Which of the following is the FIRST step when conducting a business impact analysis (BIA)?
Which of the following would BEST support the integrity of online financial transactions?
Which of the following should be the FIRST consideration when establishing a new risk governance program?
Which of the following is the BEST way to determine whether new controls mitigate security gaps in a business system?
An organization has outsourced its IT security operations to a third party. Who is ULTIMATELY accountable for the risk associated with the outsourced operations?
Which of the following activities BEST facilitates effective risk management throughout the organization?
Which strategy employed by risk management would BEST help to prevent internal fraud?
Which of the following is MOST important when considering risk in an enterprise risk management (ERM) process?
An information security audit identified a risk resulting from the failure of an automated control Who is responsible for ensuring the risk register is updated accordingly?
Which of the following is the MOST important factor affecting risk management in an organization?
Which of the following presents the GREATEST concern associated with the
use of artificial intelligence (Al) systems?
Which of the following would present the MOST significant risk to an organization when updating the incident response plan?
A recent vulnerability assessment of a web-facing application revealed several weaknesses. Which of the following should be done NEXT to determine the risk exposure?
When a risk practitioner is determining a system's criticality. it is MOST helpful to review the associated:
Which of the following should be the FIRST consideration when a business unit wants to use personal information for a purpose other than for which it was originally collected?
An organization has opened a subsidiary in a foreign country. Which of the following would be the BEST way to measure the effectiveness of the subsidiary's IT systems controls?
The software version of an enterprise's critical business application has reached end-of-life and is no longer supported by the vendor. IT has decided to develop an in-house replacement application. Which of the following should be the PRIMARY concern?
It is MOST important to the effectiveness of an IT risk management function that the associated processes are:
Which of the following is the BEST indication of an improved risk-aware culture following the implementation of a security awareness training program for all employees?
Which of the following will be MOST effective in helping to ensure control failures are appropriately managed?
An organization outsources the processing of us payroll data A risk practitioner identifies a control weakness at the third party trial exposes the payroll data. Who should own this risk?
Which of the following BEST indicates whether security awareness training is effective?
The MOST important measure of the effectiveness of risk management in project implementation is the percentage of projects:
The effectiveness of a control has decreased. What is the MOST likely effect on the associated risk?
A risk practitioner has just learned about new malware that has severely impacted industry peers worldwide data loss?
Which of the following scenarios is MOST important to communicate to senior management?
Which of the following is MOST important to the effectiveness of a senior oversight committee for risk monitoring?
An organization automatically approves exceptions to security policies on a recurring basis. This practice is MOST likely the result of:
Which of the following management action will MOST likely change the likelihood rating of a risk scenario related to remote network access?
An organization recently implemented a cybersecurity awareness program that includes phishing simul-ation exercises for all employees. What type of control is being utilized?
Which of the following is a risk practitioner's BEST course of action if a risk assessment identifies a risk that is extremely unlikely but would have a severe impact should it occur?
When developing risk treatment alternatives for a Business case, it is MOST helpful to show risk reduction based on:
Which of the following is a benefit of implementing user and entity behavior analytics to help mitigate information security threats?
Which of the following would be MOST helpful when selecting appropriate protection for data?
Which of the following issues found during the review of a newly created disaster recovery plan (DRP) should be of MOST concern?
A vendor's planned maintenance schedule will cause a critical application to temporarily lose failover capabilities. Of the following, who should approve this proposed schedule?
A business unit is implementing a data analytics platform to enhance its customer relationship management (CRM) system primarily to process data that has been provided by its customers. Which of the following presents the GREATEST risk to the organization's reputation?
In order to efficiently execute a risk response action plan, it is MOST important for the emergency response team members to understand:
When developing a risk awareness training program, which of the following training topics would BEST facilitate a thorough understanding of risk scenarios?
Which of the following BEST facilities the alignment of IT risk management with enterprise risk management (ERM)?
Which of the following is MOST important for a risk practitioner to consider when determining the control requirements for data privacy arising from emerging technologies?
A risk practitioner is performing a risk assessment of recent external advancements in quantum computing. Which of the following would pose the GREATEST concern for the risk practitioner?
Which of the blowing is MOST important when implementing an organization s security policy?
The BEST way for management to validate whether risk response activities have been completed is to review:
Which of the following should be an element of the risk appetite of an organization?
Which of the following would BEST mitigate the ongoing risk associated with operating system (OS) vulnerabilities?