Which of the following is the PRIMARY reason to engage business unit managers in risk management processes'?
An organization recently invested in an identity and access management (IAM) solution to manage user activities across corporate mobile devices. Which of the following is MOST important to update in the risk register?
Which of the following is the BEST indication of an enhanced risk-aware culture?
A chief information officer (CIO) has identified risk associated with shadow systems being maintained by business units to address specific functionality gaps in the organization'senterprise resource planning (ERP) system. What is the BEST way to reduce this risk going forward?
Employees are repeatedly seen holding the door open for others, so that trailing employees do not have to stop and swipe their own ID badges. This behavior BEST represents:
An information security audit identified a risk resulting from the failure of an automated control Who is responsible for ensuring the risk register is updated accordingly?
Which of the following should be the PRIMARY driver for the prioritization of risk responses?
An organization has outsourced its lease payment process to a service provider who lacks evidence of compliance with a necessary regulatory standard. Which risk treatment was adopted by the organization?
Which of the following is the MOST significant indicator of the need to perform a penetration test?
Which of the following would BEST provide early warning of a high-risk condition?
An IT risk threat analysis is BEST used to establish
An organization has used generic risk scenarios to populate its risk register. Which of the following presents the GREATEST challenge to assigning of the associated risk entries?
A business unit has implemented robotic process automation (RPA) for its
repetitive back-office tasks. Which of the following should be the risk
practitioner's GREATEST concern?
Which of the following is the BEST course of action when an organization wants to reduce likelihood in order to reduce a risk level?
Which of the following BEST indicates the condition of a risk management program?
An organization is analyzing the risk of shadow IT usage. Which of the following is the MOST important input into the assessment?
Who is accountable for risk treatment?
Which of the following provides the BEST assurance of the effectiveness of vendor security controls?
Which of the following is MOST helpful in defining an early-warning threshold associated with insufficient network bandwidth’’?
A department has been granted an exception to bypass the existing approval process for purchase orders. The risk practitioner should verify the exception has been approved by which of the following?
A key risk indicator (KRI) that incorporates data from external open-source threat intelligence sources has shown changes in risk trend data. Which of the following is MOST important to update in the risk register?
The PRIMARY objective for selecting risk response options is to:
Which of the following is the MOST effective way to mitigate identified risk scenarios?
Which of the following is the MOST important characteristic of an effective risk management program?
Which of the following provides the MOST useful information when developing a risk profile for management approval?
Which of the following provides the MOST reliable evidence of a control's effectiveness?
Which of the following is MOST essential for an effective change control environment?
A risk practitioner is advising management on how to update the IT policy framework to account for the organization s cloud usage. Which of the following should be the FIRST step in this process?
A large organization is replacing its enterprise resource planning (ERP) system and has decided not to deploy the payroll module of the new system. Instead, the current payroll system will continue to be
used. Of the following, who should own the risk if the ERP and payroll system fail to operate as expected?
An organization has implemented a policy requiring staff members to take a minimum of five consecutive days' leave per year to mitigate the risk of malicious insider activities. Which of the following is the BEST key performance indicator (KPI) of the effectiveness of this policy?
Which of the following is the BEST indicator of an effective IT security awareness program?
Which of the following is the BEST course of action when risk is found to be above the acceptable risk appetite?
A control owner identifies that the organization's shared drive contains personally identifiable information (Pll) that can be accessed by all personnel. Which of the following is the MOST effective risk response?
Which of the following is the MOST important objective of embedding risk management practices into the initiation phase of the project management life cycle?
Avoiding a business activity removes the need to determine:
What is the PRIMARY reason an organization should include background checks on roles with elevated access to production as part of its hiring process?
Which of the following is an IT business owner's BEST course of action following an unexpected increase in emergency changes?
Before assigning sensitivity levels to information it is MOST important to:
Of the following, who is accountable for ensuing the effectiveness of a control to mitigate risk?
Which of the following is the MOST effective way to help ensure accountability for managing risk?
Which of the following would be of GREATEST assistance when justifying investment in risk response strategies?
A bank has outsourced its statement printing function to an external service provider. Which of the following is the MOST critical requirement to include in the contract?
The percentage of unpatched systems is a:
Which of the following is MOST important for developing effective key risk indicators (KRIs)?
A systems interruption has been traced to a personal USB device plugged into the corporate network by an IT employee who bypassed internal control procedures. Of the following, who should be accountable?
The operational risk associated with attacks on a web application should be owned by the individual in charge of:
A risk practitioner has been notified of a social engineering attack using artificial intelligence (AI) technology to impersonate senior management personnel. Which of the following would BEST mitigate the impact of such attacks?
Which of the following would be a risk practitioner'$ BEST recommendation to help ensure cyber risk is assessed and reflected in the enterprise-level risk profile?
The BEST way to obtain senior management support for investment in a control implementation would be to articulate the reduction in:
The design of procedures to prevent fraudulent transactions within an enterprise resource planning (ERP) system should be based on: