A risk practitioner is summarizing the results of a high-profile risk assessment sponsored by senior management. The BEST way to support risk-based decisions by senior management would be to:
Quantifying the value of a single asset helps the organization to understand the:
Which of the following is the MOST important key performance indicator (KPI) to establish in the service level agreement (SLA) for an outsourced data center?
Which of the following is the MOST important consideration when communicating the risk associated with technology end-of-life to business owners?
After entering a large number of low-risk scenarios into the risk register, it is MOST important for the risk practitioner to:
A penetration test reveals several vulnerabilities in a web-facing application. Which of the following should be the FIRST step in selecting a risk response?
Which of the following is MOST helpful in providing a high-level overview of current IT risk severity*?
Which of the following is the BEST way to support communication of emerging risk?
Which of the following would MOST effectively enable a business operations manager to identify events exceeding risk thresholds?
A department allows multiple users to perform maintenance on a system using a single set of credentials. A risk practitioner determined this practice to be high-risk. Which of the following is the MOST effective way to mitigate this risk?
Who should be responsible for determining which stakeholders need to be involved in the development of a risk scenario?
An organization's risk tolerance should be defined and approved by which of the following?
Which of the following BEST enables the timely detection of changes in the security control environment?
Which of the following BEST enables the development of a successful IT strategy focused on business risk mitigation?
Which of the following BEST helps to balance the costs and benefits of managing IT risk?
A review of an organization s controls has determined its data loss prevention {DLP) system is currently failing to detect outgoing emails containing credit card data. Which of the following would be MOST impacted?
Which of the following is MOST important to include in a Software as a Service (SaaS) vendor agreement?
A risk practitioner shares the results of a vulnerability assessment for a critical business application with the business manager. Which of the following is the NEXT step?
Which of the following is the PRIMARY benefit of stakeholder involvement in risk scenario development?
An organization has opened a subsidiary in a foreign country. Which of the following would be the BEST way to measure the effectiveness of the subsidiary's IT systems controls?
Which of the following is the BEST way to protect sensitive data from administrators within a public cloud?
Which type of cloud computing deployment provides the consumer the GREATEST degree of control over the environment?
Which of the following would be the BEST key performance indicator (KPI) for monitoring the effectiveness of the IT asset management process?
Which of the following is the MOST effective way to help ensure an organization's current risk scenarios are relevant?
Which of the following roles would be MOST helpful in providing a high-level view of risk related to customer data loss?
Which of the following is MOST likely to introduce risk for financial institutions that use blockchain?
Which of the following would BEST help secure online financial transactions from improper users?
Management has required information security awareness training to reduce the risk associated with credential compromise. What is the BEST way to assess the effectiveness of the training?
To communicate the risk associated with IT in business terms, which of the following MUST be defined?
An organization striving to be on the leading edge in regard to risk monitoring would MOST likely implement:
Which of the following approaches to bring your own device (BYOD) service delivery provides the BEST protection from data loss?
Who should be responsible for implementing and maintaining security controls?
The BEST reason to classify IT assets during a risk assessment is to determine the:
After identifying new risk events during a project, the project manager s NEXT step should be to:
An organization recently configured a new business division Which of the following is MOST likely to be affected?
Which of the following is the MOST important consideration when developing an organization's risk taxonomy?
What is the BEST information to present to business control owners when justifying costs related to controls?
Which of the following is MOST likely to cause a key risk indicator (KRI) to exceed thresholds?
An organization requires a third party for processing customer personal data. Which of the following is the BEST approach when sharing data over a public network?
A highly regulated enterprise is developing a new risk management plan to specifically address legal and regulatory risk scenarios What should be done FIRST by IT governance to support this effort?
An organization is analyzing the risk of shadow IT usage. Which of the following is the MOST important input into the assessment?
Which of the following is MOST important to identify when developing top-down risk scenarios?
An organizations chief technology officer (CTO) has decided to accept the risk associated with the potential loss from a denial-of-service (DoS) attack. In this situation, the risk practitioner's BEST course of action is to:
Which of the following is the GREATEST benefit of incorporating IT risk scenarios into the corporate risk register?