Which of the following should an organization perform to forecast the effects of a disaster?
Which of the following is the PRIMARY role of the second line when an IT risk management framework is adopted?
Which of the following should be the PRIMARY basis for establishing a priority sequence when restoring business processes after a disruption?
During a risk assessment, a key external technology supplier refuses to provide control design and effectiveness information, citing confidentiality concerns. What should the risk practitioner do NEXT?
The PRIMARY reason for a risk practitioner to review business processes is to:
The MOST important consideration when selecting a control to mitigate an identified risk is whether:
After several security incidents resulting in significant financial losses, IT management has decided to outsource the security function to a third party that provides 24/7 security operation services. Which risk response option has management implemented?
Which of the following is the PRIMARY benefit of integrating risk and security requirements in an organization's enterprise architecture (EA)?
Which of the following would BEST help identify the owner for each risk scenario in a risk register?
Which of the following is MOST important to review when evaluating the ongoing effectiveness of the IT risk register?
Within the three lines of defense model, the accountability for the system of internal control resides with:
An organization is considering outsourcing user administration controls tor a critical system. The potential vendor has offered to perform quarterly sett-audits of its controls instead of having annual independent audits. Which of the following should be of GREATEST concern to me risk practitioner?
Which of the following provides the BEST evidence that risk responses are effective?
After undertaking a risk assessment of a production system, the MOST appropriate action is fcr the risk manager to
Which of the following practices MOST effectively safeguards the processing of personal data?
Which of the following observations from a third-party service provider review would be of GREATEST concern to a risk practitioner?
After an annual risk assessment is completed, which of the following would be MOST important to communicate to stakeholders?
Which of the following controls BEST addresses the risk of unauthorized disclosure of sensitive data as a result of a lost bring your own device (BYOD) tablet?
Who is responsible for IT security controls that are outsourced to an external service provider?
Which of the following methods would BEST contribute to identifying obscure risk scenarios?
Which of the following would MOST likely drive the need to review and update key performance indicators (KPIs) for critical IT assets?
A penetration testing team discovered an ineffectively designed access control. Who is responsible for ensuring the control design gap is remediated?
Which of the following is the BEST key performance indicator (KPI) to measure the maturity of an organization's security incident handling process?
Which of the following IT key risk indicators (KRIs) provides management with the BEST feedback on IT capacity?
During which phase of the system development life cycle (SDLC) should information security requirements for the implementation of a new IT system be defined?
Which of the following is MOST important to have in place to ensure the effectiveness of risk and security metrics reporting?
An engineer has been assigned to conduct data restoration after a server storage failure. However, the procedure was not successful. Which of the following is the MOST probable cause of this situation?
When reviewing a risk response strategy, senior management's PRIMARY focus should be placed on the:
A data processing center operates in a jurisdiction where new regulations have significantly increased penalties for data breaches. Which of the following elements of the risk register is MOST important to update to reflect this change?
An IT department has organized training sessions to improve user awareness of organizational information security policies. Which of the following is the BEST key performance indicator (KPI) to reflect effectiveness of the training?
The PRIMARY reason to have risk owners assigned to entries in the risk register is to ensure:
An IT risk practitioner has been asked to regularly report on the overall status and effectiveness of the IT risk management program. Which of the following is MOST useful for this purpose?
An organization has established a single enterprise-wide risk register that records high-level risk scenarios. The IT risk department has created its own register to record more granular scenarios applicable to IT. Which of the following is the BEST way to ensure alignment between these two registers?
A newly enacted information privacy law significantly increases financial penalties for breaches of personally identifiable information (Pll). Which of the following will MOST likely outcome for an organization affected by the new law?
Who is MOST likely to be responsible for the coordination between the IT risk strategy and the business risk strategy?
Which of the following provides the MOST mitigation value for an organization implementing new Internet of Things (loT) devices?
Which of the following activities should be performed FIRST when establishing IT risk management processes?
Implementing which of the following controls would BEST reduce the impact of a vulnerability that has been exploited?
Which of the following should be the MAIN consideration when validating an organization's risk appetite?
Which of the following proposed benefits is MOST likely to influence senior management approval to reallocate budget for a new security initiative?
Which of the following should be a risk practitioner's NEXT action after identifying a high probability of data loss in a system?
Which of the following is the GREATEST benefit of a three lines of defense structure?
Which of the following is the PRIMARY reason for a risk practitioner to examine a post-implementation review report for a control automation tool?
Which of the following is the PRIMARY reason for sharing risk assessment reports with senior stakeholders?
Which of the following is the GREATEST risk associated with the use of data analytics?
An organization has allowed its cyber risk insurance to lapse while seeking a new insurance provider. The risk practitioner should report to management that the risk has been:
Which of the following is the BEST key performance indicator (KPI) for determining how well an IT policy is aligned to business requirements?