An organization has built up its cash reserves and has now become financially able to support additional risk while meeting its objectives. What is this change MOST likely to impact?
Who should be accountable for ensuring effective cybersecurity controls are established?
Which of the following is the MOST important reason for a risk practitioner to identify stakeholders for each IT risk scenario?
When asking risk owners to participate in a risk assessment based on generic scenarios, it would be MOST helpful to:
Which of the following BEST enables the selection of appropriate risk treatment in the event of a disaster?
Which of the following is MOST useful when performing a quantitative risk assessment?
Which of the following BEST indicates that an organization's disaster recovery plan (DRP) will mitigate the risk of the organization failing to recover from a major service disruption?
Which of the following should an organization perform to forecast the effects of a disaster?
Which of the following BEST enables the timely detection of changes in the security control environment?
An organization is analyzing the risk of shadow IT usage. Which of the following is the MOST important input into the assessment?
Automated code reviews to reduce the risk associated with web applications are MOST effective when performed:
Which of the following would be the BEST justification to invest in the development of a governance, risk, and compliance (GRC) solution?
What should a risk practitioner do FIRST upon learning a risk treatment owner has implemented a different control than what was specified in the IT risk action plan?
Which of the following is MOST influential when management makes risk response decisions?
An organization has restructured its business processes, and the business continuity plan (BCP) needs to be revised accordingly. Which of the following should be identified FIRST?
The MOST effective way to increase the likelihood that risk responses will be implemented is to:
Which of the following is a risk practitioner's BEST recommendation to address an organization's need to secure multiple systems with limited IT resources?
Which of the following BEST indicates the condition of a risk management program?
Which of the following is MOST helpful in providing an overview of an organization's risk management program?
Which of the following is the BEST metric to measure employee adherence to organizational security policies?
An organization's risk management team wants to develop IT risk scenarios to show the impact of collecting and storing credit card information. Which of the following is the MOST comprehensive approach to capture this scenario?
An organization has determined that risk is not being adequately tracked and
managed due to a distributed operating model. Which of the following is the
BEST way to address this issue?
Which of the following is the BEST indication of an effective risk management program?
Which of the following is the MOST important update for keeping the risk register current?
An organization is subject to a new regulation that requires nearly real-time recovery of its services following a disruption. Which of the following is the BEST way to manage the risk in this situation?
If concurrent update transactions to an account are not processed properly, which of the following will MOST likely be affected?
A recent big data project has resulted in the creation of an application used to support important investment decisions. Which of the following should be of GREATEST concern to the risk practitioner?
Which of the following provides the MOST useful input to the development of realistic risk scenarios?
Which of the following is the BEST way to determine the ongoing efficiency of control processes?
Which of the following will BEST communicate the importance of risk mitigation initiatives to senior management?
Which of the following is the PRIMARY reason to aggregate risk assessment results from different business units?
Which of the following is the MOST appropriate action when a tolerance threshold is exceeded?
Which of the following is the BEST way to address IT regulatory compliance risk?
A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?
What should a risk practitioner do FIRST when vulnerability assessment results identify a weakness in an application?
Which of the following risk impacts should be the PRIMARY consideration for determining recovery priorities in a disaster recovery situation?
Which of the following is the MOST effective way to validate organizational awareness of cybersecurity risk?
Which of the following should be done FIRST when information is no longer required to support business objectives?
A financial organization is considering a project to implement the use of blockchain technology. To help ensure the organization's management team can make informed decisions on the project, which of the following should the risk practitioner reassess?
When creating a separate IT risk register for a large organization, which of the following is MOST important to consider with regard to the existing corporate risk 'register?
Which of the following is the MOST useful information for prioritizing risk mitigation?
A public online information security training course is available to an organization's staff. The online course contains free-form discussion fields. Which of the following should be of MOST concern to the organization's risk practitioner?
Which of the following is the BEST way to determine the potential organizational impact of emerging privacy regulations?
Before selecting a final risk response option for a given risk scenario, management should FIRST:
Which of the following is the MOST useful information for a risk practitioner when planning response activities after risk identification?
Which of the following actions should a risk practitioner do NEXT when an increased industry trend of external cyber attacks is identified?