Which of the following should be the PRIMARY recipient of reports showing the
progress of a current IT risk mitigation project?
A risk practitioner has been asked by executives to explain how existing risk treatment plans would affect risk posture at the end of the year. Which of the following is MOST helpful in responding to this request?
Which group has PRIMARY ownership of reputational risk stemming from unethical behavior within the organization?
Which of the following is MOST helpful in defining an early-warning threshold associated with insufficient network bandwidth’’?
Which of the following BEST facilitates the development of effective IT risk scenarios?
An organization has four different projects competing for funding to reduce overall IT risk. Which project should management defer?

When formulating a social media policy lo address information leakage, which of the following is the MOST important concern to address?
Which of the following provides the BEST measurement of an organization's risk management maturity level?
After undertaking a risk assessment of a production system, the MOST appropriate action is fcr the risk manager to
Which of the following BEST protects an organization against breaches when using a software as a service (SaaS) application?
A risk practitioner is involved in a comprehensive overhaul of the organizational risk management program. Which of the following should be reviewed FIRST to help identify relevant IT risk scenarios?
When is the BEST to identify risk associated with major project to determine a mitigation plan?
Which of the following is the GREATEST concern associated with the use of artificial intelligence (AI) language models?
Which organization is implementing a project to automate the purchasing process, including the modification of approval controls. Which of the following tasks is lie responsibility of the risk practitioner*?
Which of the following is MOST important to include in a Software as a Service (SaaS) vendor agreement?
An organization wants to develop a strategy to mitigate the risk associated with unethical actions by stakeholders. Which of the following should be done FIRST?
A new risk practitioner finds that decisions for implementing risk response plans are not being made. Which of the following would MOST likely explain this situation?
An IT risk practitioner has been asked to regularly report on the overall status and effectiveness of the IT risk management program. Which of the following is MOST useful for this purpose?
Which of the following is the BEST approach to mitigate the risk associated with a control deficiency?
A vendor’s planned maintenance schedule will cause a critical application to temporarily lose failover capabilities. Of the following, who should approve this proposed schedule?
A risk practitioner has established that a particular control is working as desired, but the annual cost of maintenance has increased and now exceeds the expected annual loss exposure. The result is that the control is:
Which of the following situations would BEST justify escalation to senior management?
A multinational organization is considering implementing standard background checks to' all new employees A KEY concern regarding this approach
Which of the following should be included in a risk scenario to be used for risk analysis?
An identified high probability risk scenario involving a critical, proprietary business function has an annualized cost of control higher than the annual loss expectancy. Which of the following is the BEST risk response?
A recent risk workshop has identified risk owners and responses for newly identified risk scenarios. Which of the following should be the risk practitioner's NEXT step?
After conducting a risk assessment for regulatory compliance, an organization has identified only one possible mitigating control. The cost of the control has been determined to be higher than the penalty of noncompliance. Which of the following would be the risk practitioner's BEST recommendation?
Which of the following has the GREATEST impact on ensuring the alignment of the risk profile with business objectives?
Which of the following is the MOST effective way for a large and diversified organization to minimize risk associated with unauthorized software on company devices?
Which of the following is the MOST effective key performance indicator (KPI) for change management?
Deviation from a mitigation action plan's completion date should be determined by which of the following?
The following is the snapshot of a recently approved IT risk register maintained by an organization's information security department.

After implementing countermeasures listed in ‘’Risk Response Descriptions’’ for each of the Risk IDs, which of the following component of the register MUST change?
A risk practitioner has observed that there is an increasing trend of users sending sensitive information by email without using encryption. Which of the following would be the MOST effective approach to mitigate the risk associated with data loss?
A company has located its computer center on a moderate earthquake fault. Which of the following is the MOST important consideration when establishing a contingency plan and an alternate processing site?
Which of the following is the MOST essential characteristic of a good IT risk scenario?
The PRIMARY reason for periodic penetration testing of Internet-facing applications is to:
When developing a new risk register, a risk practitioner should focus on which of the following risk management activities?
Which of the following statements in an organization's current risk profile report is cause for further action by senior management?
What should be the PRIMARY objective of updating a risk awareness program in response to a steady rise in cybersecurity threats across the industry?
Which of the following would MOST likely cause a risk practitioner to change the likelihood rating in the risk register?
An external data source has released an advisory about a critical vulnerability affecting a widely used software application. Which of the following should the risk practitioner do FIRST?
Which of the following should be the FIRST step when a company is made aware of new regulatory requirements impacting IT?
Which of the following controls BEST addresses the risk of unauthorized disclosure of sensitive data as a result of a lost bring your own device (BYOD) tablet?
Which of the following is the BEST way to ensure data is properly sanitized while in cloud storage?
Which of the following would be a risk practitioner's BEST course of action when a project team has accepted a risk outside the established risk appetite?
Which of the following is the MOST important reason for an organization to regularly assess the design of key risk indicators (KRIs)?