Following an acquisition, the acquiring company's risk practitioner has been asked to update the organization's IT risk profile What is the MOST important information to review from the acquired company to facilitate this task?
Which of the following is MOST helpful to understand the consequences of an IT risk event?
Which of the following is the GREATEST concern associated with insufficient focus on addressing blockchain interoperability in the SDLC?
A root because analysis indicates a major service disruption due to a lack of competency of newly hired IT system administrators Who should be accountable for resolving the situation?
An organization's decision to remain noncompliant with certain laws or regulations is MOST likely influenced by:
A chief risk officer (CRO) has asked to have the IT risk register integrated into the enterprise risk management (ERM) process. Which of the following will BEST facilitate the reporting of IT risk at the enterprise level?
Which of the following is MOST important when determining risk appetite?
Which of the following is the BEST indication of a potential threat?
A risk practitioner is concerned with potential data loss in the event of a breach at a hosted third-party provider. Which of the following is the BEST way to mitigate this risk?
The PRIMARY purpose of a maturity model is to compare the:
Which of the following process controls BEST mitigates the risk of an employee issuing fraudulent payments to a vendor?
When establishing leading indicators for the information security incident response process it is MOST important to consider the percentage of reported incidents:
During which phase of the system development life cycle (SDLC) should information security requirements for the implementation of a new IT system be defined?
Which of the following methods is an example of risk mitigation?
An IT department has provided a shared drive for personnel to store information to which all employees have access. Which of the following parties is accountable for the risk of potential loss of confidential information?
Which of the following would be the BEST justification to invest in the development of a governance, risk, and compliance (GRC) solution?
Which of the following is the GREATEST concern when an organization uses a managed security service provider as a firewall administrator?
An organization has established a contract with a vendor that includes penalties for loss of availability. Which risk treatment has been adopted by the organization?
A recent internal risk review reveals the majority of core IT application recovery time objectives (RTOs) have exceeded the maximum time defined by the business application owners. Which of the following is MOST likely to change as a result?
An application owner has specified the acceptable downtime in the event of an incident to be much lower than the actual time required for the response team to recover the application. Which of the following should be the NEXT course of action?
An organization has identified a risk exposure due to weak technical controls in a newly implemented HR system. The risk practitioner is documenting the risk in the risk register. The risk should be owned by the:
Which of the following should be a risk practitioner's NEXT step after learning of an incident that has affected a competitor?
Which of the following would be MOST relevant to stakeholders regarding ineffective control implementation?
Which of the following is the GREATEST risk associated with an environment that lacks documentation of the architecture?
An organization plans to implement a new Software as a Service (SaaS) speech-to-text solution Which of the following is MOST important to mitigate risk associated with data privacy?
Who is BEST suited to determine whether a new control properly mitigates data loss risk within a system?
Real-time monitoring of security cameras implemented within a retail store is an example of which type of control?
Which of the following outcomes of disaster recovery planning is MOST important to enable the initiation of necessary actions during a disaster?
Which of the following would qualify as a key performance indicator (KPI)?
Which of the following is the MOST important reason for a risk practitioner to continuously monitor a critical security transformation program?
Which of the following information is MOST useful to a risk practitioner for developing IT risk scenarios?
Which of the following is the BEST way for an organization to enable risk treatment decisions?
An organization has outsourced its ERP application to an external SaaS provider. Which of the following provides the MOST useful information to identify risk scenarios involving data loss?
An organization mandates the escalation of a service ticket when a key application is offline for 5 minutes or more due to potential risk exposure. The risk practitioner has been asked by management to prepare a report of application offline times using both 3- and 5-minute thresholds. What does the 3-minute threshold represent?
Which of the following would provide the MOST comprehensive information for communicating current levels of IT-related risk to executive management?
Which of the following is the MOST important reason to revisit a previously accepted risk?
Which of the following should be a risk practitioner’s MOST important consideration when developing IT risk scenarios?
Which key performance indicator (KPI) BEST measures the effectiveness of an organization's disaster recovery program?
Which of the following provides the MOST useful information to assess the magnitude of identified deficiencies in the IT control environment?
Which of the following provides the MOST useful information to trace the impact of aggregated risk across an organization's technical environment?
A risk practitioner shares the results of a vulnerability assessment for a critical business application with the business manager. Which of the following is the NEXT step?
Which of the following should be the PRIMARY focus of an IT risk awareness program?
An IT risk practitioner is evaluating an organization's change management controls over the last six months. The GREATEST concern would be an increase in:
After entering a large number of low-risk scenarios into the risk register, it is MOST important for the risk practitioner to:
When reporting to senior management on changes in trends related to IT risk, which of the following is MOST important?
Which of the following statements describes the relationship between key risk indicators (KRIs) and key control indicators (KCIs)?
Several newly identified risk scenarios are being integrated into an organization's risk register. The MOST appropriate risk owner would be the individual who:
Which of the following would BEST facilitate the implementation of data classification requirements?
Which of the following should be the FIRST consideration when a business unit wants to use personal information for a purpose other than for which it was originally collected?
Which of the following is MOST important to include in a Software as a Service (SaaS) vendor agreement?