Which of the following will BEST help to ensure key risk indicators (KRIs) provide value to risk owners?
Which of the following is the BEST way for a risk practitioner to present an annual risk management update to the board''
Risk acceptance of an exception to a security control would MOST likely be justified when:
An organization has been made aware of a newly discovered critical vulnerability in a regulatory reporting system. Which of the following is the risk practitioner's BEST course of action?
To minimize risk in a software development project, when is the BEST time to conduct a risk analysis?
Which key performance efficiency IKPI) BEST measures the effectiveness of an organization's disaster recovery program?
Which of the following would be the BEST recommendation if the level of risk in the IT risk profile has decreased and is now below management's risk appetite?
A risk assessment indicates the residual risk associated with a new bring your own device (BYOD) program is within organizational risk tolerance. Which of the following should the risk practitioner
recommend be done NEXT?
Which of the following is the MOST important objective of regularly presenting the project risk register to the project steering committee?
Which of the following outcomes of disaster recovery planning is MOST important to enable the initiation of necessary actions during a disaster?
Which of the following is the PRIMARY reason to have the risk management process reviewed by a third party?
Which of the following is MOST important for mitigating ethical risk when establishing accountability for control ownership?
Which of the following would be a risk practitioner'$ BEST recommendation to help ensure cyber risk is assessed and reflected in the enterprise-level risk profile?
An organization has an internal control that requires all access for employees be removed within 15 days of their termination date. Which of the following should the risk practitioner use to monitor
adherence to the 15-day threshold?
The risk associated with a high-risk vulnerability in an application is owned by the:
An organization has recently hired a large number of part-time employees. During the annual audit, it was discovered that many user IDs and passwords were documented in procedure manuals for use by the part-time employees. Which of the following BEST describes this situation?
Which of the following scenarios presents the GREATEST risk for a global organization when implementing a data classification policy?
Which of the following is the MOST important consideration when selecting key risk indicators (KRIs) to monitor risk trends over time?
Which of the following indicates an organization follows IT risk management best practice?
The design of procedures to prevent fraudulent transactions within an enterprise resource planning (ERP) system should be based on:
An organization has recently updated its disaster recovery plan (DRP). Which of the following would be the GREATEST risk if the new plan is not tested?
A business unit has decided to accept the risk of implementing an off-the-shelf, commercial software package that uses weak password controls. The BEST course of action would be to:
Which of the following is MOST helpful to understand the consequences of an IT risk event?
Which organization is implementing a project to automate the purchasing process, including the modification of approval controls. Which of the following tasks is lie responsibility of the risk practitioner*?
Which of the following methods is the BEST way to measure the effectiveness of automated information security controls prior to going live?
An organization has built up its cash reserves and has now become financially able to support additional risk while meeting its objectives. What is this change MOST likely to impact?
A risk practitioner wants to identify potential risk events that affect the continuity of a critical business process. Which of the following should the risk practitioner do FIRST?
When creating a separate IT risk register for a large organization, which of the following is MOST important to consider with regard to the existing corporate risk 'register?
Which of the following is the BEST way to ensure adequate resources will be allocated to manage identified risk?
An organization has determined that risk is not being adequately tracked and
managed due to a distributed operating model. Which of the following is the
BEST way to address this issue?
To communicate the risk associated with IT in business terms, which of the following MUST be defined?
A root because analysis indicates a major service disruption due to a lack of competency of newly hired IT system administrators Who should be accountable for resolving the situation?
During the control evaluation phase of a risk assessment, it is noted that multiple controls are ineffective. Which of the following should be the risk practitioner's FIRST course of action?
Which of the following controls will BEST detect unauthorized modification of data by a database administrator?
Which of the following is the PRIMARY benefit of identifying and communicating with stakeholders at the onset of an IT risk assessment?
Which of the following is the MOST common concern associated with outsourcing to a service provider?
An organization is considering outsourcing user administration controls tor a critical system. The potential vendor has offered to perform quarterly sett-audits of its controls instead of having annual independent audits. Which of the following should be of GREATEST concern to me risk practitioner?
Which of the following is MOST important for management to consider when deciding whether to invest in an IT initiative that exceeds management's risk appetite?
When assigning control ownership, it is MOST important to verify that the owner has accountability for:
Which of the following will BEST ensure that information security risk factors are mitigated when developing in-house applications?
Which of the following observations would be GREATEST concern to a risk practitioner reviewing the implementation status of management action plans?
Which of the following is the MAIN benefit to an organization using key risk indicators (KRIs)?
Because of a potential data breach, an organization has decided to temporarily shut down its online sales order system until sufficient controls can be implemented. Which risk treatment has been selected?