Which of the following should be the PRIMARY area of focus when reporting changes to an organization ' s risk profile to executive management?
Several network user accounts were recently created without the required management approvals. Which of the following would be the risk practitioner ' s BEST recommendation to address this situation?
Business areas within an organization have engaged various cloud service providers directly without assistance from the IT department. What should the risk practitioner do?
Which of the following criteria for assigning owners to IT risk scenarios provides the GREATEST benefit to an organization?
Which of the following is the BEST approach to use when creating a comprehensive set of IT risk scenarios?
Which of the following is MOST important to the effective monitoring of key risk indicators (KRIS)?
Which of the following issues should be of GREATEST concern when evaluating existing controls during a risk assessment?
Which of the following BEST enables a risk practitioner to focus on risk factors that could potentially affect the results of an IT initiative?
Which of the following should be the risk practitioner s PRIMARY focus when determining whether controls are adequate to mitigate risk?
Which of the following BEST prevents control gaps in the Zero Trust model when implementing in the environment?
After mapping generic risk scenarios to organizational security policies, the NEXT course of action should be to:
An organization operates in a jurisdiction where heavy fines are imposed for leakage of customer data. Which of the following provides the BEST input to assess the inherent risk impact?
A risk heat map is MOST commonly used as part of an IT risk analysis to facilitate risk:
Which of the following should be of GREATEST concern to a risk practitioner when determining the effectiveness of IT controls?
Which of the following is the MOST significant benefit of using quantitative risk analysis instead of qualitative risk analysis?
Which of the following would be of GREATEST concern regarding an organization ' s asset management?
The risk associated with an asset before controls are applied can be expressed as:
Which of the following criteria associated with key risk indicators (KRIs) BEST enables effective risk monitoring?
An organization has completed a risk assessment of one of its service providers. Who should be accountable for ensuring that risk responses are implemented?
Which of the following is MOST helpful in identifying gaps between the current and desired state of the IT risk environment?
A global organization is considering the acquisition of a competitor. Senior management has requested a review of the overall risk profile from the targeted organization. Which of the following components of this review would provide the MOST useful information?
Which of the following BEST indicates that a control has been implemented successfully?
Which of the following should a risk practitioner review FIRST when evaluating risk events associated with the organization ' s data flow model?
What should be the PRIMARY objective for a risk practitioner performing a post-implementation review of an IT risk mitigation project?
Which of the following BEST balances the costs and benefits of managing IT risk*?
An organization has outsourced its lease payment process to a service provider who lacks evidence of compliance with a necessary regulatory standard. Which risk treatment was adopted by the organization?
When reviewing management ' s IT control self-assessments, a risk practitioner noted an ineffective control that links to several low residual risk scenarios. What should be the NEXT course of action?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a vulnerability management process?
Using key risk indicators (KRIs) to illustrate changes in the risk profile PRIMARILY helps to:
Of the following, who is accountable for ensuing the effectiveness of a control to mitigate risk?
Which of the following is the GREATEST concern when using artificial intelligence (AI) language models?
Which of the following can be interpreted from a single data point on a risk heat map?
Which of the following is the BEST indicator of the effectiveness of a control monitoring program?
An organization is implementing data warehousing infrastructure. Senior management is concerned about safeguarding client data security in this new environment. Which of the following should the risk practitioner recommend be done NEXT?
When developing a new risk register, a risk practitioner should focus on which of the following risk management activities?
Following a business continuity planning exercise, an organization decides to accept an identified risk associated with a critical business system. Which of the following should be done next?
The design of procedures to prevent fraudulent transactions within an enterprise resource planning (ERP) system should be based on:
When assigning control ownership, it is MOST important to verify that the owner has accountability for:
Which of the following presents the GREATEST security risk to an organization with a large number of Internet of Things (IoT) devices within its network?
Which of the following issues found during the review of a newly created disaster recovery plan (DRP) should be of MOST concern?
The head of a business operations department asks to review the entire IT risk register. Which of the following would be the risk manager s BEST approach to this request before sharing the register?
Which of the following is MOST important for an organization to continuously manage after implementing a Zero Trust security model?
Which of the following management actions will MOST likely change the likelihood rating of a risk scenario related to remote network access?
Which of the following is the PRIMARY risk management responsibility of the second line in the three lines model?
Which of the following provides the MOST important information to facilitate a risk response decision?