During a control review, the control owner states that an existing control has deteriorated over time. What is the BEST recommendation to the control owner?
A risk practitioner has observed that there is an increasing trend of users sending sensitive information by email without using encryption. Which of the following would be the MOST effective approach to mitigate the risk associated with data loss?
Which of the following is the PRIMARY reason to ensure software engineers test patches before release to the production environment?
In a public company, which group is PRIMARILY accountable for ensuring sufficient attention and resources are applied to the risk management process?
Reviewing historical risk events is MOST useful for which of the following processes within the risk management life cycle?
The MAIN purpose of having a documented risk profile is to:
Which of the following BEST facilitates the development of relevant risk scenarios?
A risk assessment has identified increased losses associated with an IT risk scenario. It is MOST important for the risk practitioner to:
Which of the following is MOST commonly compared against the risk appetite?
Which of the following is MOST helpful in identifying new risk exposures due to changes in the business environment?
Which of the following is the MOST appropriate action when a tolerance threshold is exceeded?
An organization has contracted with a cloud service provider to support the deployment of a new product. Of the following, who should own the associated risk?
All business units within an organization have the same risk response plan for creating local disaster recovery plans. In an effort to achieve cost effectiveness, the BEST course of action would be to:
Which of the following is the MOST important consideration for prioritizing risk treatment plans when faced with budget limitations?
Which of the following should be the MOST important consideration for senior management when developing a risk response strategy?
An organization's stakeholders are unable to agree on appropriate risk responses. Which of the following would be the BEST course of action?
Which of the following is the PRIMARY reason for a risk practitioner to use global standards related to risk management?
Which of the following situations reflects residual risk?
A risk assessment has revealed that the probability of a successful cybersecurity attack is increasing. The potential loss could exceed the organization's risk appetite. Which of the following ould be the MOST effective course of action?
Which of the following is the MOST effective way to reduce potential losses due to ongoing expense fraud?
What should be the PRIMARY consideration related to data privacy protection when there are plans for a business initiative to make use of personal information?
An organization's risk tolerance should be defined and approved by which of the following?
An organization with a large number of applications wants to establish a security risk assessment program. Which of the following would provide the MOST useful information when determining the frequency of risk assessments?
An organization has adopted an emerging technology without following proper processes. Which of the following is the risk practitioner's BEST course of action to address this risk?
Which of the following BEST facilitates the identification of appropriate key performance indicators (KPIs) for a risk management program?
Which of the following would be MOST useful to senior management when determining an appropriate risk response?
Which of the following is the MOST important consideration for protecting data assets m a Business application system?
An organization wants to grant remote access to a system containing sensitive data to an overseas third party. Which of the following should be of GREATEST concern to management?
An organization is planning to acquire a new financial system. Which of the following stakeholders would provide the MOST relevant information for analyzing the risk associated with the new IT solution?
Which of the following roles is PRIMARILY accountable for risk associated with business information protection?
Which of these documents is MOST important to request from a cloud service
provider during a vendor risk assessment?
Which of the following will be MOST effective in uniquely identifying the originator of electronic transactions?
Which of the following is the BEST metric to demonstrate the effectiveness of an organization's patch management process?
What is the PRIMARY purpose of a business impact analysis (BIA)?
Which of the following is the BEST way to determine the ongoing efficiency of control processes?
Which of the following is the MOST likely reason an organization would engage an independent reviewer to assess its IT risk management program?
The FIRST task when developing a business continuity plan should be to:
A risk practitioner identifies a database application that has been developed and implemented by the business independently of IT. Which of the following is the BEST course of action?
Which of the following is the BEST way to address IT regulatory compliance risk?
Which of the following would BEST help to address the risk associated with malicious outsiders modifying application data?
Who should be accountable for ensuring effective cybersecurity controls are established?
Which of the following should be the PRIMARY goal of developing information security metrics?
Which of the following is the GREATEST impact of implementing a risk mitigation strategy?
Which of the following provides the BEST evidence that risk mitigation plans have been implemented effectively?
Which of the following is MOST important for a risk practitioner to consider when determining the control requirements for data privacy arising from emerging technologies?
Which of the following is the GREATEST risk associated with the use of data analytics?
The BEST key performance indicator (KPI) to measure the effectiveness of a vendor risk management program is the percentage of:
The PRIMARY benefit of selecting an appropriate set of key risk indicators (KRIs) is that they:
Which of the following is the BEST metric to demonstrate the effectiveness of an organization's change management process?
When developing a risk awareness training program, which of the following is the BEST way to promote a risk-aware culture?