Which of the following is the GREATEST benefit of having a mature enterprise architecture (EA) in place?
A user has contacted the risk practitioner regarding malware spreading laterally across the organization's corporate network. Which of the following is the risk practitioner’s BEST course of action?
Which of the following is the GREATEST risk associated with the misclassification of data?
Which of the following should be the GREATEST concern for an organization that uses open source software applications?
Which of the following is the MOST important information to be communicated during security awareness training?
In which of the following system development life cycle (SDLC) phases should controls be incorporated into system specifications?
From a risk management perspective, which of the following is the PRIMARY benefit of using automated system configuration validation tools?
Which of the following provides the MOST useful information to trace the impact of aggregated risk across an organization's technical environment?
A risk practitioner is organizing a training session lo communicate risk assessment methodologies to ensure a consistent risk view within the organization Which of the following i< the MOST important topic to cover in this training?
Which of the following will be MOST effective to mitigate the risk associated with the loss of company data stored on personal devices?
During a risk assessment, a risk practitioner learns that an IT risk factor is adequately mitigated by compensating controls in an associated business process. Which of the following would enable the MOST effective management of the residual risk?
Which of the following is the BEST Key control indicator KCO to monitor the effectiveness of patch management?
In a public company, which group is PRIMARILY accountable for ensuring sufficient attention and resources are applied to the risk management process?
Which of the following would have the GREATEST impact on reducing the risk associated with the implementation of a big data project?
Which of the following is the BEST approach for an organization in a heavily regulated industry to comprehensively test application functionality?
The MOST important reason for implementing change control procedures is to ensure:
When of the following provides the MOST tenable evidence that a business process control is effective?
Which of the following is the BEST way to determine the potential organizational impact of emerging privacy regulations?
Which of the following factors will have the GREATEST impact on the implementation of a risk mitigation strategy for an organization?
Which of the following is the PRIMARY reason for monitoring activities performed in a production database environment?
Which of the following is the MOST effective way to reduce potential losses due to ongoing expense fraud?
Owners of technical controls should be PRIMARILY accountable for ensuring the controls are:
Which of the following will BEST help to improve an organization's risk culture?
Which of the following is the BEST measure of the effectiveness of an employee deprovisioning process?
Which of the following is MOST important when discussing risk within an organization?
A risk practitioner implemented a process to notify management of emergency changes that may not be approved. Which of the following is the BEST way to provide this information to management?
Which of the following aspects of an IT risk and control self-assessment would be MOST important to include in a report to senior management?
Which of the following is the BEST way for a risk practitioner to present an annual risk management update to the board''
Which of the following would BEST help to ensure that suspicious network activity is identified?
Which of the following is a risk practitioner's BEST course of action upon learning that a control under internal review may no longer be necessary?
A risk practitioner has been asked to assess the risk associated with a new critical application used by a financial process team that the risk practitioner was a member of two years ago. Which of the following is the GREATEST concern with this request?
Which of the following is the MOST effective way to integrate business risk management with IT operations?
A management team is on an aggressive mission to launch a new product to penetrate new markets and overlooks IT risk factors, threats, and vulnerabilities. This scenario BEST demonstrates an organization's risk:
Which of the following is the GREATEST concern when an organization uses a managed security service provider as a firewall administrator?
Which of the following s MOST likely to deter an employee from engaging in inappropriate use of company owned IT systems?
A key risk indicator (KRI) indicates a reduction in the percentage of appropriately patched servers. Which of the following is the risk practitioner's BEST course of action?
Which of the following is MOST helpful in providing a high-level overview of current IT risk severity*?
Which of the following BEST enables the identification of trends in risk levels?
An organization has an approved bring your own device (BYOD) policy. Which of the following would BEST mitigate the security risk associated with the inappropriate use of enterprise applications on the devices?
Which of the following is the MOST important consideration when implementing ethical remote work monitoring?
Which of the following will BEST help to ensure the continued effectiveness of the IT risk management function within an organization experiencing high employee turnover?
A segregation of duties control was found to be ineffective because it did not account for all applicable functions when evaluating access. Who is responsible for ensuring the control is designed to effectively address risk?
Which of the following metrics is BEST used to communicate to senior management that the control environment manages risk within appetite and tolerance?
Which of the following is the BEST way to help ensure risk will be managed properly after a business process has been re-engineered?
Which of the following is the PRIMARY reason to perform periodic vendor risk assessments?