Which of the following provides the MOST mitigation value for an organization implementing new Internet of Things (loT) devices?
A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a disaster recovery plan (DRP)?
Optimized risk management is achieved when risk is reduced:
Which of the following scenarios represents a threat?
Which of the following activities is a responsibility of the second line of defense?
Which of the following is the PRIMARY reason for an organization to ensure the risk register is updated regularly?
Which of the following is the BEST source for identifying key control indicators (KCIs)?
Which of the following is MOST likely to introduce risk for financial institutions that use blockchain?
An organization has outsourced its backup and recovery procedures to a third-party cloud provider. Which of the following is the risk practitioner s BEST course of action?
Which of the following should be accountable for ensuring that media containing financial information are adequately destroyed per an organization's data disposal policy?
An organization’s board of directors is concerned about recent data breaches in the news and wants to assess its exposure to similar scenarios. Which of the following is the BEST course of action?
Which of the following is the GREATEST benefit of having a mature enterprise architecture (EA) in place?
Which of the following BEST enables the integration of IT risk management across an organization?
Which of the following is the BEST way to prevent the loss of highly sensitive data when disposing of storage media?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of IT policies? The number of:
Which of the following is the GREATEST risk associated with inappropriate classification of data?
Which of the following should be the PRIMARY consideration when implementing controls for monitoring user activity logs?
While reviewing a contract of a cloud services vendor, it was discovered that the vendor refuses to accept liability for a sensitive data breach. Which of the following controls will BES reduce the risk associated with such a data breach?
A segregation of duties control was found to be ineffective because it did not account for all applicable functions when evaluating access. Who is responsible for ensuring the control is designed to effectively address risk?
The PRIMARY objective for requiring an independent review of an organization's IT risk management process should be to:
A new software package that could help mitigate risk in an organization has become available. Which of the following is the risk practitioner's BEST course of action?
After a risk has been identified, who is in the BEST position to select the appropriate risk treatment option?
The risk associated with an asset before controls are applied can be expressed as:
A risk practitioner has established that a particular control is working as desired, but the annual cost of maintenance has increased and now exceeds the expected annual loss exposure. The result is that the control is:
Which of the following will be the GREATEST concern when assessing the risk profile of an organization?
Which of the following is the BEST approach for selecting controls to minimize risk?
Which of the following is the PRIMARY advantage of aligning generic risk scenarios with business objectives?
The annualized loss expectancy (ALE) method of risk analysis:
Which of the following is the BEST way to identify changes in the risk profile of an organization?
In response to the threat of ransomware, an organization has implemented cybersecurity awareness activities. The risk practitioner's BEST recommendation to further reduce the impact of ransomware attacks would be to implement:
A failure in an organization’s IT system build process has resulted in several computers on the network missing the corporate endpoint detection and response (EDR) software. Which of the following should be the risk practitioner's IMMEDIATE concern?
Which of the following is the MOST important reason to create risk scenarios?
The PRIMARY reason for prioritizing risk scenarios is to:
An organization has implemented a cloud-based backup solution to help prevent loss of transactional data from offices in an earthquake zone. This strategy demonstrates risk:
A risk practitioner is reviewing the status of an action plan to mitigate an emerging IT risk and finds the risk level has increased. The BEST course of action would be to:
Where is the FIRST place a risk practitioner should look to identify accountability for a specific risk?
An internally developed payroll application leverages Platform as a Service (PaaS) infrastructure from the cloud. Who owns the related data confidentiality risk?
Which of the following is the BEST way to ensure data is properly sanitized while in cloud storage?
Which of the following is the PRIMARY accountability for a control owner?
Who is accountable for the process when an IT stakeholder operates a key control to address a risk scenario?
An audit reveals that several terminated employee accounts maintain access. Which of the following should be the FIRST step to address the risk?
To help identify high-risk situations, an organization should:
Which of the following BEST enables a risk practitioner to focus on risk factors that could potentially affect the results of an IT initiative?
When formulating a social media policy lo address information leakage, which of the following is the MOST important concern to address?
Which of the following BEST enables the identification of trends in risk levels?
Which of the following is a KEY consideration for a risk practitioner to communicate to senior management evaluating the introduction of artificial intelligence (Al) solutions into the organization?
Within the risk management space, which of the following activities could be
delegated to a cloud service provider?
Which of the following is the BEST evidence that a user account has been properly authorized?
The patch management process is MOST effectively monitored through which of the following key control indicators (KCIs)?