Halloween Special - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A.

Conduct targeted risk assessments.

B.

Recommend management accept the low risk scenarios.

C.

Assess management's risk tolerance.

D.

Propose mitigating controls.

An organization discovers significant vulnerabilities in a recently purchased commercial off-the-shelf software product which will not be corrected until the next release. Which of the following is the risk manager's BEST course of action?

A.

Review the risk of implementing versus postponing with stakeholders.

B.

Run vulnerability testing tools to independently verify the vulnerabilities.

C.

Review software license to determine the vendor's responsibility regarding vulnerabilities.

D.

Require the vendor to correct significant vulnerabilities prior to installation.

Which of the following would be the BEST senior management action to influence a strong risk-aware culture within an organization?

A.

Initiating disciplinary actions against individuals causing incidents

B.

Identifying the root cause of incidents

C.

Sponsoring changes to prevent recurrence of incidents

D.

Reviewing the risk register and preparing incident reports

Which of the following is the MOST useful information for a risk practitioner when planning response activities after risk identification?

A.

Risk register

B.

Risk appetite

C.

Risk priorities

D.

Risk heat maps

A risk register BEST facilitates which of the following risk management functions?

A.

Analyzing the organization's risk appetite

B.

Influencing the risk culture of the organization

C.

Reviewing relevant risk scenarios with stakeholders

D.

Articulating senior management's intent

Which of the following is a risk practitioner's MOST appropriate course of action upon learning that an organization is not compliant with its patch management policy?

A.

Document the concern in an issue tracker.

B.

Strengthen data loss prevention (DLP) controls.

C.

Apply the most recent available patches.

D.

Escalate the issue to the ethics committee.

Which of the following BEST enforces access control for an organization that uses multiple cloud technologies?

A.

Senior management support of cloud adoption strategies

B.

Creation of a cloud access risk management policy

C.

Adoption of a cloud access security broker (CASB) solution

D.

Expansion of security information and event management (SIEM) to cloud services

What is the GREATEST concern with maintaining decentralized risk registers instead of a consolidated risk register?

A.

Aggregated risk may exceed the enterprise's risk appetite and tolerance.

B.

Duplicate resources may be used to manage risk registers.

C.

Standardization of risk management practices may be difficult to enforce.

D.

Risk analysis may be inconsistent due to non-uniform impact and likelihood scales.

Optimized risk management is achieved when risk is reduced:

A.

with strategic initiatives.

B.

to meet risk appetite.

C.

within resource availability.

D.

below risk appetite.

Which of the following is the MOST important consideration when implementing ethical remote work monitoring?

A.

Monitoring is only conducted between official hours of business

B.

Employees are informed of how they are bong monitored

C.

Reporting on nonproductive employees is sent to management on a scheduled basis

D.

Multiple data monitoring sources are integrated into security incident response procedures

An organization is considering adopting artificial intelligence (AI). Which of the

following is the risk practitioner's MOST important course of action?

A.

Develop key risk indicators (KRIs).

B.

Ensure sufficient pre-implementation testing.

C.

Identify applicable risk scenarios.

D.

Identify the organization's critical data.

A peer review of a risk assessment finds that a relevant threat community was not included. Mitigation of the risk will require substantial changes to a software application. Which of the following is the BEST course of action?

A.

Ask the business to make a budget request to remediate the problem.

B.

Build a business case to remediate the fix.

C.

Research the types of attacks the threat can present.

D.

Determine the impact of the missing threat.

Which of the following is the PRIMARY purpose of conducting risk and control self-assessments?

A.

To better understand inherent and residual risk within the organization

B.

To gain objective insight into the effectiveness and efficiency of controls

C.

To demonstrate compliance with regulatory and legal control requirements

D.

To facilitate timely and accurate updates to the risk register

The PRIMARY objective for selecting risk response options is to:

A.

reduce risk 10 an acceptable level.

B.

identify compensating controls.

C.

minimize residual risk.

D.

reduce risk factors.

A.

Risk tolerance

B.

Risk velocity

C.

Risk appetite

D.

Risk capacity

The PRIMARY reason for a risk practitioner to review business processes is to:

A.

Benchmark against peer organizations.

B.

Identify appropriate controls within business processes.

C.

Assess compliance with global standards.

D.

Identify risk owners related to business processes.

Which of the following BEST indicates whether security awareness training is effective?

A.

User self-assessment

B.

User behavior after training

C.

Course evaluation

D.

Quality of training materials

Establishing and organizational code of conduct is an example of which type of control?

A.

Preventive

B.

Directive

C.

Detective

D.

Compensating

The MAIN purpose of conducting a control self-assessment (CSA) is to:

A.

gain a better understanding of the control effectiveness in the organization

B.

gain a better understanding of the risk in the organization

C.

adjust the controls prior to an external audit

D.

reduce the dependency on external audits

Which of the following should be a risk practitioner's GREATEST concern upon learning of failures in a data migration activity?

A.

Availability of test data

B.

Integrity of data

C.

Cost overruns

D.

System performance

Business management is seeking assurance from the CIO that IT has a plan in place for early identification of potential issues that could impact the delivery of a new application Which of the following is the BEST way to increase the chances of a successful delivery'?

A.

Implement a release and deployment plan

B.

Conduct comprehensive regression testing.

C.

Develop enterprise-wide key risk indicators (KRls)

D.

Include business management on a weekly risk and issues report

A segregation of duties control was found to be ineffective because it did not account for all applicable functions when evaluating access. Who is responsible for ensuring the control is designed to effectively address risk?

A.

Risk manager

B.

Control owner

C.

Control tester

D.

Risk owner

Which of the following BEST reduces the probability of laptop theft?

A.

Cable lock

B.

Acceptable use policy

C.

Data encryption

D.

Asset tag with GPS

Which of the following is a PRIMARY benefit to an organization that is using threat intelligence?

A.

Timely insight into potential threats

B.

Automated vulnerability management

C.

Accurate threat information

D.

Verification of threat information

If preventive controls cannot be Implemented due to technology limitations, which of the following should be done FIRST to reduce risk7

A.

Evaluate alternative controls.

B.

Redefine the business process to reduce the risk.

C.

Develop a plan to upgrade technology.

D.

Define a process for monitoring risk.

A company has recently acquired a customer relationship management (CRM) application from a certified software vendor. Which of the following will BE ST help lo prevent technical vulnerabilities from being exploded?

A.

implement code reviews and Quality assurance on a regular basis

B.

Verity me software agreement indemnifies the company from losses

C.

Review the source coda and error reporting of the application

D.

Update the software with the latest patches and updates

Which of the following is MOST important to ensure when reviewing an organization's risk register?

A.

Risk ownership is recorded.

B.

Vulnerabilities have separate entries.

C.

Control ownership is recorded.

D.

Residual risk is less than inherent risk.

The MAIN purpose of a risk register is to:

A.

document the risk universe of the organization.

B.

promote an understanding of risk across the organization.

C.

enable well-informed risk management decisions.

D.

identify stakeholders associated with risk scenarios.

An organization's finance team is proposing the adoption of a blockchain technology to provide a secure method for moving funds. Which of the following should the risk practitioner do FIRST?

A.

Recommend permissionless blockchain.

B.

Perform a risk assessment.

C.

Perform a business impact analysis (BIA).

D.

Recommend permissioned blockchain.

From a governance perspective, which of the following is MOST important to ensure when risk management policies are being updated to facilitate the pursuit of new opportunities?

A.

Updates align with strategic business objectives.

B.

Updates will be approved by the risk owners.

C.

Updates align with industry standards and benchmarks.

D.

Updates will be reviewed periodically to ensure compliance.

A threat intelligence team has identified an indicator of compromise related to an advanced persistent threat (APT) actor. Which of the following is the risk practitioner's BEST course of action?

A.

Review the most recent vulnerability scanning report.

B.

Determine the business criticality of the asset.

C.

Determine the adequacy of existing security controls.

D.

Review prior security incidents related to the asset.

Which of the following BEST supports an accurate asset inventory system?

A.

Asset management metrics are aligned to industry benchmarks

B.

Organizational information risk controls are continuously monitored

C.

There are defined processes in place for onboarding assets

D.

The asset management team is involved in the budgetary planning process

Which of the following is the MOST important consideration when communicating the risk associated with technology end-of-life to business owners?

A.

Cost and benefit

B.

Security and availability

C.

Maintainability and reliability

D.

Performance and productivity

Which of the following is MOST important when considering risk in an enterprise risk management (ERM) process?

A.

Financial risk is given a higher priority.

B.

Risk with strategic impact is included.

C.

Security strategy is given a higher priority.

D.

Risk identified by industry benchmarking is included.

Which of the following BEST enables a risk practitioner to enhance understanding of risk among stakeholders?

A.

Key risk indicators (KRIs)

B.

Risk scenarios

C.

Business impact analysis (BIA)

D.

Threat analysis

Which of the following is the MOST important element of a successful risk awareness training program?

A.

Customizing content for the audience

B.

Providing incentives to participants

C.

Mapping to a recognized standard

D.

Providing metrics for measurement

Numerous media reports indicate a recently discovered technical vulnerability is being actively exploited. Which of the following would be the BEST response to this scenario?

A.

Assess the vulnerability management process.

B.

Conduct a control serf-assessment.

C.

Conduct a vulnerability assessment.

D.

Reassess the inherent risk of the target.

Which key performance indicator (KPI) BEST measures the effectiveness of an organization's disaster recovery program?

A.

Number of disaster recovery scenarios identified

B.

Percentage of employees involved in the disaster recovery exercise

C.

Number of total systems recovered within the recovery point objective (RPO)

D.

Percentage of critical systems recovered within the recovery time objective (RTO)

Risk aggregation in a complex organization will be MOST successful when:

A.

using the same scales in assessing risk

B.

utilizing industry benchmarks

C.

using reliable qualitative data for risk Hems

D.

including primarily low-level risk factors

Which of the following is the BEST way to validate privileged access to database accounts?

A.

Regular reviews of privileged access

B.

Confirmation from users with privileged access

C.

Management approval of access requests

D.

Confirmation from the database administrator (DBA)

When determining risk ownership, the MAIN consideration should be:

A.

who owns the business process.

B.

the amount of residual risk.

C.

who is responsible for risk mitigation.

D.

the total cost of risk treatment.

Which of the following changes would be reflected in an organization's risk profile after the failure of a critical patch implementation?

A.

Risk appetite is decreased.

B.

Inherent risk is increased.

C.

Risk tolerance is decreased.

D.

Residual risk is increased.

Which of the following is the PRIMARY reason for an organization to include an acceptable use banner when users log in?

A.

To reduce the likelihood of insider threat

B.

To eliminate the possibility of insider threat

C.

To enable rapid discovery of insider threat

D.

To reduce the impact of insider threat

A failure in an organization s IT system build process has resulted in several computers on the network missing the corporate endpoint detection and response (EDR) software. Which of the following should be the risk practitioner’s IMMEDIATE concern?

A.

Multiple corporate build images exist.

B.

The process documentation was not updated.

C.

The IT build process was not followed.

D.

Threats are not being detected.

Which of the following is a risk practitioner's BEST recommendation to address an organization's need to secure multiple systems with limited IT resources?

A.

Apply available security patches.

B.

Schedule a penetration test.

C.

Conduct a business impact analysis (BIA)

D.

Perform a vulnerability analysis.

Which of the following is the MOST effective way lo ensure professional ethics are maintained as a core organizational value and adhered to by employees?

A.

Include professional ethics in the corporate value statement.

B.

Establish a channel for employees to report unethical behavior.

C.

Include professional ethics criteria as part of performance appraisals.

D.

Establish a code of conduct document for employees to sign.

Which of the following BEST helps to identify significant events that could impact an organization?

Vulnerability analysis

A.

Control analysis

B.

Scenario analysis

C.

Heat map analysis

A PRIMARY function of the risk register is to provide supporting information for the development of an organization's risk:

A.

strategy.

B.

profile.

C.

process.

D.

map.

An organization’s board of directors is concerned about recent data breaches in the news and wants to assess its exposure to similar scenarios. Which of the following is the BEST course of action?

A.

Evaluate the organization's existing data protection controls.

B.

Reassess the risk appetite and tolerance levels of the business.

C.

Evaluate the sensitivity of data that the business needs to handle.

D.

Review the organization’s data retention policy and regulatory requirements.

To enable effective integration of IT risk scenarios and ERM, it is MOST important to have a consistent approach to reporting:

A.

Risk impact and likelihood

B.

Risk velocity

C.

Key risk indicators (KRIs)

D.

Risk response plans and owners