IT management has asked for a consolidated view into the organization's risk profile to enable project prioritization and resource allocation. Which of the following materials would
be MOST helpful?
Which of the following is the BEST way to reduce the likelihood of an individual performing a potentially harmful action as the result of unnecessary entitlement?
Which of the following is MOST effective against external threats to an organizations confidential information?
Which of the following is the MOST effective way for a large and diversified organization to minimize risk associated with unauthorized software on company devices?
Which of the following is the MOST important reason to link an effective key control indicator (KCI) to relevant key risk indicators (KRIs)?
Which of the following controls will BEST mitigate risk associated with excessive access privileges?
Which of the following presents the GREATEST challenge to managing an organization's end-user devices?
When testing the security of an IT system, il is MOST important to ensure that;
The MAIN purpose of selecting a risk response is to.
An organization's Internet-facing server was successfully attacked because the server did not have the latest security patches. The risk associated with poor patch management had been documented in the risk register and accepted. Who should be accountable for any related losses to the organization?
An organization has completed a risk assessment of one of its service providers. Who should be accountable for ensuring that risk responses are implemented?
Which of the following is the PRIMARY role of a data custodian in the risk management process?
Which of the following is the PRIMARY reason to use key control indicators (KCIs) to evaluate control operating effectiveness?
The PRIMARY benefit of conducting continuous monitoring of access controls is the ability to identify:
Which of the following is the MOST significant benefit of using quantitative risk analysis instead of qualitative risk analysis?
An organization has identified that terminated employee accounts are not disabled or deleted within the time required by corporate policy. Unsure of the reason, the organization has decided to monitor the situation for three months to obtain more information. As a result of this decision, the risk has been:
Which of the following is the BEST way to validate the results of a vulnerability assessment?
Which of the following is the MOST important key risk indicator (KRI) to protect personal information on corporate mobile endpoints?