Which of the following is the BEST approach when a risk practitioner has been asked by a business unit manager for special consideration during a risk assessment of a system?
Which of the following would be the GREATEST concern for an IT risk practitioner when an employees.....
Which of the following is the MOST important key performance indicator (KPI) for monitoring the user access management process?
Which of the following BEST supports the communication of risk assessment results to stakeholders?
The effectiveness of a control has decreased. What is the MOST likely effect on the associated risk?
Which of the following is the BEST course of action to reduce risk impact?
A monthly payment report is generated from the enterprise resource planning (ERP) software to validate data against the old and new payroll systems. What is the BEST way to mitigate the risk associated with data integrity loss in the new payroll system after data migration?
Which of the following is the MOST important requirement when implementing a data loss prevention (DLP) system?
Legal and regulatory risk associated with business conducted over the Internet is driven by:
Which of the following is MOST important to the integrity of a security log?
After a risk has been identified, who is in the BEST position to select the appropriate risk treatment option?
During an internal IT audit, an active network account belonging to a former employee was identified. Which of the following is the BEST way to prevent future occurrences?
Which of the following BEST indicates the risk appetite and tolerance level (or the risk associated with business interruption caused by IT system failures?
An organization's decision to remain noncompliant with certain laws or regulations is MOST likely influenced by:
An organization recently experienced a cyber attack that resulted in the loss of confidential customer data. Which of the following is the risk practitioner's BEST recommendation after recovery steps have been completed?
An organization is considering modifying its system to enable acceptance of credit card payments. To reduce the risk of data exposure, which of the following should the organization do FIRST?
The PRIMARY objective of testing the effectiveness of a new control before implementation is to:
Risk mitigation is MOST effective when which of the following is optimized?
Which of the following should be a risk practitioner’s MOST important consideration when developing IT risk scenarios?
A risk practitioner is defining metrics for security threats that were not identified by antivirus software. Which type of metric is being developed?
Which of the following would BEST assist in reconstructing the sequence of events following a security incident across multiple IT systems in the organization's network?
Which of the following is MOST helpful in identifying new risk exposures due to changes in the business environment?
Which of the following is a risk practitioner's BEST course of action upon learning that regulatory authorities have concerns with an emerging technology the organization is considering?
Which of the following is a business asset for an organization that runs only in a Software as a Service (SaaS) cloud computing environment?
Which of the following is the PRIMARY advantage of aligning generic risk scenarios with business objectives?
Which of the following is the MOST important reason to report on changes or trends related to an organization's IT risk profile?
An organization planning to transfer and store its customer data with an offshore cloud service provider should be PRIMARILY concerned with:
An IT license audit has revealed that there are several unlicensed copies of co be to:
During the control evaluation phase of a risk assessment, it is noted that multiple controls are ineffective. Which of the following should be the risk practitioner's FIRST course of action?
During a review of the asset life cycle process, a risk practitioner identified several unreturned and unencrypted laptops belonging to former employees. Which of the following is the GREATEST concern with this finding?
An organization that has been the subject of multiple social engineering attacks is developing a risk awareness program. The PRIMARY goal of this program should be to:
Which of the following BEST enables effective IT control implementation?
Which of the following activities BEST facilitates effective risk management throughout the organization?
Well-developed, data-driven risk measurements should be:
What is MOST important for the risk practitioner to understand when creating an initial IT risk register?
Which of the following is the MOST important objective from a cost perspective for considering aggregated risk responses in an organization?
Which of the following is the MOST important consideration when selecting digital signature software?
A new regulator/ requirement imposes severe fines for data leakage involving customers' personally identifiable information (Pll). The risk practitioner has recommended avoiding the risk. Which of the following actions would BEST align with this recommendation?
Which of the following is MOST helpful in reducing the likelihood of inaccurate risk assessment results?
Which of the following is the GREATEST concern related to the monitoring of key risk indicators (KRIs)?
Which of the following is the BEST metric to demonstrate the effectiveness of an organization's patch management process?
Whose risk tolerance matters MOST when making a risk decision?
Which of the following is the BEST way to address IT regulatory compliance risk?
Which of the following events is MOST likely to trigger the need to conduct a risk assessment?
A business is conducting a proof of concept on a vendor’s AI technology. Which of the following is the MOST important consideration for managing risk?
A risk practitioner observes that hardware failure incidents have been increasing over the last few months. However, due to built-in redundancy and fault-tolerant architecture, there have been no interruptions to business operations. The risk practitioner should conclude that:
A department allows multiple users to perform maintenance on a system using a single set of credentials. A risk practitioner determined this practice to be high-risk. Which of the following is the MOST effective way to mitigate this risk?
An organization recently implemented a machine learning-based solution to monitor IT usage and analyze user behavior in an effort to detect internal fraud. Which of the following is MOST likely to be reassessed as a result of this initiative?
Which of the following is the MOST important criteria for selecting key risk indicators (KRIs)?