An organization requires a third party for processing customer personal data. Which of the following is the BEST approach when sharing data over a public network?
Following a significant change to a business process, a risk practitioner believes the associated risk has been reduced. The risk practitioner should advise the risk owner to FIRST
A risk practitioner notes control design changes when comparing risk response to a previously approved action plan. Which of the following is MOST important for the practitioner to confirm?
Winch of the following is the BEST evidence of an effective risk treatment plan?
Which of the following provides the MOST useful information to determine risk exposure following control implementations?
A risk practitioner is organizing risk awareness training for senior management. Which of the following is the MOST important topic to cover in the training session?
Which of the following is the BEST criterion to determine whether higher residual risk ratings in the risk register should be accepted?
Which of the following is MOST useful when communicating risk to management?
Which of the following is the MOST important objective of regularly presenting the project risk register to the project steering committee?
Following a review of a third-party vendor, it is MOST important for an organization to ensure:
A zero-day vulnerability has been discovered in a globally used brand of hardware server that allows hackers to gain
access to affected IT systems. Which of the following is MOST likely to change as a result of this situation?
A risk assessment has revealed that the probability of a successful cybersecurity attack is increasing. The potential loss could exceed the organization's risk appetite. Which of the following ould be the MOST effective course of action?
To help ensure the success of a major IT project, it is MOST important to:
An organization's risk register contains a large volume of risk scenarios that senior management considers overwhelming. Which of the following would BEST help to improve the risk register?
Which of the following shortcomings of perimeter security does Zero Trust aim to resolve?
Which of the following is the PRIMARY reason that risk management is important in project management?
Which of the following provides the BEST evidence that risk responses have been executed according to their risk action plans?
Which of the following is MOST important when developing key risk indicators (KRIs)?
What should be the PRIMARY consideration related to data privacy protection when there are plans for a business initiative to make use of personal information?
What is the MOST important consideration when selecting key performance indicators (KPIs) for control monitoring?
Which of the following situations presents the GREATEST challenge to creating a comprehensive IT risk profile of an organization?
Which of the following would provide the MOST useful input when evaluating the appropriateness of risk responses?
When communicating changes in the IT risk profile, which of the following should be included to BEST enable stakeholder decision making?
Which of the following is the MOST important consideration for prioritizing risk treatment plans when faced with budget limitations?
The MAJOR reason to classify information assets is
Which of the following situations would BEST justify escalation to senior management?
An unauthorized individual has socially engineered entry into an organization's secured physical premises. Which of the following is the BEST way to prevent future occurrences?
Which of the following would be of GREATEST concern regarding an organization's asset management?
Who is the BEST person to the employee personal data?
Which of the following BEST supports the integration of IT risk management into an organization's strategic planning?
Which of the following is the BEST approach when a risk practitioner has been asked by a business unit manager to exclude an in-scope system from a risk assessment?
An organization delegates its data processing to the internal IT team to manage information through its applications. Which of the following is the role of the internal IT team in this situation?
Which of the following information is MOST useful to a risk practitioner for developing IT risk scenarios?
Implementing which of the following will BEST help ensure that systems comply with an established baseline before deployment?
During implementation of an intrusion detection system (IDS) to monitor network traffic, a high number of alerts is reported. The risk practitioner should recommend to:
Which of the following would offer the MOST insight with regard to an organization's risk culture?
A new software package that could help mitigate risk in an organization has become available. Which of the following is the risk practitioner's BEST course of action?
The MOST essential content to include in an IT risk awareness program is how to:
Which of the following analyses is MOST useful for prioritizing risk scenarios associated with loss of IT assets?
Which of the following is the GREATEST concern associated with the transmission of healthcare data across the internet?
While conducting an organization-wide risk assessment, it is noted that many of the information security policies have not changed in the past three years. The BEST course of action is to:
Which of the following BEST enables the timely detection of changes in the security control environment?
Which of the following should be the PRIMARY area of focus when reporting changes to an organization's risk profile to executive management?
A trusted third-party service provider has determined that the risk of a client's systems being hacked is low. Which of the following would be the client's BEST course of action?
Which of the following is the PRIMARY objective for automating controls?
What is the BEST approach for determining the inherent risk of a scenario when the actual likelihood of the risk is unknown?
The PRIMARY advantage of involving end users in continuity planning is that they:
A key risk indicator (KRI) threshold has reached the alert level, indicating data leakage incidents are highly probable. What should be the risk practitioner's FIRST course of action?
Which of the following would MOST effectively reduce risk associated with an increase of online transactions on a retailer website?
Which of the following is the MOST important key risk indicator (KRI) to protect personal information on corporate mobile endpoints?