Which of the following is MOST important for an organization to have in place when developing a risk management framework?
Which of the following is MOST important requirement to include in a Software as a Service (SaaS) vendor contract to ensure data is protected?
Which of the following is MOST important for a risk practitioner to ensure once a risk action plan has been completed?
When formulating a social media policy lo address information leakage, which of the following is the MOST important concern to address?
Which of the following BEST protects an organization against breaches when using a software as a service (SaaS) application?
Senior management has requested a risk practitioner's guidance on whether
a new technical control requested by a business unit is worth the investment.
Which of the following should be the MOST important consideration before
providing input?
Which of the following should be the FIRST course of action if the risk associated with a new technology is found to be increasing?
Which of the following should be management's PRIMARY focus when key risk indicators (KRIs) begin to rapidly approach defined thresholds?
An organization is conducting a review of emerging risk. Which of the following is the BEST input for this exercise?
The PRIMARY reason for establishing various Threshold levels for a set of key risk indicators (KRIs) is to:
The PRIMARY goal of conducting a business impact analysis (BIA) as part of an overall continuity planning process is to:
Which of the following is the MOST important information to cover a business continuity awareness Ira nine, program for all employees of the organization?
Who should be accountable for ensuring effective cybersecurity controls are established?
An organization is developing a risk universe to create a holistic view of its overall risk profile. Which of the following is the GREATEST barrier to achieving the initiative's objectives?
An organization has decided to implement an emerging technology and incorporate the new capabilities into its strategic business plan. Business operations for the technology will be outsourced. What will be the risk practitioner's PRIMARY role during the change?
An internal audit report reveals that not all IT application databases have encryption in place. Which of the following information would be MOST important for assessing the risk impact?
A risk practitioner's BEST guidance to help an organization develop relevant risk scenarios is to ensure the scenarios are:
Which of the following activities would BEST contribute to promoting an organization-wide risk-aware culture?
Which of the following is the FIRST step when conducting a business impact analysis (BIA)?
Which of the following is the ULTIMATE objective of utilizing key control indicators (KCIs) in the risk management process?
Which of the following will BEST mitigate the risk associated with IT and business misalignment?
The PRIMARY reason to have risk owners assigned to entries in the risk register is to ensure:
A business unit is implementing a data analytics platform to enhance its customer relationship management (CRM) system primarily to process data that has been provided by its customers. Which of the following presents the GREATEST risk to the organization's reputation?
Which of the following should be the PRIMARY basis for deciding whether to disclose information related to risk events that impact external stakeholders?
A threat intelligence team has identified an indicator of compromise related to an advanced persistent threat (APT) actor. Which of the following is the risk practitioner's BEST course of action?
Which of the following will BEST help ensure that risk factors identified during an information systems review are addressed?
Which of the following is the BEST approach when a risk practitioner has been asked by a business unit manager to exclude an in-scope system from a risk assessment?
Which of the following is the BEST way to determine the ongoing efficiency of control processes?
The PRIMARY benefit of selecting an appropriate set of key risk indicators (KRIs) is that they:
A vendor's planned maintenance schedule will cause a critical application to temporarily lose failover capabilities. Of the following, who should approve this proposed schedule?
What is the MOST important consideration when selecting key performance indicators (KPIs) for control monitoring?
What would be MOST helpful to ensuring the effective implementation of a new cybersecurity program?
What is the PRIMARY role of the application owner when changes are being introduced into an existing environment?
Which of the following is the BEST recommendation to address recent IT risk trends that indicate social engineering attempts are increasing in the organization?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a disaster recovery plan (DRP)?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
Which of the following BEST indicates that an organizations risk management program is effective?
Which of the following should be the FIRST consideration when establishing a new risk governance program?
Which of the following is a PRIMARY reason for considering existing controls during initial risk assessment?
Which of the following is the BEST way to determine software license compliance?
Business management is seeking assurance from the CIO that IT has a plan in place for early identification of potential issues that could impact the delivery of a new application Which of the following is the BEST way to increase the chances of a successful delivery'?
Which of the following actions should a risk practitioner do NEXT when an increased industry trend of external cyber attacks is identified?
Which of the following BEST indicates that security requirements have been incorporated into the system development life cycle (SDLC)?
An organization is participating in an industry benchmarking study that involves providing customer transaction records for analysis Which of the following is the MOST important control to ensure the privacy of customer information?
A risk practitioner learns that a risk owner has been accepting gifts from a supplier of IT products. Some of these IT products are used to implement controls and to mitigate risk to acceptable levels. Which of the following should the risk practitioner do FIRST?