Because of a potential data breach, an organization has decided to temporarily shut down its online sales order system until sufficient controls can be implemented. Which risk treatment has been selected?
Which of the following should be done FIRST when developing an initial set of risk scenarios for an organization?
An organization has built up its cash reserves and has now become financially able to support additional risk while meeting its objectives. What is this change MOST likely to impact?
Which of the following is the MOST important for an organization to have in place to ensure IT asset protection?
Which of the following situations would cause the GREATEST concern around the integrity of application logs?
Which of the following, who should be PRIMARILY responsible for performing user entitlement reviews?
Which of the following is the GREATEST concern when establishing key risk indicators (KRIs)?
A risk practitioner is performing a risk assessment of recent external advancements in quantum computing. Which of the following would pose the GREATEST concern for the risk practitioner?
Performing a background check on a new employee candidate before hiring is an example of what type of control?
After undertaking a risk assessment of a production system, the MOST appropriate action is fcr the risk manager to
Which of the following provides the MOST reliable evidence to support conclusions after completing an information systems controls assessment?
An organization has experienced a cyber-attack that exposed customer personally identifiable information (Pll) and caused extended outages of network services. Which of the following stakeholders are MOST important to include in the cyber response team to determine response actions?
An effective control environment is BEST indicated by controls that:
Which of the following is the MOST important information to be communicated during security awareness training?
Which of the following would be considered a vulnerability?
A highly regulated organization acquired a medical technology startup company that processes sensitive personal information with weak data protection controls. Which of the following is the BEST way for the acquiring company to reduce its risk while still enabling the flexibility needed by the startup company?
Which of the following would be MOST useful to senior management when determining an appropriate risk response?
The analysis of which of the following will BEST help validate whether suspicious network activity is malicious?
Which of the following is MOST important to consider when developing an organization's risk management strategy?
An organizations chief technology officer (CTO) has decided to accept the risk associated with the potential loss from a denial-of-service (DoS) attack. In this situation, the risk practitioner's BEST course of action is to:
Which of the following BEST enables an organization to address risk associated with technical complexity?
Senior management has asked the risk practitioner for the overall residual risk level for a process that contains numerous risk scenarios. Which of the following should be provided?
The MOST important characteristic of an organization s policies is to reflect the organization's:
Reviewing which of the following BEST helps an organization gam insight into its overall risk profile''
Which of the following will BEST ensure that information security risk factors are mitigated when developing in-house applications?
Which of the following is MOST important for an organization to have in place to identify unauthorized devices on the network?
To mitigate the risk of using a spreadsheet to analyze financial data, IT has engaged a third-party vendor to deploy a standard application to automate the process. Which of the following parties should own the risk associated with calculation errors?
Which of the following will BEST mitigate the risk associated with IT and business misalignment?
Which of the following is MOST important for the organization to consider before implementing a new in-house developed artificial intelligence (Al) solution?
Which of the following is the BEST indicator of the effectiveness of a control action plan's implementation?
Which of the following is MOST important to review when an organization needs to transition the majority of its employees to remote work during a crisis?
Which of the following is the GREATEST concern associated with business end users developing their own applications on end user spreadsheets and database programs?
A risk practitioner is advising management on how to update the IT policy framework to account for the organization s cloud usage. Which of the following should be the FIRST step in this process?
An external security audit has reported multiple findings related to control noncompliance. Which of the following would be MOST important for the risk practitioner to communicate to senior management?
A cote data center went offline abruptly for several hours affecting many transactions across multiple locations. Which of the to" owing would provide the MOST useful information to determine mitigating controls?
A chief information officer (CIO) has identified risk associated with shadow systems being maintained by business units to address specific functionality gaps in the organization'senterprise resource planning (ERP) system. What is the BEST way to reduce this risk going forward?
An IT risk practitioner has been asked to regularly report on the overall status and effectiveness of the IT risk management program. Which of the following is MOST useful for this purpose?
A risk practitioner notices that a particular key risk indicator (KRI) has remained below its established trigger point for an extended period of time. Which of the following should be done FIRST?
An organization's risk tolerance should be defined and approved by which of the following?
Who is PRIMARILY accountable for risk treatment decisions?
Which of the following is MOST useful for measuring the existing risk management process against a desired state?
After the review of a risk record, internal audit questioned why the risk was lowered from medium to low. Which of the following is the BEST course of action in responding to this inquiry?
Which of the following is the PRIMARY purpose of a risk register?
An organization recently implemented a cybersecurity awareness program that includes phishing simul-ation exercises for all employees. What type of control is being utilized?
A recently purchased IT application does not meet project requirements. Of the following, who is accountable for the potential impact?
Which of the following is the BEST evidence that risk management is driving business decisions in an organization?
Which of the following will be MOST effective in uniquely identifying the originator of electronic transactions?
Which of the following should be of GREATEST concern when reviewing the results of an independent control assessment to determine the effectiveness of a vendor's control environment?
Which of the following is the MOST important consideration when sharing risk management updates with executive management?
Which of the following should be the PRIMARY consideration when assessing the risk of using Internet of Things (loT) devices to collect and process personally identifiable information (Pll)?