After undertaking a risk assessment of a production system, the MOST appropriate action is for the risk manager to:
An organization has implemented a cloud-based backup solution to help prevent loss of transactional data from offices in an earthquake zone. This strategy demonstrates risk:
An organization is participating in an industry benchmarking study that involves providing customer transaction records for analysis Which of the following is the MOST important control to ensure the privacy of customer information?
Which of the following tools is MOST effective in identifying trends in the IT risk profile?
Who should be responsible for implementing and maintaining security controls?
Which of the following is MOST important for a risk practitioner to consider when evaluating plans for changes to IT services?
The MOST significant benefit of using a consistent risk ranking methodology across an organization is that it enables:
Which of the following is MOST appropriate to prevent unauthorized retrieval of confidential information stored in a business application system?
An enterprise has taken delivery of software patches that address vulnerabilities in its core business software. Prior to implementation, which of the following is the MOST important task to be performed?
A risk practitioner is reporting on an increasing trend of ransomware attacks in the industry. Which of the following information is MOST important to include to enable an informed response decision by key stakeholders?
Which of the following key performance indicators (KPis) would BEST measure me risk of a service outage when using a Software as a Service (SaaS) vendors
When assessing the maturity level of an organization’s risk management framework, which of the following should be of GREATEST concern to a risk practitioner?
A control owner responsible for the access management process has developed a machine learning model to automatically identify excessive access privileges. What is the risk practitioner's BEST course of action?
An organization has an internal control that requires all access for employees be removed within 15 days of their termination date. Which of the following should the risk practitioner use to monitor
adherence to the 15-day threshold?
A vendor's planned maintenance schedule will cause a critical application to temporarily lose failover capabilities. Of the following, who should approve this proposed schedule?
Which of the following should be the PRIMARY basis for deciding whether to disclose information related to risk events that impact external stakeholders?
A risk practitioner notes control design changes when comparing risk response to a previously approved action plan. Which of the following is MOST important for the practitioner to confirm?
Which of the following BEST facilitates the identification of appropriate key performance indicators (KPIs) for a risk management program?
Which of the following is a PRIMARY objective of privacy impact assessments (PIAs)?
An organization has decided to postpone the assessment and treatment of several risk scenarios because stakeholders are unavailable. As a result of this decision, the risk associated with these new entries has been;
A payroll manager discovers that fields in certain payroll reports have been modified without authorization. Which of the following control weaknesses could have contributed MOST to this problem?
Management has required information security awareness training to reduce the risk associated with credential compromise. What is the BEST way to assess the effectiveness of the training?
A change management process has recently been updated with new testing procedures. What is the NEXT course of action?
The MAIN reason for prioritizing IT risk responses is to enable an organization to:
Which of the following should be the PRIMARY recipient of reports showing the
progress of a current IT risk mitigation project?
An organization has outsourced its backup and recovery procedures to a cloud service provider. The provider's controls are inadequate for the organization's level of risk tolerance. As a result, the organization has internally implemented additional backup and recovery controls. Which risk response has been adopted?
An IT department has organized training sessions to improve user awareness of organizational information security policies. Which of the following is the BEST key performance indicator (KPI) to reflect effectiveness of the training?
An IT project risk was identified during a monthly steering committee meeting. Which of the following roles is BEST positioned to approve the risk mitigation response?
Who is MOST important lo include in the assessment of existing IT risk scenarios?
Which of the following should be the PRIMARY consideration when assessing the risk of using Internet of Things (loT) devices to collect and process personally identifiable information (PII)?
Which of the following is the MOST appropriate key performance indicator (KPI) to measure change management performance?
The BEST way to mitigate the high cost of retrieving electronic evidence associated with potential litigation is to implement policies and procedures for.
Which risk response strategy could management apply to both positive and negative risk that has been identified?
Which of the following is MOST helpful in reducing the likelihood of inaccurate risk assessment results?
An organization has raised the risk appetite for technology risk. The MOST likely result would be:
Which of the following is the MOST important benefit of implementing a data classification program?
A risk practitioners PRIMARY focus when validating a risk response action plan should be that risk response:
An organization is implementing Zero Trust architecture to improve its security posture. Which of the following is the MOST important input to develop the architecture?
Which of the following activities would BEST contribute to promoting an organization-wide risk-aware culture?
Which of the following is the BEST key control indicator (KCI) for measuring the security of a blockchain network?
Which of the following BEST prevents control gaps in the Zero Trust model when implementing in the environment?
Which of the following would be a risk practitioner's MOST important action upon learning that an IT control has failed?
Which of the following is a KEY outcome of risk ownership?
The BEST way for an organization to ensure that servers are compliant to security policy is
to review:
One of an organization's key IT systems cannot be patched because the patches interfere with critical business application functionalities. Which of the following would be the risk practitioner's BEST recommendation?
Which of the following is the MOST important consideration when implementing ethical remote work monitoring?
Which of the following is the GREATEST risk associated with the use of data analytics?
Which of the following would be MOST helpful in assessing the risk associated with data loss due to human vulnerabilities?
Which of the following, who should be PRIMARILY responsible for performing user entitlement reviews?