Which of the following is the MOST important update for keeping the risk register current?
An organization wants to transfer risk by purchasing cyber insurance. Which of the following would be MOST important for the risk practitioner to communicate to senior management for contract negotiation purposes?
Which of the following is MOST important when identifying an organization's risk exposure associated with Internet of Things (loT) devices?
Which of the following is the GREATEST risk of relying on artificial intelligence (Al) within heuristic security systems?
Which of the following will BEST support management repotting on risk?
Which of the following is the MOST important reason to communicate risk assessments to senior management?
Which of the following BEST helps to ensure disaster recovery staff members
are able to complete their assigned tasks effectively during a disaster?
A bank wants to send a critical payment order via email to one of its offshore branches. Which of the following is the BEST way to ensure the message reaches the intended recipient without alteration?
An organization is adopting block chain for a new financial system. Which of the following should be the GREATEST concern for a risk practitioner evaluating the system's production readiness?
Which of the following should an organization perform to forecast the effects of a disaster?
A risk practitioner observed Vial a high number of pokey exceptions were approved by senior management. Which of the following is the risk practitioner’s BEST course of action to determine root cause?
Which of the following is MOST helpful to facilitate the decision of recovery priorities in a disaster situation?
Which of the following controls BEST helps to ensure that transaction data reaches its destination?
A risk practitioners PRIMARY focus when validating a risk response action plan should be that risk response:
Which of the following is the MOST important reason to validate that risk responses have been executed as outlined in the risk response plan''
A risk practitioner has recently become aware of unauthorized use of confidential personal information within the organization. Which of the following should the risk practitioner do FIRST?
Which of the following will help ensure the elective decision-making of an IT risk management committee?
Which of the following BEST balances the costs and benefits of managing IT risk*?
How does an organization benefit by purchasing cyber theft insurance?
A newly incorporated enterprise needs to secure its information assets From a governance perspective which of the following should be done FIRST?
Which of the following is the PRIMARY benefit of using a risk map with stakeholders?
The purpose of requiring source code escrow in a contractual agreement is to:
Which of the following is the GREATEST benefit of updating the risk register to include outcomes from a risk assessment?
The PRIMARY reason for tracking the status of risk mitigation plans is to ensure:
Which of the following controls would BEST reduce the likelihood of a successful network attack through social engineering?
Which of the following should be the PRIMARY basis for establishing a priority sequence when restoring business processes after a disruption?
Which of the following roles would be MOST helpful in providing a high-level view of risk related to customer data loss?
Which of the following provides the MOST comprehensive information when developing a risk profile for a system?
Which of the following is the BEST approach for determining whether a risk action plan is effective?
Which of the following is the PRIMARY reason to perform ongoing risk assessments?
Which of the following provides the MOST helpful information in identifying risk in an organization?
Which of the following is the MOST important consideration when determining the appropriate data retention period throughout the data management life cycle?
Which of the following is MOST important to add to the risk register for a remediated risk scenario?
A recent regulatory requirement has the potential to affect an organization's use of a third party to supply outsourced business services. Which of the following is the BEST course of action?
Which of the following would BEST prevent an unscheduled application of a patch?
When performing a risk assessment of a new service to support a ewe Business process. which of the following should be done FRST10 ensure continuity of operations?
Which of the following would MOST effectively protect financial records from ransomware attacks?
Which of the following is MOST important requirement to include in a Software as a Service (SaaS) vendor contract to ensure data is protected?
Which of the following is the GREATEST benefit of involving business owners in risk scenario development?
Which of the following should a risk practitioner recommend FIRST when an increasing trend of risk events and subsequent losses has been identified?
It is MOST important that security controls for a new system be documented in:
Which of the following is a risk practitioner's BEST recommendation upon learning that an employee inadvertently disclosed sensitive data to a vendor?
A risk practitioner has observed that there is an increasing trend of users sending sensitive information by email without using encryption. Which of the following would be the MOST effective approach to mitigate the risk associated with data loss?
The MOST important reason for implementing change control procedures is to ensure:
A risk practitioner has been notified that an employee sent an email in error containing customers' personally identifiable information (Pll). Which of the following is the risk practitioner's BEST course of action?
An organization's IT department wants to complete a proof of concept (POC) for a security tool. The project lead has asked for approval to use the production data for testing purposes as it will yield the best results. Which of the following is the risk practitioner's BEST recommendation?
A risk heat map is MOST commonly used as part of an IT risk analysis to facilitate risk:
An IT department has organized training sessions to improve user awareness of organizational information security policies. Which of the following is the BEST key performance indicator (KPI) to reflect effectiveness of the training?
Which of the following should be used as the PRIMARY basis for evaluating the state of an organization's cloud computing environment against leading practices?