Which of the following BEST indicates the efficiency of a process for granting access privileges?
Which of the following BEST enables effective risk reporting to the board of directors?
Print jobs containing confidential information are sent to a shared network printer located in a secure room. Which of the following is the BEST control to prevent the inappropriate disclosure of confidential information?
Which of the following is MOST important to consider when assessing the likelihood that a recently discovered software vulnerability will be exploited?
A risk practitioner has been asked to propose a risk acceptance framework for an organization. Which of the following is the MOST important consideration for the risk practitioner to address in the framework?
A bank recently incorporated Blockchain technology with the potential to impact known risk within the organization. Which of the following is the risk practitioner’s BEST course of action?
Which of the following should be done FIRST when developing an initial set of risk scenarios for an organization?
Which of the following is the PRIMARY reason to perform periodic vendor risk assessments?
Reviewing which of the following would provide the MOST useful information when preparing to evaluate the effectiveness of existing controls?
Which of the following is the MOST important enabler of effective risk management?
After mapping generic risk scenarios to organizational security policies, the NEXT course of action should be to:
Which of the following is MOST likely to be impacted as a result of a new policy which allows staff members to remotely connect to the organization's IT systems via personal or public computers?
Which of the following is a risk practitioner's BEST recommendation to help reduce IT risk associated with scheduling overruns when starting a new application development project?
Which of the following techniques is MOST helpful when quantifying the potential loss impact of cyber risk?
Which of the following is the MOST important reason to restrict access to the risk register on a need-to-know basis?
During the risk assessment of an organization that processes credit cards, a number of existing controls have been found to be ineffective and do not meet industry standards. The overall control environment may still be effective if:
Which of the following is the BEST key performance indicator (KPI) for determining how well an IT policy is aligned to business requirements?
Which of the following will BEST help in communicating strategic risk priorities?
Which of the following is the GREATEST concern when using a generic set of IT risk scenarios for risk analysis?
During an organization's simulated phishing email campaign, which of the following is the BEST indicator of a mature security awareness program?
During a risk treatment plan review, a risk practitioner finds the approved risk action plan has not been completed However, there were other risk mitigation actions implemented. Which of the fallowing is the BEST course of action?
Within the three lines of defense model, the responsibility for managing risk and controls resides with:
Which of the following is the BEST key performance indicator (KPI) to measure how effectively risk management practices are embedded in the project management office (PMO)?
A new risk practitioner finds that decisions for implementing risk response plans are not being made. Which of the following would MOST likely explain this situation?
A web-based service provider with a low risk appetite for system outages is reviewing its current risk profile for online security. Which of the following observations would be MOST relevant to escalate to senior management?
Senior management has requested more information regarding the risk associated with introducing a new application into the environment. Which of the following should be done FIRST?
A newly incorporated enterprise needs to secure its information assets From a governance perspective which of the following should be done FIRST?
An organization has determined a risk scenario is outside the defined risk tolerance level. What should be the NEXT course of action?
Which of the following BEST enables the integration of IT risk management across an organization?
An IT organization is replacing the customer relationship management (CRM) system. Who should own the risk associated with customer data leakage caused by insufficient IT security controls for the new system?
Which of the following BEST measures the efficiency of an incident response process?
A business impact analysis (BIA) has documented the duration of maximum allowable outage for each of an organization's applications. Which of the following MUST be aligned with the maximum allowable outage?
An organization is unable to implement a multi-factor authentication requirement until the next fiscal year due to budget constraints. Consequently, a policy exception must be submitted. Which of the following is MOST important to include in the analysis of the exception?
A failed IT system upgrade project has resulted in the corruption of an organization's asset inventory database. Which of the following controls BEST mitigates the impact of this incident?
Which of the following BEST indicates effective information security incident management?
Which of the following is the MOST likely reason an organization would engage an independent reviewer to assess its IT risk management program?
Which of the following should be the PRIMARY consideration for a startup organization that has decided to adopt externally-sourced security policies?
The risk to an organization's reputation due to a recent cybersecurity breach is PRIMARILY considered to be:
An engineer has been assigned to conduct data restoration after a server storage failure. However, the procedure was not successful. Which of the following is the MOST probable cause of this situation?
To enable effective integration of IT risk scenarios and enterprise risk management (ERM), it is MOST important to have a consistent approach to reporting:
Which of the following is the BEST indication that an organization's risk management program has not reached the desired maturity level?
Which of the following changes would be reflected in an organization's risk profile after the failure of a critical patch implementation?
Which of the following is the BEST approach to mitigate the risk associated with a control deficiency?
Which of the following BEST enables the identification of trends in risk levels?
Which of the following is the MOST effective control to ensure user access is maintained on a least-privilege basis?
Which of the following would provide the MOST helpful input to develop risk scenarios associated with hosting an organization's key IT applications in a cloud environment?
A risk register BEST facilitates which of the following risk management functions?
An organization has decided to use an external auditor to review the control environment of an outsourced service provider. The BEST control criteria to evaluate the provider would be based on: