Which of the following should be done FIRST when information is no longer required to support business objectives?
When outsourcing a business process to a cloud service provider, it is MOST important to understand that:
An organization's risk practitioner learns a new third-party system on the corporate network has introduced vulnerabilities that could compromise corporate IT systems. What should the risk practitioner do
FIRST?
Which of the following should a risk practitioner do NEXT after learning that Internet of Things (loT) devices installed in the production environment lack appropriate security controls for
sensitive data?
Risk management strategies are PRIMARILY adopted to:
Which of the following is MOST important when developing key risk indicators (KRIs)?
Business areas within an organization have engaged various cloud service providers directly without assistance from the IT department. What should the risk practitioner do?
Which type of cloud computing deployment provides the consumer the GREATEST degree of control over the environment?
Which of the following is the BEST response when a potential IT control deficiency has been identified?
After the review of a risk record, internal audit questioned why the risk was lowered from medium to low. Which of the following is the BEST course of action in responding to this inquiry?
What should a risk practitioner do FIRST when vulnerability assessment results identify a weakness in an application?
Which of the following is MOST important for effective communication of a risk profile to relevant stakeholders?
The PRIMARY benefit of maintaining an up-to-date risk register is that it helps to:
Of the following, who should be responsible for determining the inherent risk rating of an application?
After migrating a key financial system to a new provider, it was discovered that a developer could gain access to the production environment. Which of the following is the BEST way to mitigate the risk in this situation?
Which of the following is the BEST method to track asset inventory?
Which of the following should be done FIRST upon learning that the organization will be affected by a new regulation in its industry?
Which of the following should be a risk practitioner's NEXT step upon learning the impact of an organization's noncompliance with a specific legal regulation?
Which of the following criteria is MOST important when developing a response to an attack that would compromise data?
When assessing the maturity level of an organization’s risk management framework, which of the following should be of GREATEST concern to a risk practitioner?
A financial institution has identified high risk of fraud in several business applications. Which of the following controls will BEST help reduce the risk of fraudulent internal transactions?
A risk practitioner has been asked to evaluate the adoption of a third-party blockchain integration platform based on the value added by the platform and the organization's risk appetite. Which of the following is the risk practitioner's BEST course of action?
Which of the following should be an element of the risk appetite of an organization?
Winch of the following is the BEST evidence of an effective risk treatment plan?
Analyzing trends in key control indicators (KCIs) BEST enables a risk practitioner to proactively identify impacts on an organization's:
Which of the following BEST enables detection of ethical violations committed by employees?
Which of the following BEST ensures that the data feeds used by an organization are complete and accurate?
Which of the following is the BEST recommendation to address recent IT risk trends that indicate social engineering attempts are increasing in the organization?
An organization has outsourced its IT security operations to a third party. Who is ULTIMATELY accountable for the risk associated with the outsourced operations?
A global organization is planning to collect customer behavior data through social media advertising. Which of the following is the MOST important business risk to be considered?
Which of the following is the MOST important topic to cover in a risk awareness training program for all staff?
Which of the following contributes MOST to the effective implementation of risk responses?
Which of the following is the MOST effective way to help ensure future risk levels do not exceed the organization's risk appetite?
Which of the following would provide the BEST guidance when selecting an appropriate risk treatment plan?
Which of the following would be the GREATEST challenge when implementing a corporate risk framework for a global organization?
Which of the following will BEST mitigate the risk associated with IT and business misalignment?
An organization has built up its cash reserves and has now become financially able to support additional risk while meeting its objectives. What is this change MOST likely to impact?
Which organizational role should be accountable for ensuring information assets are appropriately classified?
A recent risk workshop has identified risk owners and responses for newly identified risk scenarios. Which of the following should be the risk practitioner s NEXT step? r
Which of the following is the MOST important factor to consider when determining whether to approve a policy exception request?
Which of the following is the BEST approach to mitigate the risk associated with outsourcing network management to an external vendor who will have access to sensitive information assets?
After a business unit implemented an Internet of Things (IoT) solution, the organization became aware of an emerging risk from the interoperability of IoT devices. Which of the following should be done FIRST in response to this situation?
A risk practitioner notes control design changes when comparing risk response to a previously approved action plan. Which of the following is MOST important for the practitioner to confirm?
Which of the following is the GREATEST concern associated with the transmission of healthcare data across the internet?
Which of the following is the BEST metric to measure employee adherence to organizational security policies?
During an IT risk scenario review session, business executives question why they have been assigned ownership of IT-related risk scenarios. They feel IT risk is technical in nature and therefore should be owned by IT. Which of the following is the BEST way for the risk practitioner to address these concerns?
An organization is planning to move its application infrastructure from on-premises to the cloud. Which of the following is the BEST course of the actin to address the risk associated with data transfer if the relationship is terminated with the vendor?
Which of the following should be the PRIMARY area of focus when reporting changes to an organization's risk profile to executive management?
Which of the following is MOST helpful in preventing risk events from materializing?
The MOST important reason to aggregate results from multiple risk assessments on interdependent information systems is to: