Who is ULTIMATELY accountable for the confidentiality of data in the event of a data breach within a Software as a Service (SaaS) environment?
What would be MOST helpful to ensuring the effective implementation of a new cybersecurity program?
Which of the following is the BEST evidence that risk management is driving business decisions in an organization?
Which of the following is the BEST approach when a risk practitioner has been asked by a business unit manager to exclude an in-scope system from a risk assessment?
Which of the following is the GREATEST risk associated with the transition of a sensitive data backup solution from on-premise to a cloud service provider?
Which of the following BEST indicates that risk management is embedded into the responsibilities of all employees?
Employees are repeatedly seen holding the door open for others, so that trailing employees do not have to stop and swipe their own ID badges. This behavior BEST represents:
Which of the following BEST enables a risk practitioner to understand management ' s approach to organizational risk?
Which of the following would BEST help to address the risk associated with malicious outsiders modifying application data?
Which of the following presents the GREATEST risk to change control in business application development over the complete life cycle?
IT management has asked for a consolidated view into the organization ' s risk profile to enable project prioritization and resource allocation. Which of the following materials would
be MOST helpful?
Which of the following BEST facilitates the development of effective IT risk scenarios?
Whether the results of risk analyses should be presented in quantitative or qualitative terms should be based PRIMARILY on the:
Which of The following BEST represents the desired risk posture for an organization?
Recent penetration testing of an organization ' s software has identified many different types of security risks. Which of the following is the MOST likely root cause for the identified risk?
A key risk indicator (KRI) threshold has reached the alert level, indicating data leakage incidents are highly probable. What should be the risk practitioner ' s FIRST course of action?
When reviewing the business continuity plan (BCP) of an online sales order system, a risk practitioner notices that the recovery time objective (RTO) has a shorter lime than what is defined in the disaster recovery plan (DRP). Which of the following is the BEST way for the risk practitioner to address this concern?
Which of the following is a specific concern related to machine learning algorithms?
An organization becomes aware that IT security failed to detect a coordinated
cyber attack on its data center. Which of the following is the BEST course of
action?
An organization has decided to postpone the assessment and treatment of several risk scenarios because stakeholders are unavailable. As a result of this decision, the risk associated with these new entries has been;
For a large software development project, risk assessments are MOST effective when performed:
Which of the following is the PRIMARY reason to obtain independent reviews of risk assessment and response mechanisms?
A penetration testing team discovered an ineffectively designed access control. Who is responsible for ensuring the control design gap is remediated?
Which of the following would be- MOST helpful to understand the impact of a new technology system on an organization ' s current risk profile?
A risk practitioner has collaborated with subject matter experts from the IT department to develop a large list of potential key risk indicators (KRIs) for all IT operations within theorganization of the following, who should review the completed list and select the appropriate KRIs for implementation?
When formulating a social media policy lo address information leakage, which of the following is the MOST important concern to address?
Automated code reviews to reduce the risk associated with web applications are MOST effective when performed:
An organization has identified the need to implement an asset tiering model to establish the appropriate level of impact. Which of the following is the MOST effective risk assessment methodology for a risk practitioner to use for this initiative?
Which of the following would provide executive management with the BEST information to make risk decisions as a result of a risk assessment?
An organization ' s capability to implement a risk management framework is PRIMARILY influenced by the:
To mitigate the risk of using a spreadsheet to analyze financial data, IT has engaged a third-party vendor to deploy a standard application to automate the process. Which of the following parties should own the risk associated with calculation errors?
Which of the following BEST enables effective risk reporting to the board of directors?
In an organization dependent on data analytics to drive decision-making, which of the following would BEST help to minimize the risk associated with inaccurate data?
A service organization is preparing to adopt an IT control framework to comply with the contractual requirements of a new client. Which of the following would be MOST helpful to the risk practitioner?
Which of the following is the MOST important information to cover a business continuity awareness Ira nine, program for all employees of the organization?
Which of the following would MOST effectively enable a business operations manager to identify events exceeding risk thresholds?
Which of the following is the MOST effective way to reduce potential losses due to ongoing expense fraud?
An organization recently experienced a cyber attack that resulted in the loss of confidential customer data. Which of the following is the risk practitioner ' s BEST recommendation after recovery steps have been completed?
What information is MOST helpful to asset owners when classifying organizational assets for risk assessment?
Which of the following should be the PRIMARY recipient of reports showing the
progress of a current IT risk mitigation project?
Which of the following is the MOST effective way for a large and diversified organization to minimize risk associated with unauthorized software on company devices?
Which of the following would provide the BEST evidence of an effective internal control environment/?
An organization needs to send files to a business partner to perform a quality control audit on the organization’s record-keeping processes. The files include personal information on theorganization ' s customers. Which of the following is the BEST recommendation to mitigate privacy risk?
Which of the following is the BEST way to support communication of emerging risk?
Which of the following will be MOST effective in helping to ensure control failures are appropriately managed?
Which of the following is the BEST way to quantify the likelihood of risk materialization?
Which of the following BEST contributes to the implementation of an effective risk response action plan?