Which of the following, who should be PRIMARILY responsible for performing user entitlement reviews?
Which of the following risk impacts should be the PRIMARY consideration for determining recovery priorities in a disaster recovery situation?
Which of the following is the MOST important key performance indicator (KPI) to establish in the service level agreement (SLA) for an outsourced data center?
Which of the following BEST prevents control gaps in the Zero Trust model when implementing in the environment?
An organization has outsourced its lease payment process to a service provider who lacks evidence of compliance with a necessary regulatory standard. Which risk treatment was adopted by the organization?
Which of the following would provide the BEST guidance when selecting an appropriate risk treatment plan?
An organization is planning to move its application infrastructure from on-premises to the cloud. Which of the following is the BEST course of the actin to address the risk associated with data transfer if the relationship is terminated with the vendor?
A control owner identifies that the organization's shared drive contains personally identifiable information (Pll) that can be accessed by all personnel. Which of the following is the MOST effective risk response?
Prior to selecting key performance indicators (KPIs), itis MOST important to ensure:
Which of the following would be MOST helpful when estimating the likelihood of negative events?
An organization recently configured a new business division Which of the following is MOST likely to be affected?
Who is accountable for authorizing application access in a cloud Software as a Service (SaaS) solution?
Which of the following BEST enables a risk practitioner to focus on risk factors that could potentially affect the results of an IT initiative?
Which of the following should be a risk practitioner's GREATEST concern upon learning of failures in a data migration activity?
Because of a potential data breach, an organization has decided to temporarily shut down its online sales order system until sufficient controls can be implemented. Which risk treatment has been selected?
Which of the following helps ensure compliance with a nonrepudiation policy requirement for electronic transactions?
Which of the following would be MOST important for a risk practitioner to provide to the internal audit department during the audit planning process?
Which of the following is the MOST important step to ensure regulatory requirements are adequately addressed within an organization?
The GREATEST benefit of including low-probability, high-impact events in a risk assessment is the ability to:
Which of the following BEST enables risk mitigation associated with software licensing noncompliance?
Which of the following is the BEST way to identify changes in the risk profile of an organization?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
A risk practitioner identifies an increasing trend of employees copying company information unrelated to their job functions to USB drives. Which of the following elements of the risk register should be updated to reflect this observation?
Which of the following should be a risk practitioner's PRIMARY focus when tasked with ensuring organization records are being retained for a sufficient period of time to meet legal obligations?
Which of the following should be a risk practitioner’s MOST important consideration when developing IT risk scenarios?
Which of the following is the MOST effective control to maintain the integrity of system configuration files?
Which of the following is the MOST important reason for a risk practitioner to identify stakeholders for each IT risk scenario?
Which of the following is the MOST important driver of an effective enterprise risk management (ERM) program?
An organization has outsourced its customer management database to an external service provider. Of the following, who should be accountable for ensuring customer data privacy?
Which of the following will MOST improve stakeholders' understanding of the effect of a potential threat?
Which of the following is the MOST important metric to monitor the performance of the change management process?
Which of the following is MOST important to ensure when continuously monitoring the performance of a client-facing application?
A risk practitioner notices a risk scenario associated with data loss at the organization's cloud provider is assigned to the provider who should the risk scenario be reassigned to.
When formulating a social media policy lo address information leakage, which of the following is the MOST important concern to address?
Which of the following requirements is MOST important to include in an outsourcing contract to help ensure sensitive data stored with a service provider is secure?
Which of the following is the BEST control to minimize the risk associated with scope creep in software development?
A risk heat map is MOST commonly used as part of an IT risk analysis to facilitate risk:
Which of the following is MOST important to review when evaluating the ongoing effectiveness of the IT risk register?
If preventive controls cannot be Implemented due to technology limitations, which of the following should be done FIRST to reduce risk7
Which of the following is the MOST important objective of an enterprise risk management (ERM) program?
Which of the following should be the PRIMARY area of focus when reporting changes to an organization's risk profile to executive management?
A risk practitioner's BEST guidance to help an organization develop relevant risk scenarios is to ensure the scenarios are:
The purpose of requiring source code escrow in a contractual agreement is to:
Which of the following would cause the GREATEST concern for a risk practitioner reviewing the IT risk scenarios recorded in an organization’s IT risk register?
An external security audit has reported multiple findings related to control noncompliance. Which of the following would be MOST important for the risk practitioner to communicate to senior management?
Which of the following is MOST critical to the design of relevant risk scenarios?