Which of the following will BEST help an organization select a recovery strategy for critical systems?
A web-based service provider with a low risk appetite for system outages is reviewing its current risk profile for online security. Which of the following observations would be MOST relevant to escalate to senior management?
Which of the following is the MOST important key performance indicator (KPI) to monitor the effectiveness of disaster recovery processes?
A change management process has recently been updated with new testing procedures. What is the NEXT course of action?
What information is MOST helpful to asset owners when classifying organizational assets for risk assessment?
Which of the following should be the PRIMARY driver for the prioritization of risk responses?
The PRIMARY reason for periodically monitoring key risk indicators (KRIs) is to:
Which of the following is the MOST important component in a risk treatment plan?
Which of the following provides the BEST assurance of the effectiveness of vendor security controls?
An information security audit identified a risk resulting from the failure of an automated control Who is responsible for ensuring the risk register is updated accordingly?
A risk practitioner has been notified of a social engineering attack using artificial intelligence (AI) technology to impersonate senior management personnel. Which of the following would BEST mitigate the impact of such attacks?
Which of the following is MOST helpful to facilitate the decision of recovery priorities in a disaster situation?
Which of the following actions should a risk practitioner do NEXT when an increased industry trend of external cyber attacks is identified?
While evaluating control costs, management discovers that the annual cost exceeds the annual loss expectancy (ALE) of the risk. This indicates the:
Which of the following is the BEST indication of the effectiveness of a business continuity program?
Who is BEST suited to provide objective input when updating residual risk to reflect the results of control effectiveness?
Which of the following is the GREATEST benefit of incorporating IT risk scenarios into the corporate risk register?
Which of the following is the PRIMARY reason that risk management is important in project management?
Of the following, who is BEST suited to assist a risk practitioner in developing a relevant set of risk scenarios?
Which of the following would prompt changes in key risk indicator {KRI) thresholds?
Which of the following activities should only be performed by the third line of defense?
A risk practitioner has been made aware of a problem in an IT system that was missed during a routine risk assessment. Which of the following is the practitioner's BEST course of action?
An employee lost a personal mobile device that may contain sensitive corporate information. What should be the risk practitioner's recommendation?
Which of the following is the BEST indicator of executive management's support for IT risk mitigation efforts?
A risk assessment has identified that departments have installed their own WiFi access points on the enterprise network. Which of the following would be MOST important to include in a report to senior management?
A risk practitioner has identified that the organization's secondary data center does not provide redundancy for a critical application. Who should have the authority to accept the associated risk?
Which of the following is the BEST way to determine the ongoing efficiency of control processes?
To define the risk management strategy which of the following MUST be set by the board of directors?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of an anti-virus program?
Which of the following should be the PRIMARY objective of a risk awareness training program?
An organization has recently hired a large number of part-time employees. During the annual audit, it was discovered that many user IDs and passwords were documented in procedure manuals for use by the part-time employees. Which of the following BEST describes this situation?
The number of tickets to rework application code has significantly exceeded the established threshold. Which of the following would be the risk practitioner s BEST recommendation?
A business delegates its application data management to the internal IT team. Which of the following is the role of the internal IT team in this situation?
Which of the following should be the PRIMARY focus of an independent review of a risk management process?
Which of the following issues should be of GREATEST concern when evaluating existing controls during a risk assessment?
A risk practitioner has been asked to evaluate the adoption of a third-party blockchain integration platform based on the value added by the platform and the organization's risk appetite. Which of the following is the risk practitioner's BEST course of action?
An organization recently implemented an extensive risk awareness program after a cybersecurity incident. Which of the following is MOST likely to be affected by the implementation of the program?
An organization has opened a subsidiary in a foreign country. Which of the following would be the BEST way to measure the effectiveness of the subsidiary's IT systems controls?
Which of the following emerging technologies is frequently used for botnet distributed denial of service (DDoS) attacks?
An organization is increasingly concerned about loss of sensitive data and asks the risk practitioner to assess the current risk level. Which of the following should the risk practitioner do FIRST?
A public online information security training course is available to an organization's staff. The online course contains free-form discussion fields. Which of the following should be of MOST concern to the organization's risk practitioner?
Which of the following is the MOST important enabler of effective risk management?
Which of the following is a responsibility of the second line of defense in the three lines of defense model?
Which of the following is the MOST important document regarding the treatment of sensitive data?
Performing a background check on a new employee candidate before hiring is an example of what type of control?