Which of the following is the MOST effective way to minimize the impact associated with the loss of key employees?
Which of the following management actions will MOST likely change the likelihood rating of a risk scenario related to remote network access?
Warning banners on login screens for laptops provided by an organization to its employees are an example of which type of control?
Which of the following is the BEST key performance indicator (KPI) for a server patch management process?
Which of the following should be the risk practitioner s FIRST course of action when an organization has decided to expand into new product areas?
Which of the following is MOST helpful to review when assessing the risk exposure associated with ransomware?
A data center has recently been migrated to a jurisdiction where heavy fines will be imposed should leakage of customer personal data occur. Assuming no other changes to the operating environment, which factor should be updated to reflect this situation as an input to scenario development for this particular risk event?
A risk practitioner identifies an increasing trend of employees copying company information unrelated to their job functions to USB drives. Which of the following elements of the risk register should be updated to reflect this observation?
The BEST way for an organization to ensure that servers are compliant to security policy is
to review:
Which of the following BEST describes the role of the IT risk profile in strategic IT-related decisions?
An IT department has organized training sessions to improve user awareness of organizational information security policies. Which of the following is the BEST key performance indicator (KPI) to reflect effectiveness of the training?
Which of the following is the BEST metric to demonstrate the effectiveness of an organization’s software testing program?
A recent risk workshop has identified risk owners and responses for newly identified risk scenarios. Which of the following should be the risk practitioner ' s NEXT step?
During the creation of an organization ' s IT risk management program, the BEST time to identify key risk indicators (KRIs) is while:
An organization learns of a new ransomware attack affecting organizations worldwide. Which of the following should be done FIRST to reduce the likelihood of infection from the attack?
A multinational organization is considering implementing standard background checks to ' all new employees A KEY concern regarding this approach
Which of the following should a risk practitioner do NEXT after learning that Internet of Things (IoT) devices installed in the production environment lack appropriate security controls for sensitive data?
Which of the following provides the MOST mitigation value for an organization implementing new Internet of Things (loT) devices?
Which of the following is the BEST indicator of the effectiveness of IT risk management processes?
What should a risk practitioner do FIRST when vulnerability assessment results identify a weakness in an application?
A data privacy regulation has been revised to incorporate more stringent requirements for personal data protection. Which of the following provides the MOST important input to help ensure compliance with the revised regulation?
After the implementation of internal of Things (IoT) devices, new risk scenarios were identified. What is the PRIMARY reason to report this information to risk owners?
A vulnerability assessment of a vendor-supplied solution has revealed that the software is susceptible to cross-site scripting and SQL injection attacks. Which of the following will BEST mitigate this issue?
Which of the following is MOST important for a multinational organization to consider when developing its security policies and standards?
A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?
Who is BEST suited to provide information to the risk practitioner about the effectiveness of a technical control associated with an application?
Which of the following would BEST help to ensure that suspicious network activity is identified?
Which of the following would provide the MOST useful information for communicating an organization’s risk level to senior management?
A recent audit identified high-risk issues in a business unit though a previous control self-assessment (CSA) had good results. Which of the following is the MOST likely reason for the difference?
Which of the following is the PRIMARY consideration when determining the impact to an organization after the discovery of malware on an endpoint device?
An organization has outsourced its customer management database to an external service provider. Of the following, who should be accountable for ensuring customer data privacy?
A risk practitioner has identified that the organization ' s secondary data center does not provide redundancy for a critical application. Who should have the authority to accept the associated risk?
Which of the following is the GREATEST benefit of involving business owners in risk scenario development?
Which of the following is the BEST indicator of the effectiveness of a control action plan ' s implementation?
Which of the following is MOST important when creating a program to reduce ethical risk?
What is the BEST approach for determining the inherent risk of a scenario when the actual likelihood of the risk is unknown?
The BEST key performance indicator (KPI) to measure the effectiveness of a vulnerability remediation program is the number of:
Within the three lines of defense model, the responsibility for managing risk and controls resides with:
Which of the following presents the GREATEST challenge for an IT risk practitioner who wants to report on trends in historical IT risk levels?
Which of the following has the GREATEST influence on an organization ' s risk appetite?
During a risk assessment, what should an assessor do after identifying threats to organizational assets?
Which of the following is BEST used to aggregate data from multiple systems to identify abnormal behavior?
An IT risk practitioner ' s report includes a treatment plan and projected risk ratings if recommendations are implemented. Once corrective actions are taken by the system owner, which of the following types of risk will the projected risk become?
An organization must make a choice among multiple options to respond to a risk. The stakeholders cannot agree and decide to postpone the decision. Which of the following risk responses has the organization adopted?
Which of the following is the MOST important requirement when implementing a data loss prevention (DLP) system?
A key risk indicator (KRI) indicates a reduction in the percentage of appropriately patched servers. Which of the following is the risk practitioner ' s BEST course of action?
Which of the following observations would be the GREATEST concern to a risk practitioner evaluating an organization ' s risk management practices?
Which of the following BEST represents a critical threshold value for a key control indicator (KCI)?