An organization discovers significant vulnerabilities in a recently purchased commercial off-the-shelf software product which will not be corrected until the next release. Which of the following is the risk manager's BEST course of action?
Which of the following would be the BEST senior management action to influence a strong risk-aware culture within an organization?
Which of the following is the MOST useful information for a risk practitioner when planning response activities after risk identification?
A risk register BEST facilitates which of the following risk management functions?
Which of the following is a risk practitioner's MOST appropriate course of action upon learning that an organization is not compliant with its patch management policy?
Which of the following BEST enforces access control for an organization that uses multiple cloud technologies?
What is the GREATEST concern with maintaining decentralized risk registers instead of a consolidated risk register?
Optimized risk management is achieved when risk is reduced:
Which of the following is the MOST important consideration when implementing ethical remote work monitoring?
An organization is considering adopting artificial intelligence (AI). Which of the
following is the risk practitioner's MOST important course of action?
A peer review of a risk assessment finds that a relevant threat community was not included. Mitigation of the risk will require substantial changes to a software application. Which of the following is the BEST course of action?
Which of the following is the PRIMARY purpose of conducting risk and control self-assessments?
The PRIMARY objective for selecting risk response options is to:
The PRIMARY reason for a risk practitioner to review business processes is to:
Which of the following BEST indicates whether security awareness training is effective?
Establishing and organizational code of conduct is an example of which type of control?
The MAIN purpose of conducting a control self-assessment (CSA) is to:
Which of the following should be a risk practitioner's GREATEST concern upon learning of failures in a data migration activity?
Business management is seeking assurance from the CIO that IT has a plan in place for early identification of potential issues that could impact the delivery of a new application Which of the following is the BEST way to increase the chances of a successful delivery'?
A segregation of duties control was found to be ineffective because it did not account for all applicable functions when evaluating access. Who is responsible for ensuring the control is designed to effectively address risk?
Which of the following BEST reduces the probability of laptop theft?
Which of the following is a PRIMARY benefit to an organization that is using threat intelligence?
If preventive controls cannot be Implemented due to technology limitations, which of the following should be done FIRST to reduce risk7
A company has recently acquired a customer relationship management (CRM) application from a certified software vendor. Which of the following will BE ST help lo prevent technical vulnerabilities from being exploded?
Which of the following is MOST important to ensure when reviewing an organization's risk register?
The MAIN purpose of a risk register is to:
An organization's finance team is proposing the adoption of a blockchain technology to provide a secure method for moving funds. Which of the following should the risk practitioner do FIRST?
From a governance perspective, which of the following is MOST important to ensure when risk management policies are being updated to facilitate the pursuit of new opportunities?
A threat intelligence team has identified an indicator of compromise related to an advanced persistent threat (APT) actor. Which of the following is the risk practitioner's BEST course of action?
Which of the following BEST supports an accurate asset inventory system?
Which of the following is the MOST important consideration when communicating the risk associated with technology end-of-life to business owners?
Which of the following is MOST important when considering risk in an enterprise risk management (ERM) process?
Which of the following BEST enables a risk practitioner to enhance understanding of risk among stakeholders?
Which of the following is the MOST important element of a successful risk awareness training program?
Numerous media reports indicate a recently discovered technical vulnerability is being actively exploited. Which of the following would be the BEST response to this scenario?
Which key performance indicator (KPI) BEST measures the effectiveness of an organization's disaster recovery program?
Risk aggregation in a complex organization will be MOST successful when:
Which of the following is the BEST way to validate privileged access to database accounts?
When determining risk ownership, the MAIN consideration should be:
Which of the following changes would be reflected in an organization's risk profile after the failure of a critical patch implementation?
Which of the following is the PRIMARY reason for an organization to include an acceptable use banner when users log in?
A failure in an organization s IT system build process has resulted in several computers on the network missing the corporate endpoint detection and response (EDR) software. Which of the following should be the risk practitioner’s IMMEDIATE concern?
Which of the following is a risk practitioner's BEST recommendation to address an organization's need to secure multiple systems with limited IT resources?
Which of the following is the MOST effective way lo ensure professional ethics are maintained as a core organizational value and adhered to by employees?
Which of the following BEST helps to identify significant events that could impact an organization?
Vulnerability analysis
A PRIMARY function of the risk register is to provide supporting information for the development of an organization's risk:
An organization’s board of directors is concerned about recent data breaches in the news and wants to assess its exposure to similar scenarios. Which of the following is the BEST course of action?
To enable effective integration of IT risk scenarios and ERM, it is MOST important to have a consistent approach to reporting: