Which of the following BEST indicates effective information security incident management?
During an acquisition, which of the following would provide the MOST useful input to the parent company's risk practitioner when developing risk scenarios for the post-acquisition phase?
Which of the following BEST facilitates the development of effective IT risk scenarios?
Reviewing historical risk events is MOST useful for which of the following processes within the risk management life cycle?
Which of the following is a risk practitioner's MOST important course of action after learning that an organization's industry peers have experienced an increase in ransomware attacks?
Which of the following criteria is MOST important when developing a response to an attack that would compromise data?
A risk practitioner is asked to present the results of the most recent technology risk assessment to executive management in a concise manner. Which of the following is MOST important to include in the presentation?
Which of the following is MOST important for a risk practitioner to consider when analyzing the risk associated with migrating to a new cloud service provider?
An organization operates in an environment where the impact of ransomware attacks is high, with a low likelihood. After quantifying the impact of the risk associated with ransomware attacks exceeds the organization's risk appetite and tolerance, which of the following is the risk practitioner's BEST recommendation?
Which of the following would be MOST useful when measuring the progress of a risk response action plan?
A new international data privacy regulation requires personal data to be
disposed after the specified retention period, which is different from the local
regulatory requirement. Which of the following is the risk practitioner's
BEST course of action?
A chief information officer (CIO) has identified risk associated with shadow systems being maintained by business units to address specific functionality gaps in the organization'senterprise resource planning (ERP) system. What is the BEST way to reduce this risk going forward?
Which of the following requirements is MOST important to include in an outsourcing contract to help ensure sensitive data stored with a service provider is secure?
Which of the following is the GREATEST benefit of using IT risk scenarios?
For a large software development project, risk assessments are MOST effective when performed:
What is the BEST information to present to business control owners when justifying costs related to controls?
Following an acquisition, the acquiring company's risk practitioner has been asked to update the organization's IT risk profile What is the MOST important information to review from the acquired company to facilitate this task?
When an organization’s disaster recovery plan (DRP) has a reciprocal agreement, which of the following risk treatment options is being applied?
Which of the following is the MOST important objective of embedding risk management practices into the initiation phase of the project management life cycle?
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
An internal audit report reveals that not all IT application databases have encryption in place. Which of the following information would be MOST important for assessing the risk impact?
Which of the following is the MOST important foundational element of an effective three lines of defense model for an organization?
Which of the following is MOST important to consider when determining key performance indicators (KPIs) for a process?
Which of the following provides the BEST level of assurance to an organization that its vendors' controls are effective?
When reviewing a report on the performance of control processes, it is MOST important to verify whether the:
Which of the following is the MOST important consideration when developing risk strategies?
Which of the following should be considered when selecting a risk response?
Which of the following is MOST helpful in identifying gaps between the current and desired state of the IT risk environment?
Which of the following is the MAIN benefit of involving stakeholders in the selection of key risk indicators (KRIs)?
Who is the BEST person to an application system used to process employee personal data?
When testing the security of an IT system, il is MOST important to ensure that;
Which of the following is the MOST important objective of regularly presenting the project risk register to the project steering committee?
Which of the following is the PRIMARY benefit when senior management periodically reviews and updates risk appetite and tolerance levels?
When developing a risk awareness training program, which of the following is the BEST way to promote a risk-aware culture?
Which of the following situations would BEST justify escalation to senior management?
Which of the following would MOST effectively reduce the potential for inappropriate exposure of vulnerabilities documented in an organization's risk register?
Which of the following is a risk practitioner's BEST course of action after identifying risk scenarios related to noncompliance with new industry regulations?
During an organization's simulated phishing email campaign, which of the following is the BEST indicator of a mature security awareness program?
Which of the following is the MOST effective way to incorporate stakeholder concerns when developing risk scenarios?
Which of the following is the PRIMARY reason to establish the root cause of an IT security incident?
A recent vulnerability assessment of a web-facing application revealed several weaknesses. Which of the following should be done NEXT to determine the risk exposure?
Which of the following is the GREATEST benefit of centralizing IT systems?
An organization planning to transfer and store its customer data with an offshore cloud service provider should be PRIMARILY concerned with:
Which of the following MUST be assessed before considering risk treatment options for a scenario with significant impact?
During a risk assessment, a risk practitioner learns that an IT risk factor is adequately mitigated by compensating controls in an associated business process. Which of the following would enable the MOST effective management of the residual risk?
During a risk treatment plan review, a risk practitioner finds the approved risk action plan has not been completed However, there were other risk mitigation actions implemented. Which of the fallowing is the BEST course of action?
Which of the following should an organization perform to forecast the effects of a disaster?
Which of the following is the MOST important for an organization to have in place to ensure IT asset protection?
In an organization with a mature risk management program, which of the following would provide the BEST evidence that the IT risk profile is up to date?
Which of the following aspects of risk can be transferred to a third party?
Which of the following should be the PRIMARY consideration when assessing the risk of using Internet of Things (loT) devices to collect and process personally identifiable information (PII)?
Which of the following should be the PRIMARY driver for the prioritization of risk responses?
Which of the following factors will have the GREATEST impact on the implementation of a risk mitigation strategy for an organization?
Which of the following provides the BEST evidence that risk mitigation plans have been implemented effectively?
Which of the following is the MOST important component in a risk treatment plan?
Which of the following should be reported periodically to the risk committee?
An organization has implemented a cloud-based backup solution to help prevent loss of transactional data from offices in an earthquake zone. This strategy demonstrates risk:
The MOST important measure of the effectiveness of risk management in project implementation is the percentage of projects:
When is the BEST to identify risk associated with major project to determine a mitigation plan?
Which of the following is the MOST important requirement for monitoring key risk indicators (KRls) using log analysis?
Which of the following is the MOST effective way to help ensure an organization's current risk scenarios are relevant?
Which of the following should be the PRIMARY basis for deciding whether to disclose information related to risk events that impact external stakeholders?
Which of the following issues should be of GREATEST concern when evaluating existing controls during a risk assessment?
Which of the following BEST facilitates the process of documenting risk tolerance?
Which of the following resources is MOST helpful to a risk practitioner when updating the likelihood rating in the risk register?
Which of the following is the GREATEST concern associated with the transmission of healthcare data across the internet?
Which of the following should be an element of the risk appetite of an organization?
The cost of maintaining a control has grown to exceed the potential loss. Which of the following BEST describes this situation?
Which of the following is the MOST effective way to assess the risk associated with outsourcing IT processes?
During an IT department reorganization, the manager of a risk mitigation action plan was replaced. The new manager has begun implementing a new control after identifying a more effective option. Which of the following is the risk practitioner's BEST course of action?
The PRIMARY reason to have risk owners assigned to entries in the risk register is to ensure:
A risk practitioner identifies an increasing trend of employees copying company information unrelated to their job functions to USB drives. Which of the following elements of the risk register should be updated to reflect this observation?
Which of the following should a risk practitioner do FIRST to support the implementation of governance around organizational assets within an enterprise risk management (ERM) program?
Which of the following activities would BEST contribute to promoting an organization-wide risk-aware culture?
The PRIMARY reason for communicating risk assessment results to data owners is to enable the:
An application development team has a backlog of user requirements for a new system that will process insurance claim payments for customers. Which of the following should be the MOST important consideration for a risk-based review of the user requirements?
Which of the following is the MOST useful information for prioritizing risk mitigation?
Which of the following is an IT business owner's BEST course of action following an unexpected increase in emergency changes?
Which of the following would BEST mitigate the risk associated with reputational damage from inappropriate use of social media sites by employees?
A risk practitioner has been asked to assess the risk associated with a new critical application used by a financial process team that the risk practitioner was a member of two years ago. Which of the following is the GREATEST concern with this request?
Which of the following would be the BEST way for a risk practitioner to validate the effectiveness of a patching program?
Which of the following is the BEST way for a risk practitioner to help management prioritize risk response?
Which of the following should be a risk practitioner's NEXT action after identifying a high probability of data loss in a system?
Which of the following BEST prevents unauthorized access to customer personal data transmitted to third-party service providers?
When defining thresholds for control key performance indicators (KPIs). it is MOST helpful to align:
A bank recently incorporated blockchain technology with the potential to impact known risk within the organization. Which of the following is the risk practitioner's BEST course of action?
Which of the following would BEST mitigate the ongoing risk associated with operating system (OS) vulnerabilities?
When reviewing a business continuity plan (BCP). which of the following would be the MOST significant deficiency?
Which of the following is the BEST way to address a board's concern about the organization's current cybersecurity posture?
Which of the following is MOST effective in continuous risk management process improvement?
Which of the following is MOST helpful in developing key risk indicator (KRl) thresholds?
Which of the following is the BEST way to determine software license compliance?
Which of the following provides the MOST useful information when measuring the progress of risk response action plans?
Which of the following will MOST likely change as a result of the decrease in risk appetite due to a new privacy regulation?
Which of the following is the MOST effective way for a large and diversified organization to minimize risk associated with unauthorized software on company devices?
Which of the following should be the FIRST step when a company is made aware of new regulatory requirements impacting IT?
Which of the following is the MOST useful information an organization can obtain from external sources about emerging threats?
Which of the following controls would BEST mitigate the risk of user passwords being compromised by a man in the middle technique?
Which of the following should be the PRIMARY objective of a risk awareness training program?
Which of the following is the MOST important reason to communicate control effectiveness to senior management?
A risk heat map is MOST commonly used as part of an IT risk analysis to facilitate risk:
An organization recently implemented an automated interface for uploading payment files to its banking system to replace manual processing. Which of the following elements of the risk register is MOST appropriate for the risk practitioner to update to reflect the improved control?
The BEST indication that risk management is effective is when risk has been reduced to meet:
An organization has allowed several employees to retire early in order to avoid layoffs Many of these employees have been subject matter experts for critical assets Which type of risk is MOST likely to materialize?
Which of the following should be done FIRST when information is no longer required to support business objectives?
Which of The following should be of GREATEST concern for an organization considering the adoption of a bring your own device (BYOD) initiative?
The BEST metric to monitor the risk associated with changes deployed to production is the percentage of:
Which of the following should be the PRIMARY focus of a disaster recovery management (DRM) framework and related processes?
Once a risk owner has decided to implement a control to mitigate risk, it is MOST important to develop:
Which of the following is a risk practitioner's BEST recommendation upon learning that an employee inadvertently disclosed sensitive data to a vendor?
Which of the following is the BEST key performance indicator (KPI) for a server patch management process?
Which of the following is the GREATEST concern associated with the lack of proper control monitoring?
The BEST key performance indicator (KPI) to measure the effectiveness of the security patching process is the percentage of patches installed:
Which of the following s MOST likely to deter an employee from engaging in inappropriate use of company owned IT systems?
A failure in an organization s IT system build process has resulted in several computers on the network missing the corporate endpoint detection and response (EDR) software. Which of the following should be the risk practitioner’s IMMEDIATE concern?
Which of the following aspects of an IT risk and control self-assessment would be MOST important to include in a report to senior management?
Who is MOST important lo include in the assessment of existing IT risk scenarios?
Which of the following is the BEST course of action to reduce risk impact?
Which of the following is MOST helpful to ensure effective security controls for a cloud service provider?
For no apparent reason, the time required to complete daily processing for a legacy application is approaching a risk threshold. Which of the following activities should be performed FIRST?
Which of the following is the BEST way to mitigate the risk associated with fraudulent use of an enterprise's brand on Internet sites?
When developing risk treatment alternatives for a Business case, it is MOST helpful to show risk reduction based on:
A control owner has completed a year-long project To strengthen existing controls. It is MOST important for the risk practitioner to:
Reviewing which of the following BEST helps an organization gain insight into its overall risk profile?
WhichT5f the following is the MOST effective way to promote organization-wide awareness of data security in response to an increase in regulatory penalties for data leakage?
During a post-implementation review for a new system, users voiced concerns about missing functionality. Which of the following is the BEST way for the organization to avoid this situation in the future?
Which of the following is the MOST useful indicator to measure the efficiency of an identity and access management process?
Which of the following is MOST influential when management makes risk response decisions?
During the initial risk identification process for a business application, it is MOST important to include which of the following stakeholders?
Which of the following is MOST helpful to understand the consequences of an IT risk event?
An organization is implementing robotic process automation (RPA) to streamline business processes. Given that implementation of this technology is expected to impact existing controls, which of the following is the risk practitioner's BEST course of action?
Which of the following is the MOST important reason for a risk practitioner to identify stakeholders for each IT risk scenario?
Which of the following helps ensure compliance with a nonrepudiation policy requirement for electronic transactions?
Which of the following is MOST important to ensure risk management practices are effective at all levels within the organization?
Who should be accountable for monitoring the control environment to ensure controls are effective?
An organization recently invested in an identity and access management (IAM) solution to manage user activities across corporate mobile devices. Which of the following is MOST important to update in the risk register?
Which of the following is MOST important to consider when determining risk appetite?
Which of the following is MOST important for a multinational organization to consider when developing its security policies and standards?
A risk practitioner is developing a set of bottom-up IT risk scenarios. The MOST important time to involve business stakeholders is when:
When assessing the maturity level of an organization's risk management framework, which of the following should be of GREATEST concern to a risk practitioner?
The BEST reason to classify IT assets during a risk assessment is to determine the:
When reviewing the business continuity plan (BCP) of an online sales order system, a risk practitioner notices that the recovery time objective (RTO) has a shorter lime than what is defined in the disaster recovery plan (DRP). Which of the following is the BEST way for the risk practitioner to address this concern?
Which type of indicators should be developed to measure the effectiveness of an organization's firewall rule set?
Which of the following is the MOST efficient method for monitoring control effectiveness?
When an organization is having new software implemented under contract, which of the following is key to controlling escalating costs?
A risk practitioner is utilizing a risk heat map during a risk assessment. Risk events that are coded with the same color will have a similar:
An organization has committed to a business initiative with the knowledge that the risk exposure is higher than the risk appetite. Which of the following is the risk practitioner's MOST important action related to this decision?
An organization uses a vendor to destroy hard drives. Which of the following would BEST reduce the risk of data leakage?
Which of the following should be the PRIMARY basis for establishing a priority sequence when restoring business processes after a disruption?
Which of the following risk register elements is MOST likely to be updated if the attack surface or exposure of an asset is reduced?
During a control review, the control owner states that an existing control has deteriorated over time. What is the BEST recommendation to the control owner?
A risk practitioner has learned that an effort to implement a risk mitigation action plan has stalled due to lack of funding. The risk practitioner should report that the associated risk has been:
Which of the following is the MOST common concern associated with outsourcing to a service provider?
An organization wants to grant remote access to a system containing sensitive data to an overseas third party. Which of the following should be of GREATEST concern to management?
An organizations chief technology officer (CTO) has decided to accept the risk associated with the potential loss from a denial-of-service (DoS) attack. In this situation, the risk practitioner's BEST course of action is to:
Which of the following is the BEST way to promote adherence to the risk tolerance level set by management?
The PRIMARY reason a risk practitioner would be interested in an internal audit report is to:
Which of the following controls would BEST reduce the likelihood of a successful network attack through social engineering?
A migration from an in-house developed system to an external cloud-based solution is affecting a previously rated key risk scenario related to payroll processing. Which part of the risk register should be updated FIRST?
The MOST important characteristic of an organization s policies is to reflect the organization's:
From a business perspective, which of the following is the MOST important objective of a disaster recovery test?
Which of the following should be the FIRST consideration when establishing a new risk governance program?
Senior management wants to increase investment in the organization's cybersecurity program in response to changes in the external threat landscape. Which of the following would BEST help to prioritize investment efforts?
Which of the following could BEST detect an in-house developer inserting malicious functions into a web-based application?
A review of an organization s controls has determined its data loss prevention {DLP) system is currently failing to detect outgoing emails containing credit card data. Which of the following would be MOST impacted?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a disaster recovery test of critical business processes?
Which of the following changes would be reflected in an organization's risk profile after the failure of a critical patch implementation?
Which of the following is the MOST effective control to ensure user access is maintained on a least-privilege basis?
Which of the following would be of GREATEST assistance when justifying investment in risk response strategies?
Which of the following is the BEST source for identifying key control indicators (KCIs)?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a vulnerability management process?
Which of the following is the PRIMARY reason for conducting peer reviews of risk analysis?
Which of the following BEST supports the communication of risk assessment results to stakeholders?
A global company s business continuity plan (BCP) requires the transfer of its customer information….
event of a disaster. Which of the following should be the MOST important risk consideration?
Which of the following is the PRIMARY advantage of aligning generic risk scenarios with business objectives?
A deficient control has been identified which could result in great harm to an organization should a low frequency threat event occur. When communicating the associated risk to senior management the risk practitioner should explain:
Which of the following BEST indicates the risk appetite and tolerance level (or the risk associated with business interruption caused by IT system failures?
Which of the following is the PRIMARY factor in determining a recovery time objective (RTO)?
Which of the following is the PRIMARY reason to perform periodic vendor risk assessments?
The following is the snapshot of a recently approved IT risk register maintained by an organization's information security department.
After implementing countermeasures listed in ‘’Risk Response Descriptions’’ for each of the Risk IDs, which of the following component of the register MUST change?
Which of the following is the PRIMARY reason for a risk practitioner to review an organization's IT asset inventory?
When classifying and prioritizing risk responses, the areas to address FIRST are those with:
The acceptance of control costs that exceed risk exposure MOST likely demonstrates:
A risk practitioner is performing a risk assessment of recent external advancements in quantum computing. Which of the following would pose the GREATEST concern for the risk practitioner?
The BEST way to mitigate the high cost of retrieving electronic evidence associated with potential litigation is to implement policies and procedures for:
Which of the following BEST supports ethical IT risk management practices?
Which component of a software inventory BEST enables the identification and mitigation of known vulnerabilities?
Which of the following would BEST support the integrity of online financial transactions?
In the three lines of defense model, a PRIMARY objective of the second line is to:
Which of the following is the MOST important objective from a cost perspective for considering aggregated risk responses in an organization?
An organization outsources the processing of us payroll data A risk practitioner identifies a control weakness at the third party trial exposes the payroll data. Who should own this risk?
Which of the following would be the BEST recommendation if the level of risk in the IT risk profile has decreased and is now below management's risk appetite?
Upon learning that the number of failed backup attempts continually exceeds
the current risk threshold, the risk practitioner should:
Which of the following should be of MOST concern to a risk practitioner reviewing an organization risk register after the completion of a series of risk assessments?
An organization has updated its acceptable use policy to mitigate the risk of employees disclosing confidential information. Which of the following is the BEST way to reinforce the effectiveness of this policy?
A PRIMARY function of the risk register is to provide supporting information for the development of an organization's risk:
Which of the following observations from a third-party service provider review would be of GREATEST concern to a risk practitioner?
Which of the following would be a risk practitioners’ BEST recommendation for preventing cyber intrusion?
Which of the following is the GREATEST benefit of analyzing logs collected from different systems?
Which of the following is MOST important to identify when developing top-down risk scenarios?
Which of the following is the BEST approach when a risk practitioner has been asked by a business unit manager for special consideration during a risk assessment of a system?
Which of the following is the MOST important reason to link an effective key control indicator (KCI) to relevant key risk indicators (KRIs)?
A large organization needs to report risk at all levels for a new centralized visualization project to reduce cost and improve performance. Which of the following would MOST effectively represent the overall risk of the project to senior management?
Which group has PRIMARY ownership of reputational risk stemming from unethical behavior within the organization?
Which of the following is MOST important for effective communication of a risk profile to relevant stakeholders?
Which of the following is the PRIMARY advantage of having a single integrated business continuity plan (BCP) rather than each business unit developing its own BCP?
Which of the following is the BEST method to maintain a common view of IT risk within an organization?
An organization has recently updated its disaster recovery plan (DRP). Which of the following would be the GREATEST risk if the new plan is not tested?
Which of the following provides the MOST insight into an organization's IT threat exposure?
Which of the following would BEST enable mitigation of newly identified risk factors related to internet of Things (loT)?
Which of me following is MOST helpful to mitigate the risk associated with an application under development not meeting business objectives?
Who is PRIMARILY accountable for identifying risk on a daily basis and ensuring adherence to the organization's policies?
An organization recently implemented a machine learning-based solution to monitor IT usage and analyze user behavior in an effort to detect internal fraud. Which of the following is MOST likely to be reassessed as a result of this initiative?
Which of the following provides the MOST comprehensive information when developing a risk profile for a system?
Which of the following is a risk practitioner's BEST course of action if a risk assessment identifies a risk that is extremely unlikely but would have a severe impact should it occur?
A business is conducting a proof of concept on a vendor’s AI technology. Which of the following is the MOST important consideration for managing risk?
Which of the following would cause the GREATEST concern for a risk practitioner reviewing the IT risk scenarios recorded in an organization’s IT risk register?
Which of the following BEST indicates that risk management is embedded into the responsibilities of all employees?
Which of the following is the MOST important criteria for selecting key risk indicators (KRIs)?
Which of the following is a crucial component of a key risk indicator (KRI) to ensure appropriate action is taken to mitigate risk?
Which of the following is the MOST important information to cover in a business continuity awareness training program for all employees of the organization?
Which of the following is the MOST useful input when developing risk scenarios?
A risk practitioner has been notified of a social engineering attack using artificial intelligence (Al) technology to impersonate senior management personnel. Which of the following would BEST mitigate the impact of such attacks?
Quantifying the value of a single asset helps the organization to understand the:
What is the BEST approach for determining the inherent risk of a scenario when the actual likelihood of the risk is unknown?
Which of the following is the PRIMARY reason to have the risk management process reviewed by a third party?
Risk acceptance of an exception to a security control would MOST likely be justified when:
Which of the following would BEST assist in reconstructing the sequence of events following a security incident across multiple IT systems in the organization's network?
Which of the following is MOST useful when performing a quantitative risk assessment?
An IT risk practitioner has determined that mitigation activities differ from an approved risk action plan. Which of the following is the risk practitioner's BEST course of action?
A cloud service provider has completed upgrades to its cloud infrastructure to enhance service availability. Which of the following is the MOST important key risk indicator (KRI) for management to monitor?
Of the following, who is accountable for ensuing the effectiveness of a control to mitigate risk?
Which of the following is the MOST important consideration when determining the appropriate data retention period throughout the data management life cycle?
An organization is making significant changes to an application. At what point should the application risk profile be updated?
Which of the following would be a risk practitioner’s GREATEST concern related to the monitoring of key risk indicators (KRIs)?
An organization has established a contract with a vendor that includes penalties for loss of availability. Which risk treatment has been adopted by the organization?
Which of the following BEST enables senior management lo compare the ratings of risk scenarios?
An organization has asked an IT risk practitioner to conduct an operational risk assessment on an initiative to outsource the organization's customer service operations overseas. Which of the following would MOST significantly impact management's decision?
Which of the following should a risk practitioner do FIRST when an organization decides to use a cloud service?
Which of the following is MOST important for developing effective key risk indicators (KRIs)?
Which of the following is a risk practitioner's BEST course of action upon learning that a control under internal review may no longer be necessary?
Which of the following is the BEST way to maintain a current list of organizational risk scenarios?
Which of the following would be the BEST justification to invest in the development of a governance, risk, and compliance (GRC) solution?
Which of the following is the MOST effective way to help ensure accountability for managing risk?
Which of the following is the BEST course of action when risk is found to be above the acceptable risk appetite?
Which of the following should be included in a risk assessment report to BEST facilitate senior management's understanding of the results?
Which of the following BEST enables senior management to make risk treatment decisions in line with the organization's risk appetite?
A risk action plan has been changed during the risk mitigation effort. Which of the following is MOST important for the risk practitioner to verify?
Which of the following is MOST important for maintaining the effectiveness of an IT risk register?
An internally developed payroll application leverages Platform as a Service (PaaS) infrastructure from the cloud. Who owns the related data confidentiality risk?
The head of a business operations department asks to review the entire IT risk register. Which of the following would be the risk manager s BEST approach to this request before sharing the register?
The PRIMARY benefit associated with key risk indicators (KRls) is that they:
Which of the following actions should a risk practitioner do NEXT when an increased industry trend of external cyber attacks is identified?
An organization's recovery team is attempting to recover critical data backups following a major flood in its data center. However, key team members do not know exactly what steps should be taken to address this crisis. Which of the following is the MOST likely cause of this situation?
Which of the following will BEST help ensure that risk factors identified during an information systems review are addressed?
The PRIMARY objective of testing the effectiveness of a new control before implementation is to:
The BEST way to obtain senior management support for investment in a control implementation would be to articulate the reduction in:
Which of the following BEST indicates the efficiency of a process for granting access privileges?
Which of the following is the MOST comprehensive resource for prioritizing the implementation of information systems controls?
Which of the following stakeholders define risk tolerance for an enterprise?
Which of the following is the MOST effective way to identify changes in the performance of the control environment?
Which of the following is the GREATEST concern when using artificial intelligence (AI) language models?
An organization is planning to engage a cloud-based service provider for some of its data-intensive business processes. Which of the following is MOST important to help define the IT risk associated with this outsourcing activity?
While reviewing the risk register, a risk practitioner notices that different business units have significant variances in inherent risk for the same risk scenario. Which of the following is the BEST course of action?
A control for mitigating risk in a key business area cannot be implemented immediately. Which of the following is the risk practitioner's BEST course of action when a compensating control needs to be applied?
Which of the following risk activities is BEST facilitated by enterprise architecture (EA)?
An organization has just started accepting credit card payments from customers via the corporate website. Which of the following is MOST likely to increase as a result of this new initiative?
A business impact analysis (BIA) has documented the duration of maximum allowable outage for each of an organization's applications. Which of the following MUST be aligned with the maximum allowable outage?
Which of the following BEST indicates whether security awareness training is effective?
Management has noticed storage costs have increased exponentially over the last 10 years because most users do not delete their emails. Which of the following can BEST alleviate this issue while not sacrificing security?
To reduce the risk introduced when conducting penetration tests, the BEST mitigating control would be to:
Which of the following will help ensure the elective decision-making of an IT risk management committee?
An organization delegates its data processing to the internal IT team to manage information through its applications. Which of the following is the role of the internal IT team in this situation?
Which of the following BEST represents a critical threshold value for a key control indicator (KCI)?
A newly incorporated enterprise needs to secure its information assets From a governance perspective which of the following should be done FIRST?
Which of the following is MOST important to have in place to ensure the effectiveness of risk and security metrics reporting?
Which of the following is the BEST indicator of the effectiveness of a control?
Whether the results of risk analyses should be presented in quantitative or qualitative terms should be based PRIMARILY on the:
An organization is planning to move its application infrastructure from on-premises to the cloud. Which of the following is the BEST course of the actin to address the risk associated with data transfer if the relationship is terminated with the vendor?
Which of the following activities is a responsibility of the second line of defense?
Which of the following should be used as the PRIMARY basis for evaluating the state of an organization's cloud computing environment against leading practices?
An organization's financial analysis department uses an in-house forecasting application for business projections. Who is responsible for defining access roles to protect the sensitive data within this application?
Which of the following is the MOST critical consideration when awarding a project to a third-party service provider whose servers are located offshore?
What are the MOST important criteria to consider when developing a data classification scheme to facilitate risk assessment and the prioritization of risk mitigation activities?
Which of the following provides the BEST indication that existing controls are effective?
A key performance indicator (KPI) shows that a process is operating inefficiently, even though no control issues were noted during the most recent risk assessment. Which of the following should be done FIRST?
When performing a risk assessment of a new service to support a core business process, which of the following should be done FIRST to ensure continuity of operations?
An organization is reviewing a contract for a Software as a Service (SaaS) sales application with a 99.9% uptime service level agreement (SLA). Which of the following BEST describes ownership of availability risk?
An organization recently implemented a cybersecurity awareness program that includes phishing simul-ation exercises for all employees. What type of control is being utilized?
Which of the following is the GREATEST risk associated with an environment that lacks documentation of the architecture?
Which of the following is MOST important to the effectiveness of key performance indicators (KPIs)?
Which of the following is the MOST important document regarding the treatment of sensitive data?
Which of the following would MOST effectively enable a business operations manager to identify events exceeding risk thresholds?
The BEST key performance indicator (KPI) to measure the effectiveness of a vulnerability remediation program is the number of:
Which of the following is the BEST way to protect sensitive data from administrators within a public cloud?
Which of the following practices would be MOST effective in protecting personality identifiable information (Ptl) from unauthorized access m a cloud environment?
Which of the following is MOST important for an organization to update following a change in legislation requiring notification to individuals impacted by data breaches?
Which of the following would BEST facilitate the implementation of data classification requirements?
Which of the following is the MOST relevant information to include in a risk management strategy?
Which of the following should be a risk practitioner's NEXT step upon learning the impact of an organization's noncompliance with a specific legal regulation?
During which phase of the system development life cycle (SDLC) should information security requirements for the implementation of a new IT system be defined?
An insurance company handling sensitive and personal information from its customers receives a large volume of telephone requests and electronic communications daily. Which of the following
is MOST important to include in a risk awareness training session for the customer service department?
Which of the following criteria for assigning owners to IT risk scenarios provides the GREATEST benefit to an organization?
Which of the following roles should be assigned accountability for monitoring risk levels?
Which of the following should be a risk practitioner's NEXT step after learning of an incident that has affected a competitor?
To minimize risk in a software development project, when is the BEST time to conduct a risk analysis?
Which of the following is the MOST important consideration for a risk practitioner when making a system implementation go-live recommendation?
The number of tickets to rework application code has significantly exceeded the established threshold. Which of the following would be the risk practitioner s BEST recommendation?
Which of the following is the MOST important reason to create risk scenarios?
Which of the following BEST assists in justifying an investment in automated controls?
Which of the following is the MOST important reason to restrict access to the risk register on a need-to-know basis?
A vulnerability assessment of a vendor-supplied solution has revealed that the software is susceptible to cross-site scripting and SQL injection attacks. Which of the following will BEST mitigate this issue?
Which of the following is the MOST important consideration for protecting data assets m a Business application system?
Which of the following provides the BEST evidence that robust risk management practices are in place within an organization?
A risk practitioner is advising management on how to update the IT policy framework to account for the organization s cloud usage. Which of the following should be the FIRST step in this process?
Which of the following should be the MAIN consideration when validating an organization's risk appetite?
Which of the following would provide the MOST objective assessment of the effectiveness of an organization's security controls?
An organization is analyzing the risk of shadow IT usage. Which of the following is the MOST important input into the assessment?
When a high-risk security breach occurs, which of the following would be MOST important to the person responsible for managing the incident?
An organization has decided to implement a new Internet of Things (loT) solution. Which of the following should be done FIRST when addressing security concerns associated with this new technology?
A business unit has implemented robotic process automation (RPA) for its
repetitive back-office tasks. Which of the following should be the risk
practitioner's GREATEST concern?
Which of the following is a risk practitioner's BEST recommendation to help reduce IT risk associated with scheduling overruns when starting a new application development project?
Which of the following is the MOST important reason to report on changes or trends related to an organization's IT risk profile?
The BEST key performance indicator (KPI) for monitoring adherence to an organization's user accounts provisioning practices is the percentage of:
when developing IT risk scenarios associated with a new line of business, which of the following would be MOST helpful to review?
An incentive program is MOST likely implemented to manage the risk associated with loss of which organizational asset?
An organization has procured a managed hosting service and just discovered the location is likely to be flooded every 20 years. Of the following, who should be notified of this new information FIRST.
To effectively address ethical risk within an organization, who MUST ensure the ethics policy is enforced and equally applied to all levels of authority'?
Which of the following is the PRIMARY reason to update a risk register with risk assessment results?
Which of the following BEST protects organizational data within a production cloud environment?
Which of the following is the BEST approach to use when creating a comprehensive set of IT risk scenarios?
From a risk management perspective, the PRIMARY objective of using maturity models is to enable:
Which of the following is the BEST way to ensure data is properly sanitized while in cloud storage?
In addition to the risk register, what should a risk practitioner review to develop an understanding of the organization's risk profile?
Which of the following provides the MOST reliable evidence to support conclusions after completing an information systems controls assessment?
A company has recently acquired a customer relationship management (CRM) application from a certified software vendor. Which of the following will BE ST help lo prevent technical vulnerabilities from being exploded?
An organization's HR department has implemented a policy requiring staff members to take a minimum of five consecutive days leave per year to mitigate the risk of malicious insideractivities. Which of the following is the BEST key performance indicator (KPI) of the effectiveness of this policy?
Which of the following presents the GREATEST concern associated with the
use of artificial intelligence (Al) systems?
A risk practitioner has collaborated with subject matter experts from the IT department to develop a large list of potential key risk indicators (KRIs) for all IT operations within theorganization of the following, who should review the completed list and select the appropriate KRIs for implementation?
Which of the following should be the PRIMARY basis for prioritizing risk responses?
Which of the following is the MOST important consideration when prioritizing risk response?
Which of the following is MOST useful when communicating risk to management?
Which of the following is the MOST important factor when deciding on a control to mitigate risk exposure?
Which of the following techniques would be used during a risk assessment to demonstrate to stakeholders that all known alternatives were evaluated?
To mitigate the risk of using a spreadsheet to analyze financial data, IT has engaged a third-party vendor to deploy a standard application to automate the process. Which of the following parties should own the risk associated with calculation errors?
Which of the following is the MOST important course of action for a risk practitioner when reviewing the results of control performance monitoring?
A key risk indicator (KRI) is reported to senior management on a periodic basis as exceeding thresholds, but each time senior management has decided to take no action to reduce the risk. Which of the following is the MOST likely reason for senior management's response?
Which of the following is the PRIMARY reason to aggregate risk assessment results from different business units?
Which of the following should be the PRIMARY driver for an organization on a multi-year cloud implementation to publish a cloud security policy?
Which of the following is the BEST indication that an organization's risk management program has not reached the desired maturity level?
Who should be responsible for approving the cost of controls to be implemented for mitigating risk?
Which of the following should be of GREATEST concern lo a risk practitioner reviewing the implementation of an emerging technology?
Which of the following is MOST helpful in providing an overview of an organization's risk management program?
Which of the following is MOST important when considering risk in an enterprise risk management (ERM) process?
Which of the following should be implemented to BEST mitigate the risk associated with infrastructure updates?
A newly hired risk practitioner finds that the risk register has not been updated in the past year. What is the risk practitioner's BEST course of action?
Which of the following would be MOST helpful when communicating roles associated with the IT risk management process?
The BEST way to determine the likelihood of a system availability risk scenario is by assessing the:
Which of the following provides the BEST evidence that risk responses have been executed according to their risk action plans?
An IT control gap has been identified in a key process. Who would be the MOST appropriate owner of the risk associated with this gap?
Which of the following is the BEST criterion to determine whether higher residual risk ratings in the risk register should be accepted?
Which of the following is the PRIMARY objective of a risk awareness program?
An organization has agreed to a 99% availability for its online services and will not accept availability that falls below 98.5%. This is an example of:
Which of the following is the MOST useful information for a risk practitioner when planning response activities after risk identification?
What would be the MAIN concern associated with a decentralized IT function maintaining multiple risk registers?
As pan of business continuity planning, which of the following is MOST important to include m a business impact analysis (BlA)?
Which of the following should be the PRIMARY focus of an IT risk awareness program?
Which of the following should be determined FIRST when a new security vulnerability is made public?
The MOST essential content to include in an IT risk awareness program is how to:
Which of the following is the PRIMARY benefit of using a risk map with stakeholders?
When a risk practitioner is building a key risk indicator (KRI) from aggregated data, it is CRITICAL that the data is derived from:
Which of the following would BEST enable a risk-based decision when considering the use of an emerging technology for data processing?
A risk assessment has revealed that the probability of a successful cybersecurity attack is increasing. The potential loss could exceed the organization's risk appetite. Which of the following ould be the MOST effective course of action?
Which of the following is MOST helpful in preventing risk events from materializing?
The purpose of requiring source code escrow in a contractual agreement is to:
Winch of the following key control indicators (KCIs) BEST indicates whether security requirements are identified and managed throughout a project He cycle?
Which of the following is the BEST method to identify unnecessary controls?
Which of the following tools is MOST effective in identifying trends in the IT risk profile?
An organization automatically approves exceptions to security policies on a recurring basis. This practice is MOST likely the result of:
A cote data center went offline abruptly for several hours affecting many transactions across multiple locations. Which of the to" owing would provide the MOST useful information to determine mitigating controls?
Which of the following risk scenarios should be considered in a disaster recovery plan (DRP)?
Within the three lines of defense model, the accountability for the system of internal control resides with:
Which of the following is the GREATEST concern associated with the use of artificial intelligence (AI) language models?
Which of the following is the MAIN benefit to an organization using key risk indicators (KRIs)?
Which of the following is the MOST important data source for monitoring key risk indicators (KRIs)?
Which of the following resources is MOST helpful when creating a manageable set of IT risk scenarios?
Which of the following is the MAIN reason for documenting the performance of controls?
Which of the following is MOST important for a risk practitioner to update when a software upgrade renders an existing key control ineffective?
An organization has opened a subsidiary in a foreign country. Which of the following would be the BEST way to measure the effectiveness of the subsidiary's IT systems controls?
A risk practitioner's BEST guidance to help an organization develop relevant risk scenarios is to ensure the scenarios are:
Which of the following will be the GREATEST concern when assessing the risk profile of an organization?
A risk practitioner wants to identify potential risk events that affect the continuity of a critical business process. Which of the following should the risk practitioner do FIRST?
Which of the following would be MOST helpful to a risk owner when making risk-aware decisions?
Which of the following BEST indicates that an organization has implemented IT performance requirements?
A risk practitioner is reviewing the status of an action plan to mitigate an emerging IT risk and finds the risk level has increased. The BEST course of action would be to:
A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?
Which of the following will BEST help to ensure new IT policies address the enterprise's requirements?
Which of the following is MOST likely to cause a key risk indicator (KRI) to exceed thresholds?
An organization is outsourcing a key database to be hosted by an external service provider. Who is BEST suited to assess the impact of potential data loss?
Which of the following is the BEST way to validate the results of a vulnerability assessment?
A multinational organization is considering implementing standard background checks to' all new employees A KEY concern regarding this approach
The PRIMARY goal of conducting a business impact analysis (BIA) as part of an overall continuity planning process is to:
A chief risk officer (CRO) has asked to have the IT risk register integrated into the enterprise risk management (ERM) process. Which of the following will BEST facilitate the reporting of IT risk at the enterprise level?
Which of the following is MOST important to consider when determining the risk associated with re-identification of obfuscated personal data?
Which of the following is the BEST evidence that a user account has been properly authorized?
Which of the following provides the BEST evidence of the effectiveness of an organization's account provisioning process?
Which of the following BEST supports the management of identified risk scenarios?
An identified high probability risk scenario involving a critical, proprietary business function has an annualized cost of control higher than the annual loss expectancy. Which of the following is the BEST risk response?
Which of the following is the PRIMARY responsibility of the first line of defense related to computer-enabled fraud?
Which types of controls are BEST used to minimize the risk associated with a vulnerability?
Which of the following is MOST important for mitigating ethical risk when establishing accountability for control ownership?
Which of the following is the BEST course of action to help reduce the probability of an incident recurring?
Which of the following BEST protects an organization against breaches when using a software as a service (SaaS) application?
Which of the following is the MOST important characteristic of an effective risk management program?
A risk practitioner is organizing a training session lo communicate risk assessment methodologies to ensure a consistent risk view within the organization Which of the following i< the MOST important topic to cover in this training?
An organization has been notified that a disgruntled, terminated IT administrator has tried to break into the corporate network. Which of the following discoveries should be of GREATEST concern to the organization?
Of the following, whose input is ESSENTIAL when developing risk scenarios for the implementation of a third-party mobile application that stores customer data?
Print jobs containing confidential information are sent to a shared network printer located in a secure room. Which of the following is the BEST control to prevent the inappropriate disclosure of confidential information?
Which of the following events is MOST likely to trigger the need to conduct a risk assessment?
A risk practitioner implemented a process to notify management of emergency changes that may not be approved. Which of the following is the BEST way to provide this information to management?
To implement the MOST effective monitoring of key risk indicators (KRIs), which of the following needs to be in place?
An organization that has been the subject of multiple social engineering attacks is developing a risk awareness program. The PRIMARY goal of this program should be to:
Which of the following is MOST important for successful incident response?
Which of the following is the MOST critical factor to consider when determining an organization's risk appetite?
Which of the following is the MOST significant benefit of using quantitative risk analysis instead of qualitative risk analysis?
Which of the following MOST effectively limits the impact of a ransomware attack?
An organization has restructured its business processes, and the business continuity plan (BCP) needs to be revised accordingly. Which of the following should be identified FIRST?
An information security audit identified a risk resulting from the failure of an automated control Who is responsible for ensuring the risk register is updated accordingly?
While reviewing a contract of a cloud services vendor, it was discovered that the vendor refuses to accept liability for a sensitive data breach. Which of the following controls will BES reduce the risk associated with such a data breach?
Which of the following is the MOST important concern when assigning multiple risk owners for an identified risk?
Which of the following is the GREATEST benefit when enterprise risk management (ERM) provides oversight of IT risk management?
Which of the following is the PRIMARY reason for logging in a production database environment?
Which of the following will BEST help to ensure key risk indicators (KRIs) provide value to risk owners?
Which of the following is the MOST important outcome of reviewing the risk management process?
Which of the following is the MOST important consideration when sharing risk management updates with executive management?
Which of the following should be of GREATEST concern to a risk practitioner reviewing an organization's disaster recovery plan (DRP)?
A risk practitioner has observed that there is an increasing trend of users sending sensitive information by email without using encryption. Which of the following would be the MOST effective approach to mitigate the risk associated with data loss?
Which of the following is the BEST way to determine the ongoing efficiency of control processes?
Mitigating technology risk to acceptable levels should be based PRIMARILY upon:
A risk practitioners PRIMARY focus when validating a risk response action plan should be that risk response:
Which of the following BEST enables risk-based decision making in support of a business continuity plan (BCP)?
Which of the following would BEST help an enterprise define and communicate its risk appetite?
A risk practitioner has become aware of production data being used in a test environment. Which of the following should be the practitioner's PRIMARY concern?
Which of the following is a risk practitioner's BEST course of action when a control is not meeting agreed-upon performance criteria?
Which of the following shortcomings of perimeter security does Zero Trust aim to resolve?
Which of the following BEST enables risk mitigation associated with software licensing noncompliance?
Which of the following is the BEST way to detect zero-day malware on an end user's workstation?
Which of the following is the PRIMARY reason for an organization to ensure the risk register is updated regularly?
After undertaking a risk assessment of a production system, the MOST appropriate action is fcr the risk manager to
Which of the following should be the PRIMARY consideration for a startup organization that has decided to adopt externally-sourced security policies?
Which of the following stakeholders are typically included as part of a line of defense within the three lines of defense model?
A bank has outsourced its statement printing function to an external service provider. Which of the following is the MOST critical requirement to include in the contract?
To enable effective integration of IT risk scenarios and enterprise risk management (ERM), it is MOST important to have a consistent approach to reporting:
Which of the following provides the MOST helpful information in identifying risk in an organization?
To define the risk management strategy which of the following MUST be set by the board of directors?
The PRIMARY objective of the board of directors periodically reviewing the risk profile is to help ensure:
Which of the following is the BEST method of creating risk awareness in an organization?
Which of the following is the MOST important benefit of implementing a data classification program?
Which of the following will BEST help to ensure implementation of corrective action plans?
Which of the following is MOST likely to be identified from an information systems audit report?
Which of the following should be management's PRIMARY focus when key risk indicators (KRIs) begin to rapidly approach defined thresholds?
An IT risk practitioner has been asked to regularly report on the overall status and effectiveness of the IT risk management program. Which of the following is MOST useful for this purpose?
Which of the following will BEST ensure that information security risk factors are mitigated when developing in-house applications?
Which of the following would be the BEST key performance indicator (KPI) for monitoring the effectiveness of the IT asset management process?
Which of the following is the BEST method for assessing control effectiveness?
Which of the following IT key risk indicators (KRIs) provides management with the BEST feedback on IT capacity?
An IT risk practitioner is evaluating an organization's change management controls over the last six months. The GREATEST concern would be an increase in:
In addition to the risk exposure, which of the following is MOST important for senior management to understand prior to approving the use of artificial intelligence (Al) solutions?
Which of the following is the BEST way to ensure adequate resources will be allocated to manage identified risk?
Which of the following poses the GREATEST risk to an organization's operations during a major it transformation?
Which of the following is the BEST recommendation to address recent IT risk trends that indicate social engineering attempts are increasing in the organization?
Which of the following is MOST important to consider when assessing the likelihood that a recently discovered software vulnerability will be exploited?
Which of the following elements of a risk register is MOST likely to change as a result of change in management's risk appetite?
A segregation of duties control was found to be ineffective because it did not account for all applicable functions when evaluating access. Who is responsible for ensuring the control is designed to effectively address risk?
Recent penetration testing of an organization's software has identified many different types of security risks. Which of the following is the MOST likely root cause for the identified risk?
An organization has decided to implement an emerging technology and incorporate the new capabilities into its strategic business plan. Business operations for the technology will be outsourced. What will be the risk practitioner's PRIMARY role during the change?
An organization's Internet-facing server was successfully attacked because the server did not have the latest security patches. The risk associated with poor patch management had been documented in the risk register and accepted. Who should be accountable for any related losses to the organization?
Which of the following is the ULTIMATE objective of utilizing key control indicators (KCIs) in the risk management process?
Which of the following is the MOST important key performance indicator (KPI) to establish in the service level agreement (SLA) for an outsourced data center?
Which of the following is the MOST important consideration when performing a risk assessment of a fire suppression system within a data center?
Which of the following is the PRIMARY reason to conduct risk assessments at periodic intervals?
Which of the following would be MOST helpful in assessing the risk associated with data loss due to human vulnerabilities?
A risk practitioner is performing a risk assessment of recent external advancements in quantum computing. Which of the following would pose the GREATEST concern for the risk practitioner?
An organization is adopting block chain for a new financial system. Which of the following should be the GREATEST concern for a risk practitioner evaluating the system's production readiness?
Which of the following is MOST important when creating a program to reduce ethical risk?
Which of the following BEST indicates that security requirements have been incorporated into the system development life cycle (SDLC)?
Which of the following would BEST help to ensure that suspicious network activity is identified?
A legacy application used for a critical business function relies on software that has reached the end of extended support Which of the following is the MOST effective control to manage this application?
A new policy has been published to forbid copying of data onto removable media. Which type of control has been implemented?
Which of the following is the BEST approach for selecting controls to minimize risk?
An organization moved its payroll system to a Software as a Service (SaaS) application. A new data privacy regulation stipulates that data can only be processed within the countrywhere it is collected. Which of the following should be done FIRST when addressing this situation?
A key risk indicator (KRI) indicates a reduction in the percentage of appropriately patched servers. Which of the following is the risk practitioner's BEST course of action?
Which of the following provides the MOST important information to facilitate a risk response decision?