To define the risk management strategy which of the following MUST be set by the board of directors?
When assessing the maturity level of an organization’s risk management framework, which of the following should be of GREATEST concern to a risk practitioner?
Which of the following issues should be of GREATEST concern when evaluating existing controls during a risk assessment?
A web-based service provider with a low risk appetite for system outages is reviewing its current risk profile for online security. Which of the following observations would be MOST relevant to escalate to senior management?
Which of the following would be the BEST key performance indicator (KPI) for monitoring the effectiveness of the IT asset management process?
A risk practitioner has been made aware of a problem in an IT system that was missed during a routine risk assessment. Which of the following is the practitioner's BEST course of action?
Which of the following practices MOST effectively safeguards the processing of personal data?
Which of the following is MOST critical to the design of relevant risk scenarios?
A risk practitioner identifies a database application that has been developed and implemented by the business independently of IT. Which of the following is the BEST course of action?
Which of the following has the GREATEST positive impact on ethical compliance within the risk management process?
The MOST important reason to aggregate results from multiple risk assessments on interdependent information systems is to:
An organization plans to migrate sensitive information to a public cloud infrastructure. Which of the following is the GREATEST security risk in this scenario?
Who is ULTIMATELY accountable for the confidentiality of data in the event of a data breach within a Software as a Service (SaaS) environment?
An organization uses a web application hosted by a cloud service that is populated by data sent to the vendor via email on a monthly basis. Which of the following should be the FIRST consideration when analyzing the risk associated with the application?
Winch of the following key control indicators (KCIs) BEST indicates whether security requirements are identified and managed throughout a project He cycle?
Which of the following is the PRIMARY purpose of creating and documenting control procedures?
Which of the following would be a risk practitioner's MOST important action upon learning that an IT control has failed?
An organization's Internet-facing server was successfully attacked because the server did not have the latest security patches. The risk associated with poor patch management had been documented in the risk register and accepted. Who should be accountable for any related losses to the organization?
Which of the following is the PRIMARY reason for logging in a production database environment?
Which of the following is MOST important for a risk practitioner to consider when evaluating plans for changes to IT services?
When of the following standard operating procedure (SOP) statements BEST illustrates appropriate risk register maintenance?
An organization has provided legal text explaining the rights and expected behavior of users accessing a system from geographic locations that have strong privacy regulations. Which of the following control types has been applied?
An organization's IT infrastructure is running end-of-life software that is not allowed without exception approval. Which of the following would provide the MOST helpful information to justify investing in updated software?
Which of the following is the BEST approach for selecting controls to minimize risk?
Key risk indicators (KRIs) are MOST useful during which of the following risk management phases?
Due to a change in business processes, an identified risk scenario no longer requires mitigation. Which of the following is the MOST important reason the risk should remain in the risk register?
Zero Trust architecture is designed and deployed with adherence to which of the following basic tenets?
When determining which control deficiencies are most significant, which of the following would provide the MOST useful information?
Which of the following is the MOST important consideration when prioritizing risk response?
An organization has outsourced its ERP application to an external SaaS provider. Which of the following provides the MOST useful information to identify risk scenarios involving data loss?
Mitigating technology risk to acceptable levels should be based PRIMARILY upon:
Which of the following IT key risk indicators (KRIs) provides management with the BEST feedback on IT capacity?
A service provider is managing a client’s servers. During an audit of the service, a noncompliant control is discovered that will not be resolved before the next audit because the client cannot afford the downtime required to correct the issue. The service provider’s MOST appropriate action would be to:
A risk practitioner's BEST guidance to help an organization develop relevant risk scenarios is to ensure the scenarios are:
When of the following is the BEST key control indicator (KCI) to determine the effectiveness of en intrusion prevention system (IPS)?
What should be the PRIMARY objective for a risk practitioner performing a post-implementation review of an IT risk mitigation project?
Which of the following is the PRIMARY benefit of integrating risk and security requirements in an organization's enterprise architecture (EA)?
Which of the following would cause the GREATEST concern for a risk practitioner reviewing the IT risk scenarios recorded in an organization’s IT risk register?
An organization's risk management team wants to develop IT risk scenarios to show the impact of collecting and storing credit card information. Which of the following is the MOST comprehensive approach to capture this scenario?
Which of the following will BEST help to ensure that information system controls are effective?
Which of the following BEST indicates the condition of a risk management program?
An organization is increasingly concerned about loss of sensitive data and asks the risk practitioner to assess the current risk level. Which of the following should the risk practitioner do FIRST?
A key risk indicator (KRI) is reported to senior management on a periodic basis as exceeding thresholds, but each time senior management has decided to take no action to reduce the risk. Which of the following is the MOST likely reason for senior management's response?
A recent vulnerability assessment of a web-facing application revealed several weaknesses. Which of the following should be done NEXT to determine the risk exposure?
Which of the following is the BEST indication of an enhanced risk-aware culture?
To communicate the risk associated with IT in business terms, which of the following MUST be defined?
Which of the following is the PRIMARY reason to aggregate risk assessment results from different business units?
An organization has implemented a cloud-based backup solution to help prevent loss of transactional data from offices in an earthquake zone. This strategy demonstrates risk:
A control owner has completed a year-long project To strengthen existing controls. It is MOST important for the risk practitioner to:
An organization has outsourced its IT security operations to a third party. Who is ULTIMATELY accountable for the risk associated with the outsourced operations?