An organization has established a single enterprise-wide risk register that records high-level risk scenarios. The IT risk department has created its own register to record more granular scenarios applicable to IT. Which of the following is the BEST way to ensure alignment between these two registers?
Which of the following should be the MAIN consideration when validating an organization's risk appetite?
A risk practitioner notices a trend of noncompliance with an IT-related control. Which of the following would BEST assist in making a recommendation to management?
A threat intelligence team has identified an indicator of compromise related to an advanced persistent threat (APT) actor. Which of the following is the risk practitioner's BEST course of action?
Which of the following is a risk practitioner's MOST important course of action when the level of risk has exceeded risk tolerance?
Which of the following should be the PRIMARY input to determine risk tolerance?
Which of the following is the PRIMARY reason to conduct risk assessments at periodic intervals?
Which of the following is the MAIN benefit to an organization using key risk indicators (KRIs)?
Which of the following is the BEST approach for an organization in a heavily regulated industry to comprehensively test application functionality?
Which of the following is the BEST way to determine whether new controls mitigate security gaps in a business system?
Which of the following is the PRIMARY benefit of using a risk profile?
Which of the following would BEST mitigate the risk associated with reputational damage from inappropriate use of social media sites by employees?
Which of the following is the BEST approach when a risk practitioner has been asked by a business unit manager to exclude an in-scope system from a risk assessment?
Which of the following is the BEST control for a large organization to implement to effectively mitigate risk related to fraudulent transactions?
Which of the following provides the MOST useful information when measuring the progress of risk response action plans?
It was discovered that a service provider's administrator was accessing sensitive information without the approval of the customer in an Infrastructure as a Service (laaS) model. Which of the following would BEST protect against a future recurrence?
Which of the following BEST mitigates the risk of sensitive personal data leakage from a software development environment?
Which of the following should be the risk practitioner's FIRST course of action when an organization plans to adopt a cloud computing strategy?
Who should be responsible for implementing and maintaining security controls?
An IT risk practitioner has been asked to regularly report on the overall status and effectiveness of the IT risk management program. Which of the following is MOST useful for this purpose?
An incentive program is MOST likely implemented to manage the risk associated with loss of which organizational asset?
The implementation of a risk treatment plan will exceed the resources originally allocated for the risk response. Which of the following should be the risk owner's NEXT action?
Which of the following is the PRIMARY reason to aggregate risk assessment results from different business units?
Which of the following provides the MOST useful input to the development of realistic risk scenarios?
The MAIN purpose of reviewing a control after implementation is to validate that the control:
Which of the following is the PRIMARY benefit of identifying and communicating with stakeholders at the onset of an IT risk assessment?
An IT operations team implements disaster recovery controls based on decisions from application owners regarding the level of resiliency needed. Who is the risk owner in this scenario?
Which of the following should be included in a risk assessment report to BEST facilitate senior management's understanding of the results?
Which of the following would present the GREATEST challenge when assigning accountability for control ownership?
A hospital recently implemented a new technology to allow virtual patient appointments. Which of the following should be the risk practitioner's FIRST course of action?
Which of the following is the PRIMARY benefit of implementing key control indicators (KCIs)?
Which of the following BEST confirms the existence and operating effectiveness of information systems controls?
Which of the following is the MOST important characteristic when designing a key risk indicator (KRI)?
Key control indicators (KCls) help to assess the effectiveness of the internal control environment PRIMARILY by:
The risk appetite for an organization could be derived from which of the following?
Which of the following is the MOST important technology control to reduce the likelihood of fraudulent payments committed internally?
Which of the following should be the PRIMARY driver for an organization on a multi-year cloud implementation to publish a cloud security policy?
What is the MOST important consideration when aligning IT risk management with the enterprise risk management (ERM) framework?
When reporting on the performance of an organization's control environment including which of the following would BEST inform stakeholders risk decision-making?
The PRIMARY goal of conducting a business impact analysis (BIA) as part of an overall continuity planning process is to:
What are the MOST essential attributes of an effective Key control indicator (KCI)?
Which of the following approaches would BEST help to identify relevant risk scenarios?
Which of the following should be done FIRST when developing a data protection management plan?
An organization retains footage from its data center security camera for 30 days when the policy requires 90-day retention The business owner challenges whether the situation is worth remediating Which of the following is the risk manager s BEST response'
Which of the following is MOST important for an organization to have in place to identify unauthorized devices on the network?
Which of the blowing is MOST important when implementing an organization s security policy?
Which of the following is the MOST important requirement for monitoring key risk indicators (KRls) using log analysis?
Which of the following is MOST helpful in verifying that the implementation of a risk mitigation control has been completed as intended?
Which of the following is the PRIMARY objective of risk management?
When creating a program to manage data privacy risk, which of the following is MOST important to ensure that the program is successful?