An application development team has a backlog of user requirements for a new system that will process insurance claim payments for customers. Which of the following should be the MOST important consideration for a risk-based review of the user requirements?
Who should be responsible for determining which stakeholders need to be involved in the development of a risk scenario?
The MAIN purpose of having a documented risk profile is to:
A failure in an organization’s IT system build process has resulted in several computers on the network missing the corporate endpoint detection and response (EDR) software. Which of the following should be the risk practitioner's IMMEDIATE concern?
Which of the following would be the BEST recommendation if the level of risk in the IT risk profile has decreased and is now below management's risk appetite?
A financial institution has identified high risk of fraud in several business applications. Which of the following controls will BEST help reduce the risk of fraudulent internal transactions?
An organization is preparing to transfer a large number of customer service representatives to the sales department. Of the following, who is responsible for mitigating the risk associated with residual system access?
Which of the following would be MOST helpful when estimating the likelihood of negative events?
Which of the following is MOST important to the effectiveness of a senior oversight committee for risk monitoring?
Which of the following is the PRIMARY reason for a risk practitioner to review an organization's IT asset inventory?
A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?
Risk management strategies are PRIMARILY adopted to:
Which of the following is the BEST way to determine software license compliance?
A risk practitioner has been asked to propose a risk acceptance framework for an organization. Which of the following is the MOST important consideration for the risk practitioner to address in the framework?
When developing a risk awareness training program, which of the following is the BEST way to promote a risk-aware culture?
Which of the following should be the PRIMARY driver for an organization on a multi-year cloud implementation to publish a cloud security policy?
When establishing leading indicators for the information security incident response process it is MOST important to consider the percentage of reported incidents:
An IT operations team implements disaster recovery controls based on decisions from application owners regarding the level of resiliency needed. Who is the risk owner in this scenario?
Which of the following is the MOST effective way to integrate business risk management with IT operations?
A risk practitioner is MOST likely to use a SWOT analysis to assist with which risk process?
Which of the following BEST prevents unauthorized access to customer personal data transmitted to third-party service providers?
Which of the following risk scenarios would be the GREATEST concern as a result of a single sign-on implementation?
A public online information security training course is available to an organization's staff. The online course contains free-form discussion fields. Which of the following should be of MOST concern to the organization's risk practitioner?
Which of the following BEST enables senior management to make risk treatment decisions in line with the organization's risk appetite?
Which of the following is the MOST important information to cover a business continuity awareness Ira nine, program for all employees of the organization?
The PRIMARY benefit of selecting an appropriate set of key risk indicators (KRIs) is that they:
Which of the following is MOST important for an organization to update following a change in legislation requiring notification to individuals impacted by data breaches?
When reviewing a report on the performance of control processes, it is MOST important to verify whether the:
Which of the following offers the SIMPLEST overview of changes in an organization's risk profile?
A business is conducting a proof of concept on a vendor's Al technology. Which of the following is the MOST important consideration for managing risk?
When establishing an enterprise IT risk management program, it is MOST important to:
Which of the following would BEST help an enterprise prioritize risk scenarios?
Which of the following BEST reduces the likelihood of fraudulent activity that occurs through use of a digital wallet?
Which of the following would be of GREATEST assistance when justifying investment in risk response strategies?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a vulnerability management process?
Effective risk communication BEST benefits an organization by:
Which of the following is the PRIMARY reason for a risk practitioner to report changes and trends in the IT risk profile to senior management?
A risk practitioner is assisting with the preparation of a report on the organization s disaster recovery (DR) capabilities. Which information would have the MOST impact on the overall recovery profile?
Which of the following is the BEST evidence that a user account has been properly authorized?
The PRIMARY benefit of using a maturity model is that it helps to evaluate the:
Which of the following controls BEST addresses the risk of unauthorized disclosure of sensitive data as a result of a lost bring your own device (BYOD) tablet?
Which of the following is a PRIMARY objective of privacy impact assessments (PIAs)?
Which of the following BEST indicates that an organizations risk management program is effective?