Which of the following is the MOST important benefit of reporting risk assessment results to senior management?
When communicating changes in the IT risk profile, which of the following should be included to BEST enable stakeholder decision making?
A large organization is replacing its enterprise resource planning (ERP) system and has decided not to deploy the payroll module of the new system. Instead, the current payroll system will continue to be
used. Of the following, who should own the risk if the ERP and payroll system fail to operate as expected?
Which type of indicators should be developed to measure the effectiveness of an organization's firewall rule set?
Which of the following is a risk practitioner's BEST course of action when a control is not meeting agreed-upon performance criteria?
An engineer has been assigned to conduct data restoration after a server storage failure. However, the procedure was not successful. Which of the following is the MOST probable cause of this situation?
A risk practitioner is performing a risk assessment of recent external advancements in quantum computing. Which of the following would pose the GREATEST concern for the risk practitioner?
An organization outsources the processing of us payroll data A risk practitioner identifies a control weakness at the third party trial exposes the payroll data. Who should own this risk?
Which of the following is MOST helpful in identifying new risk exposures due to changes in the business environment?
Which of the following poses the GREATEST risk to an organization's operations during a major it transformation?
Which of the following is the BEST control for a large organization to implement to effectively mitigate risk related to fraudulent transactions?
Which of the following is the MOST important input when developing risk scenarios?
Which of the following should a risk practitioner do FIRST when an organization decides to use a cloud service?
A recent audit identified high-risk issues in a business unit though a previous control self-assessment (CSA) had good results. Which of the following is the MOST likely reason for the difference?
An IT risk practitioner has determined that mitigation activities differ from an approved risk action plan. Which of the following is the risk practitioner's BEST course of action?
As pan of business continuity planning, which of the following is MOST important to include m a business impact analysis (BlA)?
The following is the snapshot of a recently approved IT risk register maintained by an organization's information security department.
After implementing countermeasures listed in ‘’Risk Response Descriptions’’ for each of the Risk IDs, which of the following component of the register MUST change?
Which of the following methods would BEST contribute to identifying obscure risk scenarios?
Which of the following is the GREATEST risk associated with the transition of a sensitive data backup solution from on-premise to a cloud service provider?
Which of the following is the BEST metric to demonstrate the effectiveness of an organization's patch management process?
Reviewing which of the following would provide the MOST useful information when preparing to evaluate the effectiveness of existing controls?
A risk manager has determined there is excessive risk with a particular technology. Who is the BEST person to own the unmitigated risk of the technology?
An organization has outsourced its billing function to an external service provider. Who should own the risk of customer data leakage caused by the service provider?
In addition to the risk register, what should a risk practitioner review to develop an understanding of the organization's risk profile?
A bank recently incorporated blockchain technology with the potential to impact known risk within the organization. Which of the following is the risk practitioner's BEST course of action?
Which of the following changes would be reflected in an organization's risk profile after the failure of a critical patch implementation?
Which of the following would BEST facilitate the implementation of data classification requirements?
Winch of the following is the BEST evidence of an effective risk treatment plan?
Which types of controls are BEST used to minimize the risk associated with a vulnerability?
Which of the following is the BEST method for assessing control effectiveness against technical vulnerabilities that could be exploited to compromise an information system?
Participants in a risk workshop have become focused on the financial cost to mitigate risk rather than choosing the most appropriate response. Which of the following is the BEST way to address this type of issue in the long term?
An IT risk practitioner has been asked to regularly report on the overall status and effectiveness of the IT risk management program. Which of the following is MOST useful for this purpose?
A recent internal risk review reveals the majority of core IT application recovery time objectives (RTOs) have exceeded the maximum time defined by the business application owners. Which of the following is MOST likely to change as a result?
Within the three lines of defense model, the PRIMARY responsibility for ensuring risk mitigation controls are properly configured belongs with:
After mapping generic risk scenarios to organizational security policies, the NEXT course of action should be to:
Which of the following is MOST helpful to review when identifying risk scenarios associated with the adoption of Internet of Things (loT) technology in an organization?
Which of the following BEST indicates that additional or improved controls ate needed m the environment?
Which of the following is MOST likely to introduce risk for financial institutions that use blockchain?
Which organizational role should be accountable for ensuring information assets are appropriately classified?
The risk associated with a high-risk vulnerability in an application is owned by the:
Which of the following is a risk practitioner's BEST course of action if a risk assessment identifies a risk that is extremely unlikely but would have a severe impact should it occur?
A bank recently incorporated Blockchain technology with the potential to impact known risk within the organization. Which of the following is the risk practitioner’s BEST course of action?
When performing a risk assessment of a new service to support a ewe Business process. which of the following should be done FRST10 ensure continuity of operations?