When a high-risk security breach occurs, which of the following would be MOST important to the person responsible for managing the incident?
Which of the following is the PRIMARY reason to perform ongoing risk assessments?
Which of the following is MOST helpful in developing key risk indicator (KRl) thresholds?
A risk practitioner has been asked to propose a risk acceptance framework for an organization. Which of the following is the MOST important consideration for the risk practitioner to address in the framework?
During a risk treatment plan review, a risk practitioner finds the approved risk action plan has not been completed However, there were other risk mitigation actions implemented. Which of the fallowing is the BEST course of action?
Which of the following is the MAIN reason for documenting the performance of controls?
Who is MOST likely to be responsible for the coordination between the IT risk strategy and the business risk strategy?
A control for mitigating risk in a key business area cannot be implemented immediately. Which of the following is the risk practitioner's BEST course of action when a compensating control needs to be applied?
Which of the following is the MOST important consideration when selecting digital signature software?
An IT project risk was identified during a monthly steering committee meeting. Which of the following roles is BEST positioned to approve the risk mitigation response?
When developing risk scenario using a list of generic scenarios based on industry best practices, it is MOST imported to:
Which of the following is MOST important for an organization to consider when developing its IT strategy?
Which of the following is MOST important for an organization to update following a change in legislation requiring notification to individuals impacted by data breaches?
Which of the following is MOST important to consider when determining the risk associated with re-identification of obfuscated personal data?
What are the MOST important criteria to consider when developing a data classification scheme to facilitate risk assessment and the prioritization of risk mitigation activities?
A web-based service provider with a low risk appetite for system outages is reviewing its current risk profile for online security. Which of the following observations would be MOST relevant to escalate to senior management?
A bank recently incorporated Blockchain technology with the potential to impact known risk within the organization. Which of the following is the risk practitioner’s BEST course of action?
A risk practitioner has received an updated enterprise risk management (ERM) report showing that residual risk is now within the organization's defined appetite and tolerance levels. Which of the following is the risk practitioner's BEST course of action?
An organization is conducting a review of emerging risk. Which of the following is the BEST input for this exercise?
Which of the following would MOST effectively reduce risk associated with an increase of online transactions on a retailer website?
A large organization needs to report risk at all levels for a new centralized visualization project to reduce cost and improve performance. Which of the following would MOST effectively represent the overall risk of the project to senior management?
Which of the following is the BEST risk management approach for the strategic IT planning process?
Which of the following is BEST measured by key control indicators (KCIs)?
Which of the following has the GREATEST positive impact on ethical compliance within the risk management process?
Which of the following would BEST enable mitigation of newly identified risk factors related to internet of Things (loT)?
Which of the following will BEST help an organization evaluate the control environment of several third-party vendors?
Which of the following is the BEST indicator of executive management's support for IT risk mitigation efforts?
Which of the following is the BEST method to identify unnecessary controls?
Which of the following presents the GREATEST privacy risk related to personal data processing for a global organization?
Which of the following is the MOST important consideration when determining whether to accept residual risk after security controls have been implemented on a critical system?
Which of the following is the GREATEST concern when establishing key risk indicators (KRIs)?
Which of the following will help ensure the elective decision-making of an IT risk management committee?
Business management is seeking assurance from the CIO that IT has a plan in place for early identification of potential issues that could impact the delivery of a new application Which of the following is the BEST way to increase the chances of a successful delivery'?
Which of the following will BEST quantify the risk associated with malicious users in an organization?
Which of the following management actions will MOST likely change the likelihood rating of a risk scenario related to remote network access?
Which of the following is the BEST indicator of the effectiveness of IT risk management processes?
Which of the following should be the PRIMARY consideration when assessing the risk of using Internet of Things (loT) devices to collect and process personally identifiable information (Pll)?
An organization has outsourced a critical process involving highly regulated data to a third party with servers located in a foreign country. Who is accountable for the confidentiality of this data?
A risk practitioner is organizing risk awareness training for senior management. Which of the following is the MOST important topic to cover in the training session?
An organization is adopting block chain for a new financial system. Which of the following should be the GREATEST concern for a risk practitioner evaluating the system's production readiness?
An organization's risk management team wants to develop IT risk scenarios to show the impact of collecting and storing credit card information. Which of the following is the MOST comprehensive approach to capture this scenario?
An organization is measuring the effectiveness of its change management program to reduce the number of unplanned production changes. Which of the following would be the BEST metric to determine if the program is performing as expected?
An organization has made a decision to purchase a new IT system. During when phase of the system development life cycle (SDLC) will identified risk MOST likely lead to architecture and design trade-offs?
Which of the following BEST measures the impact of business interruptions caused by an IT service outage?
Which of the following is the MOST important update for keeping the risk register current?
A risk practitioner wants to identify potential risk events that affect the continuity of a critical business process. Which of the following should the risk practitioner do FIRST?
Establishing and organizational code of conduct is an example of which type of control?
Which of the following approaches MOST effectively enables accountability for data protection?
Which of the following should be the PRIMARY focus of an independent review of a risk management process?
Which of the following is a PRIMARY reason for considering existing controls during initial risk assessment?