It is MOST appropriate for changes to be promoted to production after they are:
Which of the following is MOST likely to cause a key risk indicator (KRI) to exceed thresholds?
The PRIMARY reason for tracking the status of risk mitigation plans is to ensure:
Which of the following is the BEST way to validate the results of a vulnerability assessment?
Concerned about system load capabilities during the month-end close process, management requires monitoring of the average time to complete tasks and monthly reporting of the findings. What type of measure has been established?
An organization's IT department wants to complete a proof of concept (POC) for a security tool. The project lead has asked for approval to use the production data for testing purposes as it will yield the best results. Which of the following is the risk practitioner's BEST recommendation?
Which of the following is the MOST important consideration for protecting data assets m a Business application system?
Which of the following would MOST likely cause a risk practitioner to reassess risk scenarios?
Which of the following is MOST important to include when reporting the effectiveness of risk management to senior management?
Which of the following provides the BEST evidence that a selected risk treatment plan is effective?
What would be MOST helpful to ensuring the effective implementation of a new cybersecurity program?
Which of the following would be a weakness in procedures for controlling the migration of changes to production libraries?
Zero Trust architecture is designed and deployed with adherence to which of the following basic tenets?
Establishing and organizational code of conduct is an example of which type of control?
Which of the following is the BEST key control indicator (KCI) for measuring the security of a blockchain network?
The objective of aligning mitigating controls to risk appetite is to ensure that:
Which of the following is the BEST way to validate privileged access to database accounts?
Which of the following is MOST effective in continuous risk management process improvement?
Which of the following is the MOST important reason to communicate risk assessments to senior management?
A risk practitioner learns that the organization s industry is experiencing a trend of rising security incidents. Which of the following is the BEST course of action?
Which of the following is the MOST important success factor when introducing risk management in an organization?
Which of the following should a risk practitioner recommend FIRST when an increasing trend of risk events and subsequent losses has been identified?
Which of the following key performance indicators (KPis) would BEST measure me risk of a service outage when using a Software as a Service (SaaS) vendors
A global organization is considering the transfer of its customer information systems to an overseas cloud service provider in the event of a disaster. Which of the following should be the MOST important risk consideration?
Which of the following should be the PRIMARY driver for an organization on a multi-year cloud implementation to publish a cloud security policy?
Which of the following is a risk practitioner's BEST course of action upon learning that regulatory authorities have concerns with an emerging technology the organization is considering?
Which of the following BEST enables a proactive approach to minimizing the potential impact of unauthorized data disclosure?
Which of the following BEST helps to identify significant events that could impact an organization?
Vulnerability analysis
A risk practitioner has collaborated with subject matter experts from the IT department to develop a large list of potential key risk indicators (KRIs) for all IT operations within theorganization of the following, who should review the completed list and select the appropriate KRIs for implementation?
An organization requires a third party for processing customer personal data. Which of the following is the BEST approach when sharing data over a public network?
Which of the following is MOST helpful in identifying gaps between the current and desired state of the IT risk environment?
Which of the following would BEST help identify the owner for each risk scenario in a risk register?
The PRIMARY reason a risk practitioner would be interested in an internal audit report is to:
Which of the following is the MOST important consideration when developing risk strategies?
Which of the following is the ULTIMATE objective of utilizing key control indicators (KCIs) in the risk management process?
Which of the following is the BEST way to address IT regulatory compliance risk?
A poster has been displayed in a data center that reads. "Anyone caught taking photographs in the data center may be subject to disciplinary action." Which of the following control types has been implemented?
An organization allows programmers to change production systems in emergency situations. Which of the following is the BEST control?
A risk practitioner observes that hardware failure incidents have been increasing over the last few months. However, due to built-in redundancy and fault-tolerant architecture, there have been no interruptions to business operations. The risk practitioner should conclude that:
Which of the following is the STRONGEST indication an organization has ethics management issues?
Who should be responsible for determining which stakeholders need to be involved in the development of a risk scenario?
Which of the following is the MOST common concern associated with outsourcing to a service provider?
A risk practitioner has learned that an effort to implement a risk mitigation action plan has stalled due to lack of funding. The risk practitioner should report that the associated risk has been:
Which of the following offers the SIMPLEST overview of changes in an organization's risk profile?
An organization plans to migrate sensitive information to a public cloud infrastructure. Which of the following is the GREATEST security risk in this scenario?