Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

During a control review, the control owner states that an existing control has deteriorated over time. What is the BEST recommendation to the control owner?

A.

Implement compensating controls to reduce residual risk

B.

Escalate the issue to senior management

C.

Discuss risk mitigation options with the risk owner.

D.

Certify the control after documenting the concern.

A risk practitioner has observed that there is an increasing trend of users sending sensitive information by email without using encryption. Which of the following would be the MOST effective approach to mitigate the risk associated with data loss?

A.

Implement a tool to create and distribute violation reports

B.

Raise awareness of encryption requirements for sensitive data.

C.

Block unencrypted outgoing emails which contain sensitive data.

D.

Implement a progressive disciplinary process for email violations.

Which of the following is the PRIMARY reason to ensure software engineers test patches before release to the production environment?

A.

To detect incompatibilities that might disrupt the operation

B.

To provide assurance that deployed patches have been properly authorized

C.

To understand how long it will take to deploy the patch

D.

To support availability by authorizing the release of the patch at the appropriate time

In a public company, which group is PRIMARILY accountable for ensuring sufficient attention and resources are applied to the risk management process?

A.

Board of directors

B.

Risk officers

C.

Line management

D.

Senior management

Reviewing historical risk events is MOST useful for which of the following processes within the risk management life cycle?

A.

Risk monitoring

B.

Risk mitigation

C.

Risk aggregation

D.

Risk assessment

The MAIN purpose of having a documented risk profile is to:

A.

comply with external and internal requirements.

B.

enable well-informed decision making.

C.

prioritize investment projects.

D.

keep the risk register up-to-date.

Which of the following BEST facilitates the development of relevant risk scenarios?

A.

Perform quantitative risk analysis of historical data.

B.

Adopt an industry-recognized risk framework.

C.

Use qualitative risk assessment methodologies.

D.

Conduct brainstorming sessions with key stakeholders.

A risk assessment has identified increased losses associated with an IT risk scenario. It is MOST important for the risk practitioner to:

A.

update the risk rating.

B.

reevaluate inherent risk.

C.

develop new risk scenarios.

D.

implement additional controls.

Which of the following is MOST commonly compared against the risk appetite?

A.

IT risk

B.

Inherent risk

C.

Financial risk

D.

Residual risk

Which of the following is MOST helpful in identifying new risk exposures due to changes in the business environment?

A.

Standard operating procedures

B.

SWOT analysis

C.

Industry benchmarking

D.

Control gap analysis

Which of the following is the MOST appropriate action when a tolerance threshold is exceeded?

A.

Communicate potential impact to decision makers.

B.

Research the root cause of similar incidents.

C.

Verify the response plan is adequate.

D.

Increase human resources to respond in the interim.

An organization has contracted with a cloud service provider to support the deployment of a new product. Of the following, who should own the associated risk?

A.

The head of enterprise architecture (EA)

B.

The IT risk manager

C.

The information security manager

D.

The product owner

All business units within an organization have the same risk response plan for creating local disaster recovery plans. In an effort to achieve cost effectiveness, the BEST course of action would be to:

A.

select a provider to standardize the disaster recovery plans.

B.

outsource disaster recovery to an external provider.

C.

centralize the risk response function at the enterprise level.

D.

evaluate opportunities to combine disaster recovery plans.

Which of the following is the MOST important consideration for prioritizing risk treatment plans when faced with budget limitations?

A.

Inherent risk and likelihood

B.

Management action plans associated with audit findings

C.

Residual risk relative to appetite and tolerance

D.

Key risk indicator (KRI) trends

Which of the following should be the MOST important consideration for senior management when developing a risk response strategy?

A.

Cost of controls

B.

Risk tolerance

C.

Risk appetite

D.

Probability definition

An organization's stakeholders are unable to agree on appropriate risk responses. Which of the following would be the BEST course of action?

A.

Escalate to senior management.

B.

Identify a risk transfer option.

C.

Reassess risk scenarios.

D.

Benchmark with similar industries.

Which of the following is the PRIMARY reason for a risk practitioner to use global standards related to risk management?

A.

To build an organizational risk-aware culture

B.

To continuously improve risk management processes

C.

To comply with legal and regulatory requirements

D.

To identify gaps in risk management practices

Which of the following situations reflects residual risk?

A.

Risk that is present before risk acceptance has been finalized

B.

Risk that is removed after a risk acceptance has been finalized

C.

Risk that is present before mitigation controls have been applied

D.

Risk that remains after mitigation controls have been applied

A risk assessment has revealed that the probability of a successful cybersecurity attack is increasing. The potential loss could exceed the organization's risk appetite. Which of the following ould be the MOST effective course of action?

A.

Re-evaluate the organization's risk appetite.

B.

Outsource the cybersecurity function.

C.

Purchase cybersecurity insurance.

D.

Review cybersecurity incident response procedures.

Which of the following is the MOST effective way to reduce potential losses due to ongoing expense fraud?

A.

Implement user access controls

B.

Perform regular internal audits

C.

Develop and communicate fraud prevention policies

D.

Conduct fraud prevention awareness training.

What should be the PRIMARY consideration related to data privacy protection when there are plans for a business initiative to make use of personal information?

A.

Do not collect or retain data that is not needed.

B.

Redact data where possible.

C.

Limit access to the personal data.

D.

Ensure all data is encrypted at rest and during transit.

An organization's risk tolerance should be defined and approved by which of the following?

A.

The chief risk officer (CRO)

B.

The board of directors

C.

The chief executive officer (CEO)

D.

The chief information officer (CIO)

An organization with a large number of applications wants to establish a security risk assessment program. Which of the following would provide the MOST useful information when determining the frequency of risk assessments?

A.

Feedback from end users

B.

Results of a benchmark analysis

C.

Recommendations from internal audit

D.

Prioritization from business owners

An organization has adopted an emerging technology without following proper processes. Which of the following is the risk practitioner's BEST course of action to address this risk?

A.

Accept the risk because the technology has already been adopted.

B.

Propose a transfer of risk to a third party with subsequent monitoring.

C.

Conduct a risk assessment to determine risk exposure.

D.

Recommend to senior management to decommission the technology.

Which of the following BEST facilitates the identification of appropriate key performance indicators (KPIs) for a risk management program?

A.

Reviewing control objectives

B.

Aligning with industry best practices

C.

Consulting risk owners

D.

Evaluating KPIs in accordance with risk appetite

Which of the following would be MOST useful to senior management when determining an appropriate risk response?

A.

A comparison of current risk levels with established tolerance

B.

A comparison of cost variance with defined response strategies

C.

A comparison of current risk levels with estimated inherent risk levels

D.

A comparison of accepted risk scenarios associated with regulatory compliance

Which of the following is the MOST important consideration for protecting data assets m a Business application system?

A.

Application controls are aligned with data classification lutes

B.

Application users are periodically trained on proper data handling practices

C.

Encrypted communication is established between applications and data servers

D.

Offsite encrypted backups are automatically created by the application

An organization wants to grant remote access to a system containing sensitive data to an overseas third party. Which of the following should be of GREATEST concern to management?

A.

Transborder data transfer restrictions

B.

Differences in regional standards

C.

Lack of monitoring over vendor activities

D.

Lack of after-hours incident management support

An organization is planning to acquire a new financial system. Which of the following stakeholders would provide the MOST relevant information for analyzing the risk associated with the new IT solution?

A.

Project sponsor

B.

Process owner

C.

Risk manager

D.

Internal auditor

Which of the following roles is PRIMARILY accountable for risk associated with business information protection?

A.

Control owner

B.

Data owner

C.

System owner

D.

Application owner

Which of these documents is MOST important to request from a cloud service

provider during a vendor risk assessment?

A.

Nondisclosure agreement (NDA)

B.

Independent audit report

C.

Business impact analysis (BIA)

D.

Service level agreement (SLA)

Which of the following will be MOST effective in uniquely identifying the originator of electronic transactions?

A.

Digital signature

B.

Edit checks

C.

Encryption

D.

Multifactor authentication

Which of the following is the BEST metric to demonstrate the effectiveness of an organization's patch management process?

A.

Average time to implement patches after vendor release

B.

Number of patches tested prior to deployment

C.

Increase in the frequency of patches deployed into production

D.

Percent of patches implemented within established timeframe

What is the PRIMARY purpose of a business impact analysis (BIA)?

A.

To determine the likelihood and impact of threats to business operations

B.

To identify important business processes in the organization

C.

To estimate resource requirements for related business processes

D.

To evaluate the priority of business operations in case of disruption

Which of the following is the BEST way to determine the ongoing efficiency of control processes?

A.

Perform annual risk assessments.

B.

Interview process owners.

C.

Review the risk register.

D.

Analyze key performance indicators (KPIs).

Which of the following is the MOST likely reason an organization would engage an independent reviewer to assess its IT risk management program?

A.

To ensure IT risk management is focused on mitigating emerging risk

B.

To confirm that IT risk assessment results are expressed in quantitative terms

C.

To evaluate threats to the organization's operations and strategy

D.

To identify gaps in the alignment of IT risk management processes and strategy

The FIRST task when developing a business continuity plan should be to:

A.

determine data backup and recovery availability at an alternate site.

B.

identify critical business functions and resources.

C.

define roles and responsibilities for implementation.

D.

identify recovery time objectives (RTOs) for critical business applications.

A risk practitioner identifies a database application that has been developed and implemented by the business independently of IT. Which of the following is the BEST course of action?

A.

Escalate the concern to senior management.

B.

Document the reasons for the exception.

C.

Include the application in IT risk assessments.

D.

Propose that the application be transferred to IT.

Which of the following is the BEST way to address IT regulatory compliance risk?

A.

Assign highest priority to remediation of related risk scenarios.

B.

Prevent acceptance of related risk scenarios.

C.

Conduct specialized business impact analyses (BIAs).

D.

Manage risk like other types of operational risk.

Which of the following would BEST help to address the risk associated with malicious outsiders modifying application data?

A.

Multi-factor authentication

B.

Role-based access controls

C.

Activation of control audits

D.

Acceptable use policies

Who should be accountable for ensuring effective cybersecurity controls are established?

A.

Risk owner

B.

Security management function

C.

IT management

D.

Enterprise risk function

Which of the following should be the PRIMARY goal of developing information security metrics?

A.

Raising security awareness

B.

Enabling continuous improvement

C.

Identifying security threats

D.

Ensuring regulatory compliance

Which of the following is the GREATEST impact of implementing a risk mitigation strategy?

A.

Improved alignment with business goals.

B.

Reduction of residual risk.

C.

Increased costs due to control implementation.

D.

Decreased overall risk appetite.

Which of the following provides the BEST evidence that risk mitigation plans have been implemented effectively?

A.

Self-assessments by process owners

B.

Mitigation plan progress reports

C.

Risk owner attestation

D.

Change in the level of residual risk

Which of the following is MOST important for a risk practitioner to consider when determining the control requirements for data privacy arising from emerging technologies?

A.

internal audit recommendations

B.

Laws and regulations

C.

Policies and procedures

D.

Standards and frameworks

Which of the following is the GREATEST risk associated with the use of data analytics?

A.

Distributed data sources

B.

Manual data extraction

C.

Incorrect data selection

D.

Excessive data volume

The BEST key performance indicator (KPI) to measure the effectiveness of a vendor risk management program is the percentage of:

A.

vendors providing risk assessments on time.

B.

vendor contracts reviewed in the past year.

C.

vendor risk mitigation action items completed on time.

D.

vendors that have reported control-related incidents.

The PRIMARY benefit of selecting an appropriate set of key risk indicators (KRIs) is that they:

A.

serve as a basis for measuring risk appetite.

B.

align with the organization's risk profile.

C.

provide a warning of emerging high-risk conditions.

D.

provide data for updating the risk register.

Which of the following is the BEST metric to demonstrate the effectiveness of an organization's change management process?

A.

Increase in the frequency of changes

B.

Percent of unauthorized changes

C.

Increase in the number of emergency changes

D.

Average time to complete changes

When developing a risk awareness training program, which of the following is the BEST way to promote a risk-aware culture?

A.

Emphasize individual responsibility for managing risk.

B.

Communicate incident escalation procedures.

C.

Illustrate methods to identify threats and vulnerabilities.

D.

Challenge the effectiveness of business processes.