After mapping generic risk scenarios to organizational security policies, the NEXT course of action should be to:
Which of the following is the BEST way to address a board's concern about the organization's current cybersecurity posture?
Which of the following is a risk practitioner's MOST important course of action after learning that an organization's industry peers have experienced an increase in ransomware attacks?
When updating the risk register after a risk assessment, which of the following is MOST important to include?
A risk practitioner is concerned with potential data loss in the event of a breach at a hosted third-party provider. Which of the following is the BEST way to mitigate this risk?
Which of the following is the BEST way to determine whether system settings are in alignment with control baselines?
The PRIMARY benefit of classifying information assets is that it helps to:
Which of the following BEST protects organizational data within a production cloud environment?
A business unit is implementing a data analytics platform to enhance its customer relationship management (CRM) system primarily to process data that has been provided by its customers. Which of the following presents the GREATEST risk to the organization's reputation?
When developing a risk awareness training program, which of the following training topics would BEST facilitate a thorough understanding of risk scenarios?
Which of the following is the GREATEST concern when using a generic set of IT risk scenarios for risk analysis?
When classifying and prioritizing risk responses, the areas to address FIRST are those with:
Which of the following BEST indicates that additional or improved controls ate needed m the environment?
Which of the following is the MOST effective way 10 identify an application backdoor prior to implementation'?
An organization has been notified that a disgruntled, terminated IT administrator has tried to break into the corporate network. Which of the following discoveries should be of GREATEST concern to the organization?
During a control review, the control owner states that an existing control has deteriorated over time. What is the BEST recommendation to the control owner?
Senior management has requested a risk practitioner's guidance on whether
a new technical control requested by a business unit is worth the investment.
Which of the following should be the MOST important consideration before
providing input?
The MOST important objective of information security controls is to:
Which of the following is MOST helpful in verifying that the implementation of a risk mitigation control has been completed as intended?
Which of the following is performed after a risk assessment is completed?
Risk acceptance of an exception to a security control would MOST likely be justified when:
An organization is implementing internet of Things (loT) technology to control temperature and lighting in its headquarters. Which of the following should be of GREATEST concern?
Which of the following is the MOST appropriate key risk indicator (KRI) for backup media that is recycled monthly?
Which of the following is MOST important to consider when determining the risk associated with re-identification of obfuscated personal data?
Which of the following will BEST help to ensure implementation of corrective action plans?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of IT policies? The number of:
Which of the following is the MOST important consideration when multiple risk practitioners capture risk scenarios in a single risk register?
it was determined that replication of a critical database used by two business units failed. Which of the following should be of GREATEST concern1?
Which of the following provides the BEST evidence that a selected risk treatment plan is effective?
Which of the following is the GREATEST risk associated with the use of data analytics?
When a risk practitioner is determining a system's criticality. it is MOST helpful to review the associated:
Which of the following is MOST important when developing risk scenarios?
Which of the following is MOST helpful in preventing risk events from materializing?
Senior management has requested more information regarding the risk associated with introducing a new application into the environment. Which of the following should be done FIRST?
When testing the security of an IT system, il is MOST important to ensure that;
An organization's recovery team is attempting to recover critical data backups following a major flood in its data center. However, key team members do not know exactly what steps should be taken to address this crisis. Which of the following is the MOST likely cause of this situation?
Which of the following is the BEST method for assessing control effectiveness?
Which of the following is the BEST way to determine the ongoing efficiency of control processes?
A poster has been displayed in a data center that reads. "Anyone caught taking photographs in the data center may be subject to disciplinary action." Which of the following control types has been implemented?
Which of the following is the PRIMARY reason for monitoring activities performed in a production database environment?
Who is BEST suited to determine whether a new control properly mitigates data loss risk within a system?
An IT risk practitioner has been tasked to engage key stakeholders to assess risk for key IT risk scenarios. Which of the following is the PRIMARY benefit of this activity?
Which of the following aspects of an IT risk and control self-assessment would be MOST important to include in a report to senior management?
Which of the following is the BEST indication of an improved risk-aware culture following the implementation of a security awareness training program for all employees?
An IT department has provided a shared drive for personnel to store information to which all employees have access. Which of the following parties is accountable for the risk of potential loss of confidential information?
Which of the following should be initiated when a high number of noncompliant conditions are observed during review of a control procedure?
Which of the following is the MOST effective way to validate organizational awareness of cybersecurity risk?
Of the following, who is accountable for ensuing the effectiveness of a control to mitigate risk?
After migrating a key financial system to a new provider, it was discovered that a developer could gain access to the production environment. Which of the following is the BEST way to mitigate the risk in this situation?
The MOST important reason to monitor key risk indicators (KRIs) is to help management: