Which of the following would be MOST beneficial as a key risk indicator (KRI)?
Which of the following will BEST help to ensure new IT policies address the enterprise's requirements?
Which of the following is the MOST important element of a successful risk awareness training program?
A user has contacted the risk practitioner regarding malware spreading laterally across the organization's corporate network. Which of the following is the risk practitioner’s BEST course of action?
Which of the following is the BEST reason to use qualitative measures to express residual risk levels related to emerging threats?
When defining thresholds for control key performance indicators (KPIs). it is MOST helpful to align:
Which of the following roles should be assigned accountability for monitoring risk levels?
Which of the following is the BEST way to mitigate the risk associated with fraudulent use of an enterprise's brand on Internet sites?
Who is MOST important lo include in the assessment of existing IT risk scenarios?
Which of the following data would be used when performing a business impact analysis (BIA)?
The acceptance of control costs that exceed risk exposure MOST likely demonstrates:
A vendor’s planned maintenance schedule will cause a critical application to temporarily lose failover capabilities. Of the following, who should approve this proposed schedule?
How should an organization approach the retention of data that is no longer needed for business operations?
An organization has identified the need to implement an asset tiering model to establish the appropriate level of impact. Which of the following is the MOST effective risk assessment methodology for a risk practitioner to use for this initiative?
During the risk assessment of an organization that processes credit cards, a number of existing controls have been found to be ineffective and do not meet industry standards. The overall control environment may still be effective if:
Which of the following is the PRIMARY benefit of integrating risk and security requirements in an organization's enterprise architecture (EA)?
Who is accountable for authorizing application access in a cloud Software as a Service (SaaS) solution?
The BEST way to demonstrate alignment of the risk profile with business objectives is through:
In an organization that allows employee use of social media accounts for work purposes, which of the following is the BEST way to protect company sensitive information from being exposed?
Which of the following BEST helps to ensure disaster recovery staff members
are able to complete their assigned tasks effectively during a disaster?
Which of the following is the PRIMARY benefit of using an entry in the risk register to track the aggregate risk associated with server failure?
Which of the following will MOST likely change as a result of the decrease in risk appetite due to a new privacy regulation?
When performing a risk assessment of a new service to support a core business process, which of the following should be done FIRST to ensure continuity of operations?
After an annual risk assessment is completed, which of the following would be MOST important to communicate to stakeholders?
Which of the following BEST facilitates the identification of emerging risk?
Which of the following is the MAIN benefit of involving stakeholders in the selection of key risk indicators (KRIs)?
Which of the following is MOST important to include in a risk assessment of an emerging technology?
An organization has outsourced its billing function to an external service provider. Who should own the risk of customer data leakage caused by the service provider?
Which of the following is the BEST way for a risk practitioner to help management prioritize risk response?
Which of the following observations from a third-party service provider review would be of GREATEST concern to a risk practitioner?
A newly hired risk practitioner finds that the risk register has not been updated in the past year. What is the risk practitioner's BEST course of action?
Which of the following should be the PRIMARY input when designing IT controls?
Which of the following BEST enables the development of a successful IT strategy focused on business risk mitigation?
Risk mitigation procedures should include:
Which of the following is the PRIMARY concern for a risk practitioner regarding an organization's adoption of innovative big data analytics capabilities?
Which of the following would be MOST helpful when estimating the likelihood of negative events?
Which of the following BEST enables senior management lo compare the ratings of risk scenarios?
Which of the following is MOST important to update following a change in organizational risk appetite and tolerance?
Which of the following is the MOST important document regarding the treatment of sensitive data?
Which of the following is the PRIMARY purpose of creating and documenting control procedures?
Which of the following is MOST important for a risk practitioner to understand about an organization in order to create an effective risk
awareness program?
Who is the BEST person to the employee personal data?
An effective control environment is BEST indicated by controls that:
Which of the following is the BEST key control indicator (KCI) for a vulnerability management program?
A risk practitioner is utilizing a risk heat map during a risk assessment. Risk events that are coded with the same color will have a similar:
Which of the following describes the relationship between Key risk indicators (KRIs) and key control indicators (KCIS)?
Which of the following is a crucial component of a key risk indicator (KRI) to ensure appropriate action is taken to mitigate risk?
Which of the following is the FIRST step when conducting a business impact analysis (BIA)?
An organization has determined that risk is not being adequately tracked and
managed due to a distributed operating model. Which of the following is the
BEST way to address this issue?
A control owner responsible for the access management process has developed a machine learning model to automatically identify excessive access privileges. What is the risk practitioner's BEST course of action?