Which of the following should be the risk practitioner's FIRST course of action when an organization plans to adopt a cloud computing strategy?
Which of the following actions should a risk practitioner do NEXT when an increased industry trend of external cyber attacks is identified?
To minimize risk in a software development project, when is the BEST time to conduct a risk analysis?
A large organization needs to report risk at all levels for a new centralized visualization project to reduce cost and improve performance. Which of the following would MOST effectively represent the overall risk of the project to senior management?
Which of the following is the PRIMARY purpose for ensuring senior management understands the organization’s risk universe in relation to the IT risk management program?
Which of the following criteria for assigning owners to IT risk scenarios provides the GREATEST benefit to an organization?
A highly regulated enterprise is developing a new risk management plan to specifically address legal and regulatory risk scenarios What should be done FIRST by IT governance to support this effort?
A root because analysis indicates a major service disruption due to a lack of competency of newly hired IT system administrators Who should be accountable for resolving the situation?
Which of the following BEST represents a critical threshold value for a key control indicator (KCI)?
Which of the following is MOST important to consider before determining a response to a vulnerability?
When prioritizing risk response, management should FIRST:
Which of the following would provide the MOST helpful input to develop risk scenarios associated with hosting an organization's key IT applications in a cloud environment?
Reviewing which of the following would provide the MOST useful information when preparing to evaluate the effectiveness of existing controls?
An identified high probability risk scenario involving a critical, proprietary business function has an annualized cost of control higher than the annual loss expectancy. Which of the following is the BEST risk response?
Which of the following is the MOST important objective of embedding risk management practices into the initiation phase of the project management life cycle?
Which of the following is the STRONGEST indication an organization has ethics management issues?
Which of the following BEST helps to balance the costs and benefits of managing IT risk?
The results of a risk assessment reveal risk scenarios with high impact and low likelihood of occurrence. Which of the following would be the BEST action to address these scenarios?
Which of the following would require updates to an organization's IT risk register?
The PRIMARY reason for prioritizing risk scenarios is to:
Which of the following is the BEST way to support communication of emerging risk?
To help identify high-risk situations, an organization should:
Which of the following would BEST enable a risk practitioner to embed risk management within the organization?
Which of the following is MOST important to ensure when continuously monitoring the performance of a client-facing application?
Which of the following is the GREATEST advantage of implementing a risk management program?
Which of the following BEST enables the identification of trends in risk levels?
Which of the following is the BEST key performance indicator (KPI) to measure how effectively risk management practices are embedded in the project management office (PMO)?
Print jobs containing confidential information are sent to a shared network printer located in a secure room. Which of the following is the BEST control to prevent the inappropriate disclosure of confidential information?
The maturity of an IT risk management program is MOST influenced by:
Which of the following BEST indicates the effective implementation of a risk treatment plan?
Which of the following is the MOST important topic to cover in a risk awareness training program for all staff?
A risk practitioner has been asked to evaluate a new cloud-based service to enhance an organization's access management capabilities. When is the BEST time for the risk practitioner to provide opinions on control strength?
Which of the following is a risk practitioner's MOST important course of action when the level of risk has exceeded risk tolerance?
Which of the following would present the GREATEST challenge when assigning accountability for control ownership?
An organization has outsourced its lease payment process to a service provider who lacks evidence of compliance with a necessary regulatory standard. Which risk treatment was adopted by the organization?
A risk practitioner notices a risk scenario associated with data loss at the organization's cloud provider is assigned to the provider who should the risk scenario be reassigned to.
Which of the following should be included in a risk scenario to be used for risk analysis?
Which of the following BEST indicates that an organization's disaster recovery plan (DRP) will mitigate the risk of the organization failing to recover from a major service disruption?
Which of the following is the BEST approach to mitigate the risk associated with outsourcing network management to an external vendor who will have access to sensitive information assets?
Which of the following is the MOST appropriate key control indicator (KCI) to help an organization prevent successful cyber risk events on the external-facing infrastructure?
Which of the following is the GREATEST risk associated with inappropriate classification of data?
Which of the following is the MOST important foundational element of an effective three lines of defense model for an organization?
Which of the following BEST ensures that the data feeds used by an organization are complete and accurate?
WhichT5f the following is the MOST effective way to promote organization-wide awareness of data security in response to an increase in regulatory penalties for data leakage?
Which of the following is the MOST appropriate action when a tolerance threshold is exceeded?
Which of the following BEST enables a proactive approach to minimizing the potential impact of unauthorized data disclosure?
Which of the following would BEST enable mitigation of newly identified risk factors related to internet of Things (loT)?
Which of the following is the MOST useful input when developing risk scenarios?
A risk practitioner is organizing a training session lo communicate risk assessment methodologies to ensure a consistent risk view within the organization Which of the following i< the MOST important topic to cover in this training?
Which of the following is the PRIMARY reason for managing emerging risk?