An organization that has been the subject of multiple social engineering attacks is developing a risk awareness program. The PRIMARY goal of this program should be to:
An information system for a key business operation is being moved from an in-house application to a Software as a Service (SaaS) vendor. Which of the following will have the GREATEST impact on the ability to monitor risk?
What is the PRIMARY role of the application owner when changes are being introduced into an existing environment?
Which of the following is MOST important to update following a change in organizational risk appetite and tolerance?
The BEST key performance indicator (KPI) to measure the effectiveness of a backup process would be the number of:
A risk practitioner learns of an urgent threat intelligence alert to patch a critical vulnerability identified in the organization ' s operating system. Which of the following should the risk practitioner do FIRST?
A chief information officer (CIO) has identified risk associated with shadow systems being maintained by business units to address specific functionality gaps in the organization ' senterprise resource planning (ERP) system. What is the BEST way to reduce this risk going forward?
Which of the following is the MOST effective way to determine if a risk factor exceeds risk tolerance?
Which of the following is MOST important to update when an organization ' s risk appetite changes?
Which of the following is a risk practitioner ' s BEST recommendation regarding disaster recovery management (DRM) for Software as a Service (SaaS) providers?
Which of the following controls are BEST strengthened by a clear organizational code of ethics?
An organization ' s HR department has implemented a policy requiring staff members to take a minimum of five consecutive days leave per year to mitigate the risk of malicious insideractivities. Which of the following is the BEST key performance indicator (KPI) of the effectiveness of this policy?
An organization operates in an environment where reduced time-to-market for new software products is a top business priority. Which of the following should be the risk practitioner ' s GREATEST concern?
Which of the following techniques is MOST helpful when quantifying the potential loss impact of cyber risk?
An organization ' s internal audit department is considering the implementation of robotics process automation (RPA) to automate certain continuous auditing tasks. Who would own the risk associated with ineffective design of the software bots?
An incentive program is MOST likely implemented to manage the risk associated with loss of which organizational asset?
Which of the following has the GREATEST impact on ensuring the alignment of the risk profile with business objectives?
A risk practitioner recently discovered that personal information from the production environment is required for testing purposes in non-production environments. Which of the following is the BEST recommendation to address this situation?
An organization recently received an independent security audit report of its cloud service provider that indicates significant control weaknesses. What should be done NEXT in response to this report?
Which of the following risk management practices BEST facilitates the incorporation of IT risk scenarios into the enterprise-wide risk register?
Which of the following is the BEST approach for an organization in a heavily regulated industry to comprehensively test application functionality?
Which of the following should be done FIRST when information is no longer required to support business objectives?
Which of the following findings of a security awareness program assessment would cause the GREATEST concern to a risk practitioner?
Which of the following is the MOST effective way to incorporate stakeholder concerns when developing risk scenarios?
Which of the following would be MOST useful when measuring the progress of a risk response action plan?
Which of the following is MOST important to consider before determining a response to a vulnerability?
Which of We following is the MOST effective control to address the risk associated with compromising data privacy within the cloud?
Which of the following is the PRIMARY consideration when establishing an organization ' s risk management methodology?
An organization is concerned that its employees may be unintentionally disclosing data through the use of social media sites. Which of the following will MOST effectively mitigate tins risk?
What are the MOST important criteria to consider when developing a data classification scheme to facilitate risk assessment and the prioritization of risk mitigation activities?
Which of the following is a risk practitioner ' s BEST recommendation to help reduce IT risk associated with scheduling overruns when starting a new application development project?
Which of the following BEST indicates the risk appetite and tolerance level (or the risk associated with business interruption caused by IT system failures?
An organization has four different projects competing for funding to reduce overall IT risk. Which project should management defer?
A key performance indicator (KPI) has been established to monitor the number of software changes that fail and must be re-implemented. An increase in the KPI indicates an ineffective:
Which of the following will BEST help to improve an organization ' s risk culture?
A large organization recently restructured the IT department and has decided to outsource certain functions. What action should the control owners in the IT department take?
Which type of indicators should be developed to measure the effectiveness of an organization ' s firewall rule set?
Which of the following is the BEST course of action when risk is found to be above the acceptable risk appetite?
Which of the following would BEST enable a risk practitioner to embed risk management within the organization?
The PRIMARY benefit of conducting a risk workshop using a top-down approach instead of a bottom-up approach is the ability to:
Which of the following is MOST important for an organization to have in place when developing a risk management framework?
A business is conducting a proof of concept on a vendor’s AI technology. Which of the following is the MOST important consideration for managing risk?
An organization has just started accepting credit card payments from customers via the corporate website. Which of the following is MOST likely to increase as a result of this new initiative?
When updating the risk register after a risk assessment, which of the following is MOST important to include?
An organization has used generic risk scenarios to populate its risk register. Which of the following presents the GREATEST challenge to assigning of the associated risk entries?
Which of the following provides The MOST useful information when determining a risk management program ' s maturity level?