A risk practitioner has been asked by executives to explain how existing risk treatment plans would affect risk posture at the end of the year. Which of the following is MOST helpful in responding to this request?
Which of the following BEST facilities the alignment of IT risk management with enterprise risk management (ERM)?
An information system for a key business operation is being moved from an in-house application to a Software as a Service (SaaS) vendor. Which of the following will have the GREATEST impact on the ability to monitor risk?
Which of the following BEST indicates the effectiveness of anti-malware software?
Which of the following is the MOST important objective of an enterprise risk management (ERM) program?
Which of the following approaches BEST identifies information systems control deficiencies?
During a risk treatment plan review, a risk practitioner finds the approved risk action plan has not been completed However, there were other risk mitigation actions implemented. Which of the fallowing is the BEST course of action?
Which of the following is MOST important when considering risk in an enterprise risk management (ERM) process?
Which of the following is the MOST important topic to cover in a risk awareness training program for all staff?
In an organization that allows employee use of social media accounts for work purposes, which of the following is the BEST way to protect company sensitive information from being exposed?
Which of the following data would be used when performing a business impact analysis (BIA)?
Which of the following is the MOST important factor when deciding on a control to mitigate risk exposure?
Which of the following is the BEST way to confirm whether appropriate automated controls are in place within a recently implemented system?
Which of the following is necessary to enable an IT risk register to be consolidated with the rest of the organization’s risk register?
An IT department has provided a shared drive for personnel to store information to which all employees have access. Which of the following parties is accountable for the risk of potential loss of confidential information?
Which of the following will BEST help in communicating strategic risk priorities?
Who is BEST suited to determine whether a new control properly mitigates data loss risk within a system?
Which of the following is the BEST source for identifying key control indicators (KCIs)?
An organization outsources the processing of us payroll data A risk practitioner identifies a control weakness at the third party trial exposes the payroll data. Who should own this risk?
Which of the following is MOST important for an organization to update following a change in legislation requiring notification to individuals impacted by data breaches?
The PRIMARY objective for requiring an independent review of an organization's IT risk management process should be to:
When of the following provides the MOST tenable evidence that a business process control is effective?
Which of the following is the MOST important consideration when implementing ethical remote work monitoring?
The BEST way to obtain senior management support for investment in a control implementation would be to articulate the reduction in:
Which of the following is the BEST indicator of an effective IT security awareness program?
Which of the following is MOST important when developing key risk indicators (KRIs)?
The BEST way to determine the likelihood of a system availability risk scenario is by assessing the:
The BEST reason to classify IT assets during a risk assessment is to determine the:
Which of the following statements BEST illustrates the relationship between key performance indicators (KPIs) and key control indicators (KCIs)?
In an organization dependent on data analytics to drive decision-making, which of the following would BEST help to minimize the risk associated with inaccurate data?
Which of the following is the MOST important objective of establishing an enterprise risk management (ERM) function within an organization?
An IT risk practitioner has determined that mitigation activities differ from an approved risk action plan. Which of the following is the risk practitioner's BEST course of action?
A risk practitioner is developing a set of bottom-up IT risk scenarios. The MOST important time to involve business stakeholders is when:
Which of the following is MOST helpful in aligning IT risk with business objectives?
Which of the following presents the GREATEST risk to change control in business application development over the complete life cycle?
Which of The following should be of GREATEST concern for an organization considering the adoption of a bring your own device (BYOD) initiative?
An application runs a scheduled job that compiles financial data from multiple business systems and updates the financial reporting system. If this job runs too long, it can delay financial reporting. Which of the following is the risk practitioner's BEST recommendation?
The PRIMARY advantage of involving end users in continuity planning is that they:
Which of the following would present the MOST significant risk to an organization when updating the incident response plan?
Which of the following is the PRIMARY risk management responsibility of the second line of defense?
Who should be accountable for monitoring the control environment to ensure controls are effective?
A chief information officer (CIO) has identified risk associated with shadow systems being maintained by business units to address specific functionality gaps in the organization's enterprise resource planning (ERP) system. What is the BEST way to reduce this risk going forward?
Winch of the following can be concluded by analyzing the latest vulnerability report for the it infrastructure?
Which of the following BEST indicates how well a web infrastructure protects critical information from an attacker?
An organization discovers significant vulnerabilities in a recently purchased commercial off-the-shelf software product which will not be corrected until the next release. Which of the following is the risk manager's BEST course of action?
An organization recently received an independent security audit report of its cloud service provider that indicates significant control weaknesses. What should be done NEXT in response to this report?
Which of the following will help ensure the elective decision-making of an IT risk management committee?
Which of the following is the MOST appropriate key risk indicator (KRI) for backup media that is recycled monthly?
An organization's IT infrastructure is running end-of-life software that is not allowed without exception approval. Which of the following would provide the MOST helpful information to justify investing in updated software?
An IT department originally planned to outsource the hosting of its data center at an overseas location to reduce operational expenses. After a risk assessment, the department has decided to keep the data center in-house. How should the risk treatment response be reflected in the risk register?
A business unit is implementing a data analytics platform to enhance its customer relationship management (CRM) system primarily to process data that has been provided by its customers. Which of the following presents the GREATEST risk to the organization's reputation?
Who should be PRIMARILY responsible for establishing an organization's IT risk culture?
In response to the threat of ransomware, an organization has implemented cybersecurity awareness activities. The risk practitioner's BEST recommendation to further reduce the impact of ransomware attacks would be to implement:
Which of the following should be the PRIMARY focus of an IT risk awareness program?
All business units within an organization have the same risk response plan for creating local disaster recovery plans. In an effort to achieve cost effectiveness, the BEST course of action would be to:
Which of the following scenarios presents the GREATEST risk for a global organization when implementing a data classification policy?
Which of the following is the PRIMARY role of a data custodian in the risk management process?
An IT risk practitioner has been asked to regularly report on the overall status and effectiveness of the IT risk management program. Which of the following is MOST useful for this purpose?
Which of the following should be the FIRST consideration when a business unit wants to use personal information for a purpose other than for which it was originally collected?
Which of the following would require updates to an organization's IT risk register?
Which of the following should be implemented to BEST mitigate the risk associated with infrastructure updates?
An organization is implementing internet of Things (loT) technology to control temperature and lighting in its headquarters. Which of the following should be of GREATEST concern?
Which of the following is the PRIMARY reason to have the risk management process reviewed by a third party?
After a high-profile systems breach at an organization s key vendor, the vendor has implemented additional mitigating controls. The vendor has voluntarily shared the following set of assessments:
Which of the assessments provides the MOST reliable input to evaluate residual risk in the vendor's control environment?
When formulating a social media policy lo address information leakage, which of the following is the MOST important concern to address?
An employee lost a personal mobile device that may contain sensitive corporate information. What should be the risk practitioner's recommendation?
Which of the following is MOST important to the effectiveness of key performance indicators (KPIs)?
Which of the following is the MOST effective way to help ensure future risk levels do not exceed the organization's risk appetite?
A risk practitioner's BEST guidance to help an organization develop relevant risk scenarios is to ensure the scenarios are:
The acceptance of control costs that exceed risk exposure MOST likely demonstrates:
Which of the following is the GREATEST benefit of analyzing logs collected from different systems?
Which of the following BEST confirms the existence and operating effectiveness of information systems controls?
A risk practitioner is reporting on an increasing trend of ransomware attacks in the industry. Which of the following information is MOST important to include to enable an informed response decision by key stakeholders?
A risk practitioner observes that the fraud detection controls in an online payment system do not perform as expected. Which of the following will MOST likely change as a result?
The PRIMARY reason for periodically monitoring key risk indicators (KRIs) is to:
Which of the following should be the PRIMARY focus of an independent review of a risk management process?
Which of the following risk management practices BEST facilitates the incorporation of IT risk scenarios into the enterprise-wide risk register?
When of the following 15 MOST important when developing a business case for a proposed security investment?
Which of the following should a risk practitioner recommend FIRST when an increasing trend of risk events and subsequent losses has been identified?
Winch of the following key control indicators (KCIs) BEST indicates whether security requirements are identified and managed throughout a project He cycle?
Which of the following is the BEST key control indicator (KCI) for a vulnerability management program?
The software version of an enterprise's critical business application has reached end-of-life and is no longer supported by the vendor. IT has decided to develop an in-house replacement application. Which of the following should be the PRIMARY concern?
Which of the following is MOST important when identifying an organization's risk exposure associated with Internet of Things (loT) devices?
Which of the following is the BEST recommendation to address recent IT risk trends that indicate social engineering attempts are increasing in the organization?
Which of the following provides the BEST evidence that risk responses are effective?
Which of the following is MOST important requirement to include in a Software as a Service (SaaS) vendor contract to ensure data is protected?
Which of the following is MOST important for a risk practitioner to confirm once a risk action plan has been completed?
The PRIMARY benefit of conducting a risk workshop using a top-down approach instead of a bottom-up approach is the ability to:
Which of the following should be the PRIMARY input to determine risk tolerance?
An organization recently implemented a cybersecurity awareness program that includes phishing simulation exercises for all employees. What type of control is being utilized?
Which of the following is the MOST useful input when developing risk scenarios?
A risk practitioner has been asked to evaluate the adoption of a third-party blockchain integration platform based on the value added by the platform and the organization's risk appetite. Which of the following is the risk practitioner's BEST course of action?
Who is BEST suited to provide information to the risk practitioner about the effectiveness of a technical control associated with an application?
Which of the following controls are BEST strengthened by a clear organizational code of ethics?
An organization's decision to remain noncompliant with certain laws or regulations is MOST likely influenced by:
An organization planning to transfer and store its customer data with an offshore cloud service provider should be PRIMARILY concerned with:
Which of the following is the BEST evidence that a user account has been properly authorized?
An organization has provided legal text explaining the rights and expected behavior of users accessing a system from geographic locations that have strong privacy regulations. Which of the following control types has been applied?
What is the PRIMARY reason to periodically review key performance indicators (KPIs)?
A vulnerability assessment of a vendor-supplied solution has revealed that the software is susceptible to cross-site scripting and SQL injection attacks. Which of the following will BEST mitigate this issue?
A risk practitioner has been asked to evaluate the adoption of a third-party blockchain integration platform based on the value added by the platform and the organization's risk appetite. Which of the following is the risk practitioner's BEST course of action?
A risk practitioner has been asked to propose a risk acceptance framework for an organization. Which of the following is the MOST important consideration for the risk practitioner to address in the framework?
When confirming whether implemented controls are operating effectively, which of the following is MOST important to review?
Which of the following is an IT business owner's BEST course of action following an unexpected increase in emergency changes?
Which of the following would MOST likely cause a risk practitioner to change the likelihood rating in the risk register?
Which of the following is the PRIMARY benefit of consistently recording risk assessment results in the risk register?
Which of the following changes would be reflected in an organization's risk profile after the failure of a critical patch implementation?
A risk practitioner has established that a particular control is working as desired, but the annual cost of maintenance has increased and now exceeds the expected annual loss exposure. The result is that the control is:
An organization’s board of directors is concerned about recent data breaches in the news and wants to assess its exposure to similar scenarios. Which of the following is the BEST course of action?
Which of the following is the BEST key performance indicator (KPI) to measure the ability to deliver uninterrupted IT services?
Which of the following BEST enables an organization to determine whether risk management is aligned with its goals and objectives?
A company has located its computer center on a moderate earthquake fault. Which of the following is the MOST important consideration when establishing a contingency plan and an alternate processing site?
What is senior management's role in the RACI model when tasked with reviewing monthly status reports provided by risk owners?
Which of the following is the MOST important course of action to foster an ethical, risk-aware culture?
Which of the following is the BEST indicator of the effectiveness of a control?
An assessment of information security controls has identified ineffective controls. Which of the following should be the risk practitioner's FIRST course of action?
An organization has outsourced its billing function to an external service provider. Who should own the risk of customer data leakage caused by the service provider?
Which of the following would be MOST relevant to stakeholders regarding ineffective control implementation?
A PRIMARY advantage of involving business management in evaluating and managing risk is that management:
A risk assessment indicates the residual risk associated with a new bring your own device (BYOD) program is within organizational risk tolerance. Which of the following should the risk practitioner
recommend be done NEXT?
After conducting a risk assessment for regulatory compliance, an organization has identified only one possible mitigating control. The cost of the control has been determined to be higher than the penalty of noncompliance. Which of the following would be the risk practitioner's BEST recommendation?
Which of the following is the MOST likely reason an organization would engage an independent reviewer to assess its IT risk management program?
An organization has identified the need to implement an asset tiering model to establish the appropriate level of impact. Which of the following is the MOST effective risk assessment methodology for a risk practitioner to use for this initiative?
During a review of the asset life cycle process, a risk practitioner identified several unreturned and unencrypted laptops belonging to former employees. Which of the following is the GREATEST concern with this finding?
Which of the following is the BEST way to reduce the likelihood of an individual performing a potentially harmful action as the result of unnecessary entitlement?
Which of the following is MOST important to the effectiveness of a senior oversight committee for risk monitoring?
Which of the following is MOST important for the organization to consider before implementing a new in-house developed artificial intelligence (Al) solution?
Which of the following is the BEST way to mitigate the risk associated with fraudulent use of an enterprise's brand on Internet sites?
Which of the following is the MOST important consideration when prioritizing risk response?
Which of the following activities should only be performed by the third line of defense?
A user has contacted the risk practitioner regarding malware spreading laterally across the organization's corporate network. Which of the following is the risk practitioner’s BEST course of action?
An organization allows programmers to change production systems in emergency situations. Which of the following is the BEST control?
Which of the following BEST reduces the likelihood of fraudulent activity that occurs through use of a digital wallet?
Which of the following is the BEST way to protect sensitive data from administrators within a public cloud?
An organization's decision to remain noncompliant with certain laws or regulations is MOST likely influenced by:
A penetration test reveals several vulnerabilities in a web-facing application. Which of the following should be the FIRST step in selecting a risk response?
In the three lines of defense model, a PRIMARY objective of the second line is to:
Which of the following emerging technologies is frequently used for botnet distributed denial of service (DDoS) attacks?
A failure in an organization s IT system build process has resulted in several computers on the network missing the corporate endpoint detection and response (EDR) software. Which of the following should be the risk practitioner’s IMMEDIATE concern?
An organization is moving its critical assets to the cloud. Which of the following is the MOST important key performance indicator (KPI) to include in the service level agreement (SLA)?
Which of the following is MOST useful for measuring the existing risk management process against a desired state?
Which of the following is the MOST important document regarding the treatment of sensitive data?
Which of the following factors will have the GREATEST impact on the implementation of a risk mitigation strategy for an organization?
An organization recently implemented an automated interface for uploading payment files to its banking system to replace manual processing. Which of the following elements of the risk register is MOST appropriate for the risk practitioner to update to reflect the improved control?
A risk practitioner is advising management on how to update the IT policy framework to account for the organization s cloud usage. Which of the following should be the FIRST step in this process?
An organization recently experienced a cyber attack that resulted in the loss of confidential customer data. Which of the following is the risk practitioner's BEST recommendation after recovery steps have been completed?
Who should be responsible for determining which stakeholders need to be involved in the development of a risk scenario?
Which of the following will BEST help to ensure implementation of corrective action plans?
Which of the following is the ULTIMATE goal of conducting a privacy impact analysis (PIA)?
Which of the following is the PRIMARY reason for a risk practitioner to report changes and trends in the IT risk profile to senior management?
Which of the following is the PRIMARY reason for logging in a production database environment?
Which of the following scenarios is MOST important to communicate to senior management?
An organization has established a single enterprise-wide risk register that records high-level risk scenarios. The IT risk department has created its own register to record more granular scenarios applicable to IT. Which of the following is the BEST way to ensure alignment between these two registers?
An incentive program is MOST likely implemented to manage the risk associated with loss of which organizational asset?
Which of the following offers the SIMPLEST overview of changes in an organization's risk profile?
After the announcement of a new IT regulatory requirement, it is MOST important for a risk practitioner to;
Which of the following is the GREATEST risk of relying on artificial intelligence (Al) within heuristic security systems?
Which of the following BEST prevents control gaps in the Zero Trust model when implementing in the environment?
Which of the following scenarios presents the GREATEST risk of noncompliance with data privacy best practices?
Which of the following BEST protects organizational data within a production cloud environment?
Which of the following techniques is MOST helpful when quantifying the potential loss impact of cyber risk?
Which of the following should be the PRIMARY driver for the prioritization of risk responses?
Which of the following is the MOST important document regarding the treatment of sensitive data?
A risk practitioner is defining metrics for security threats that were not identified by antivirus software. Which type of metric is being developed?
During a recent security framework review, it was discovered that the marketing department implemented a non-fungible token asset program. This was done without following established risk procedures. Which of the following should the risk practitioner do FIRST?
Which of the following is BEST used to aggregate data from multiple systems to identify abnormal behavior?
The risk to an organization's reputation due to a recent cybersecurity breach is PRIMARILY considered to be:
Which of the following analyses is MOST useful for prioritizing risk scenarios associated with loss of IT assets?
Which of the following would BEST prevent an unscheduled application of a patch?
A data center has recently been migrated to a jurisdiction where heavy fines will be imposed should leakage of customer personal data occur. Assuming no other changes to the operating environment, which factor should be updated to reflect this situation as an input to scenario development for this particular risk event?
Which of the following BEST enables the integration of IT risk management across an organization?
Who should be responsible for approving the cost of controls to be implemented for mitigating risk?
A key risk indicator (KRI) that incorporates data from external open-source threat intelligence sources has shown changes in risk trend data. Which of the following is MOST important to update in the risk register?
It was discovered that a service provider's administrator was accessing sensitive information without the approval of the customer in an Infrastructure as a Service (laaS) model. Which of the following would BEST protect against a future recurrence?
One of an organization's key IT systems cannot be patched because the patches interfere with critical business application functionalities. Which of the following would be the risk practitioner's BEST recommendation?
Which of the following is MOST helpful when prioritizing action plans for identified risk?
An organization retains footage from its data center security camera for 30 days when the policy requires 90-day retention The business owner challenges whether the situation is worth remediating Which of the following is the risk manager s BEST response'
Which of the following outcomes of disaster recovery planning is MOST important to enable the initiation of necessary actions during a disaster?
A risk practitioner identifies an increasing trend of employees copying company information unrelated to their job functions to USB drives. Which of the following elements of the risk register should be updated to reflect this observation?
When assessing the maturity level of an organization’s risk management framework, which of the following should be of GREATEST concern to a risk practitioner?
Which of the following has the GREATEST positive impact on ethical compliance within the risk management process?
An organization has used generic risk scenarios to populate its risk register. Which of the following presents the GREATEST challenge to assigning of the associated risk entries?
Which of the following is the PRIMARY benefit of stakeholder involvement in risk scenario development?
Which of the following should be the PRIMARY basis for prioritizing risk responses?
Which of the following is the MOST effective way for a large and diversified organization to minimize risk associated with unauthorized software on company devices?
Senior management wants to increase investment in the organization's cybersecurity program in response to changes in the external threat landscape. Which of the following would BEST help to prioritize investment efforts?
An organization has agreed to a 99% availability for its online services and will not accept availability that falls below 98.5%. This is an example of:
An organization recently configured a new business division Which of the following is MOST likely to be affected?
An organization has an approved bring your own device (BYOD) policy. Which of the following would BEST mitigate the security risk associated with the inappropriate use of enterprise applications on the devices?
Which of the following, who should be PRIMARILY responsible for performing user entitlement reviews?
A risk practitioner has identified that the agreed recovery time objective (RTO) with a Software as a Service (SaaS) provider is longer than the business expectation. Which ot the following is the risk practitioner's BEST course of action?
An organization is implementing robotic process automation (RPA) to streamline business processes. Given that implementation of this technology is expected to impact existing controls, which of the following is the risk practitioner's BEST course of action?
Which of the following would MOST likely require a risk practitioner to update the risk register?
The following is the snapshot of a recently approved IT risk register maintained by an organization's information security department.
After implementing countermeasures listed in ‘’Risk Response Descriptions’’ for each of the Risk IDs, which of the following component of the register MUST change?
If preventive controls cannot be Implemented due to technology limitations, which of the following should be done FIRST to reduce risk7
An organization's business gap analysis reveals the need for a robust IT risk strategy. Which of the following should be the risk practitioner's PRIMARY consideration when participating in development of the new strategy?
Which of the following sources is MOST relevant to reference when updating security awareness training materials?
As pan of business continuity planning, which of the following is MOST important to include m a business impact analysis (BlA)?
When preparing a risk status report for periodic review by senior management, it is MOST important to ensure the report includes
Which of the following is MOST important to the effectiveness of key performance indicators (KPIs)?
Who is BEST suited to provide objective input when updating residual risk to reflect the results of control effectiveness?
Which of the following is the BEST approach to mitigate the risk associated with a control deficiency?
In order to determining a risk is under-controlled the risk practitioner will need to
The MAIN reason for prioritizing IT risk responses is to enable an organization to:
A risk practitioner has collaborated with subject matter experts from the IT department to develop a large list of potential key risk indicators (KRIs) for all IT operations within the organization of the following, who should review the completed list and select the appropriate KRIs for implementation?
Which of the following is a risk practitioner's BEST recommendation upon learning that an employee inadvertently disclosed sensitive data to a vendor?
Which of the following is MOST important to consider before determining a response to a vulnerability?
Which of the following would be the BEST way for a risk practitioner to validate the effectiveness of a patching program?
An information security audit identified a risk resulting from the failure of an automated control Who is responsible for ensuring the risk register is updated accordingly?
An organization is participating in an industry benchmarking study that involves providing customer transaction records for analysis Which of the following is the MOST important control to ensure the privacy of customer information?
Which of the following would BEST enable a risk-based decision when considering the use of an emerging technology for data processing?
Which of the following would be the result of a significant increase in the motivation of a malicious threat actor?
Which of the following is MOST important for maintaining the effectiveness of an IT risk register?
Which of the following is the PRIMARY reason for a risk practitioner to review an organization's IT asset inventory?
When developing a response plan to address security incidents regarding sensitive data loss, it is MOST important
it was determined that replication of a critical database used by two business units failed. Which of the following should be of GREATEST concern1?
Which of the following is MOST important for senior management to review during an acquisition?
The BEST metric to demonstrate that servers are configured securely is the total number of servers:
Which of the following is the MOST important step to ensure regulatory requirements are adequately addressed within an organization?
Which of The following BEST represents the desired risk posture for an organization?
Which of the following is a risk practitioner's MOST important responsibility in managing risk acceptance that exceeds risk tolerance?
Which of the following is the BEST way for a risk practitioner to present an annual risk management update to the board''
It is MOST important that security controls for a new system be documented in:
Which of the following is the BEST approach for an organization in a heavily regulated industry to comprehensively test application functionality?
Which of the following would BEST mitigate the ongoing risk associated with operating system (OS) vulnerabilities?
Which of the following would be of MOST concern to a risk practitioner reviewing risk action plans for documented IT risk scenarios?
Of the following, who is BEST suited to assist a risk practitioner in developing a relevant set of risk scenarios?
An organization's recovery team is attempting to recover critical data backups following a major flood in its data center. However, key team members do not know exactly what steps should be taken to address this crisis. Which of the following is the MOST likely cause of this situation?
Which of the following is MOST important for an organization to consider when developing its IT strategy?
An organization has made a decision to purchase a new IT system. During when phase of the system development life cycle (SDLC) will identified risk MOST likely lead to architecture and design trade-offs?
Which of the following situations presents the GREATEST challenge to creating a comprehensive IT risk profile of an organization?
Using key risk indicators (KRIs) to illustrate changes in the risk profile PRIMARILY helps to:
An organization is analyzing the risk of shadow IT usage. Which of the following is the MOST important input into the assessment?
Which of the following BEST helps to identify significant events that could impact an organization?
Which of the following is PRIMARILY a risk management responsibly of the first line of defense?
To define the risk management strategy which of the following MUST be set by the board of directors?
Which of the following BEST enables risk-based decision making in support of a business continuity plan (BCP)?
A bank recently incorporated Blockchain technology with the potential to impact known risk within the organization. Which of the following is the risk practitioner’s BEST course of action?
An organization has decided to use an external auditor to review the control environment of an outsourced service provider. The BEST control criteria to evaluate the provider would be based on:
A risk practitioner observed Vial a high number of pokey exceptions were approved by senior management. Which of the following is the risk practitioner’s BEST course of action to determine root cause?
Which of the following is the MAIN benefit to an organization using key risk indicators (KRIs)?
Which of the following will BEST help to ensure key risk indicators (KRIs) provide value to risk owners?
Reviewing which of the following BEST helps an organization gam insight into its overall risk profile''
Which of the following would MOST effectively reduce risk associated with an increase of online transactions on a retailer website?
Who should be responsible (of evaluating the residual risk after a compensating control has been
A segregation of duties control was found to be ineffective because it did not account for all applicable functions when evaluating access. Who is responsible for ensuring the control is designed to effectively address risk?
Which of the following provides the BEST assurance of the effectiveness of vendor security controls?
Which of the following is the MOST important objective from a cost perspective for considering aggregated risk responses in an organization?
An internal audit report reveals that a legacy system is no longer supported Which of the following is the risk practitioner's MOST important action before recommending a risk response'
Which of the following is the PRIMARY purpose of creating and documenting control procedures?
Which of the following is the MAIN benefit to an organization using key risk indicators (KRIs)?
Which of the following provides the MOST reliable evidence of a control's effectiveness?
Which of the following is the MOST critical factor to consider when determining an organization's risk appetite?
Which of the following is the MOST important reason to validate that risk responses have been executed as outlined in the risk response plan''
Which of the following would BEST facilitate the implementation of data classification requirements?
Which of the following is the MOST effective way to reduce potential losses due to ongoing expense fraud?
Which of the following is the MOST effective way to help ensure accountability for managing risk?
An organization has asked an IT risk practitioner to conduct an operational risk assessment on an initiative to outsource the organization's customer service operations overseas. Which of the following would MOST significantly impact management's decision?
Which of the following is the BEST way to ensure data is properly sanitized while in cloud storage?
Which of the following is MOST helpful in defining an early-warning threshold associated with insufficient network bandwidth’’?
Which of the following is the BEST control to minimize the risk associated with scope creep in software development?
Which of the following should be of GREATEST concern when reviewing the results of an independent control assessment to determine the effectiveness of a vendor's control environment?
Which of the following is MOST important for mitigating ethical risk when establishing accountability for control ownership?
What is the BEST recommendation to reduce the risk associated with potential system compromise when a vendor stops releasing security patches and updates for a business-critical legacy system?
Which of the following is the GREATEST benefit of a three lines of defense structure?
Which of the following is MOST important to update when an organization's risk appetite changes?
A recent vulnerability assessment of a web-facing application revealed several weaknesses. Which of the following should be done NEXT to determine the risk exposure?
Which of the following is the MOST important key performance indicator (KPI) to monitor the effectiveness of disaster recovery processes?
Which of the following tools is MOST effective in identifying trends in the IT risk profile?
Which of the following would BEST help an enterprise prioritize risk scenarios?
Which of the following is the MOST important benefit of implementing a data classification program?
Which of the following is the PRIMARY reason for a risk practitioner to use global standards related to risk management?
Which of the following is the BEST indication of an improved risk-aware culture following the implementation of a security awareness training program for all employees?
An organization has determined a risk scenario is outside the defined risk tolerance level. What should be the NEXT course of action?
Which of the following risk register updates is MOST important for senior management to review?
Which of the following is the BEST method for assessing control effectiveness?
Which of the following is the MAIN reason to continuously monitor IT-related risk?
The PRIMARY benefit of maintaining an up-to-date risk register is that it helps to:
An organization has procured a managed hosting service and just discovered the location is likely to be flooded every 20 years. Of the following, who should be notified of this new information FIRST.
What is the BEST information to present to business control owners when justifying costs related to controls?
Which of the following would be MOST useful when measuring the progress of a risk response action plan?
An organization has allowed its cyber risk insurance to lapse while seeking a new insurance provider. The risk practitioner should report to management that the risk has been:
An organization has outsourced its IT security operations to a third party. Who is ULTIMATELY accountable for the risk associated with the outsourced operations?
During an IT risk scenario review session, business executives question why they have been assigned ownership of IT-related risk scenarios. They feel IT risk is technical in nature and therefore should be owned by IT. Which of the following is the BEST way for the risk practitioner to address these concerns?
The head of a business operations department asks to review the entire IT risk register. Which of the following would be the risk manager s BEST approach to this request before sharing the register?
Which of the following changes would be reflected in an organization's risk profile after the failure of a critical patch implementation?
Which of the following is the BEST way to determine the ongoing efficiency of control processes?
A risk practitioners PRIMARY focus when validating a risk response action plan should be that risk response:
Which of the following is of GREATEST concern when uncontrolled changes are made to the control environment?
A systems interruption has been traced to a personal USB device plugged into the corporate network by an IT employee who bypassed internal control procedures. Of the following, who should be accountable?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a disaster recovery plan (DRP)?
Which of the following is the MOST useful indicator to measure the efficiency of an identity and access management process?
Which of the following is the MOST cost-effective way to test a business continuity plan?
The BEST way to justify the risk mitigation actions recommended in a risk assessment would be to:
Which of the following is the PRIMARY reason to perform ongoing risk assessments?
Which of the following is MOST helpful in identifying new risk exposures due to changes in the business environment?
A global organization is considering the acquisition of a competitor. Senior management has requested a review of the overall risk profile from the targeted organization. Which of the following components of this review would provide the MOST useful information?
The MOST important characteristic of an organization s policies is to reflect the organization's:
Which of the following would BEST help minimize the risk associated with social engineering threats?
Which of the following should be the PRIMARY input when designing IT controls?
Which of the following aspects of an IT risk and control self-assessment would be MOST important to include in a report to senior management?
Which of the following is the MOST important consideration when multiple risk practitioners capture risk scenarios in a single risk register?
A trusted third-party service provider has determined that the risk of a client's systems being hacked is low. Which of the following would be the client's BEST course of action?
Malware has recently affected an organization. The MOST effective way to resolve this situation and define a comprehensive risk treatment plan would be to perform:
A risk assessment has identified that an organization may not be in compliance with industry regulations. The BEST course of action would be to:
Which of the following IT controls is MOST useful in mitigating the risk associated with inaccurate data?
Which of the following is the MOST important consideration for a risk practitioner when making a system implementation go-live recommendation?
During which phase of the system development life cycle (SDLC) should information security requirements for the implementation of a new IT system be defined?
Which of the following is the MOST important key performance indicator (KPI) to establish in the service level agreement (SLA) for an outsourced data center?
Which of the following controls will BEST detect unauthorized modification of data by a database administrator?
To implement the MOST effective monitoring of key risk indicators (KRIs), which of the following needs to be in place?
Which of the following is MOST important to identify when developing generic risk scenarios?
Which of the following activities would BEST contribute to promoting an organization-wide risk-aware culture?
Establishing and organizational code of conduct is an example of which type of control?
Periodically reviewing and updating a risk register with details on identified risk factors PRIMARILY helps to:
Which of the following is MOST important for effective communication of a risk profile to relevant stakeholders?
The PRIMARY objective of testing the effectiveness of a new control before implementation is to:
Which of the following is MOST important when developing key performance indicators (KPIs)?
The number of tickets to rework application code has significantly exceeded the established threshold. Which of the following would be the risk practitioner s BEST recommendation?
Which of the following would BEST help to ensure that identified risk is efficiently managed?
The MOST effective way to increase the likelihood that risk responses will be implemented is to:
Which of the following will BEST quantify the risk associated with malicious users in an organization?
Which of the following should be a risk practitioner's NEXT step upon learning the impact of an organization's noncompliance with a specific legal regulation?
Which of the following is the MOST important data source for monitoring key risk indicators (KRIs)?
After a risk has been identified, who is in the BEST position to select the appropriate risk treatment option?
Which of the following is the BEST method to ensure a terminated employee's access to IT systems is revoked upon departure from the organization?
An unauthorized individual has socially engineered entry into an organization's secured physical premises. Which of the following is the BEST way to prevent future occurrences?
After several security incidents resulting in significant financial losses, IT management has decided to outsource the security function to a third party that provides 24/7 security operation services. Which risk response option has management implemented?
Which of the following is the MOST effective way to help ensure future risk levels do not exceed the organization's risk appetite?
The risk associated with an asset before controls are applied can be expressed as:
A rule-based data loss prevention {DLP) tool has recently been implemented to reduce the risk of sensitive data leakage. Which of the following is MOST likely to change as a result of this implementation?
Improvements in the design and implementation of a control will MOST likely result in an update to:
Which of the following should be the HIGHEST priority when developing a risk response?
Which of the following is the MOST important outcome of reviewing the risk management process?
Which of the following is the GREATEST benefit of incorporating IT risk scenarios into the corporate risk register?
In addition to the risk register, what should a risk practitioner review to develop an understanding of the organization's risk profile?
Which of the following would be a risk practitioners’ BEST recommendation for preventing cyber intrusion?
Which of the following is MOST effective against external threats to an organizations confidential information?
From a business perspective, which of the following is the MOST important objective of a disaster recovery test?
Which of the following elements of a risk register is MOST likely to change as a result of change in management's risk appetite?
A key risk indicator (KRI) is reported to senior management on a periodic basis as exceeding thresholds, but each time senior management has decided to take no action to reduce the risk. Which of the following is the MOST likely reason for senior management's response?
After undertaking a risk assessment of a production system, the MOST appropriate action is for the risk manager to:
Which of the following would be MOST helpful when estimating the likelihood of negative events?
Which of the following would be- MOST helpful to understand the impact of a new technology system on an organization's current risk profile?
Which of the following is the BEST metric to demonstrate the effectiveness of an organization's change management process?
An organization that has been the subject of multiple social engineering attacks is developing a risk awareness program. The PRIMARY goal of this program should be to:
Which of the following is a PRIMARY benefit of engaging the risk owner during the risk assessment process?
Which of the following roles would provide the MOST important input when identifying IT risk scenarios?
When reviewing management's IT control self-assessments, a risk practitioner noted an ineffective control that links to several low residual risk scenarios. What should be the NEXT course of action?
A risk practitioner is summarizing the results of a high-profile risk assessment sponsored by senior management. The BEST way to support risk-based decisions by senior management would be to:
An organization has identified a risk exposure due to weak technical controls in a newly implemented HR system. The risk practitioner is documenting the risk in the risk register. The risk should be owned by the:
Which of the following is the PRIMARY factor in determining a recovery time objective (RTO)?
A risk practitioner is assisting with the preparation of a report on the organization s disaster recovery (DR) capabilities. Which information would have the MOST impact on the overall recovery profile?
A bank has outsourced its statement printing function to an external service provider. Which of the following is the MOST critical requirement to include in the contract?
During a risk assessment, the risk practitioner finds a new risk scenario without controls has been entered into the risk register. Which of the following is the MOST appropriate action?
Which of the following is MOST influential when management makes risk response decisions?
It is MOST important for a risk practitioner to have an awareness of an organization s processes in order to:
Which of the following will BEST help to ensure that information system controls are effective?
Which of the following is the MAIN benefit of involving stakeholders in the selection of key risk indicators (KRIs)?
The PRIMARY reason for periodic penetration testing of Internet-facing applications is to:
Which of the following is MOST important for an organization to have in place when developing a risk management framework?
A newly enacted information privacy law significantly increases financial penalties for breaches of personally identifiable information (Pll). Which of the following will MOST likely outcome for an organization affected by the new law?
A recent audit identified high-risk issues in a business unit though a previous control self-assessment (CSA) had good results. Which of the following is the MOST likely reason for the difference?
An audit reveals that there are changes in the environment that are not reflected in the risk profile. Which of the following is the BEST course of action?
Which of the following is the MOST effective way to integrate business risk management with IT operations?
Which of the following would BEST enable a risk practitioner to embed risk management within the organization?
Which of the following is MOST critical to the design of relevant risk scenarios?
A risk owner has accepted a high-impact risk because the control was adversely affecting process efficiency. Before updating the risk register, it is MOST important for the risk practitioner to:
An identified high probability risk scenario involving a critical, proprietary business function has an annualized cost of control higher than the annual loss expectancy. Which of the following is the BEST risk response?
Which of the following activities is PRIMARILY the responsibility of senior management?
Which of the following will BEST help an organization select a recovery strategy for critical systems?
Which of the following should be the PRIMARY recipient of reports showing the
progress of a current IT risk mitigation project?
After identifying new risk events during a project, the project manager s NEXT step should be to:
Which of the following is the MOST important enabler of effective risk management?
After mapping generic risk scenarios to organizational security policies, the NEXT course of action should be to:
Which of the following is the MOST important information to be communicated during security awareness training?
A risk practitioner shares the results of a vulnerability assessment for a critical business application with the business manager. Which of the following is the NEXT step?
An organization's HR department has implemented a policy requiring staff members to take a minimum of five consecutive days leave per year to mitigate the risk of malicious insider activities. Which of the following is the BEST key performance indicator (KPI) of the effectiveness of this policy?
Which of the following would prompt changes in key risk indicator {KRI) thresholds?
Which of the following presents the GREATEST challenge for an IT risk practitioner who wants to report on trends in historical IT risk levels?
A payroll manager discovers that fields in certain payroll reports have been modified without authorization. Which of the following control weaknesses could have contributed MOST to this problem?
Which of the following is the BEST course of action when risk is found to be above the acceptable risk appetite?
A department has been granted an exception to bypass the existing approval process for purchase orders. The risk practitioner should verify the exception has been approved by which of the following?
To mitigate the risk of using a spreadsheet to analyze financial data, IT has engaged a third-party vendor to deploy a standard application to automate the process. Which of the following parties should own the risk associated with calculation errors?
A risk practitioner has become aware of production data being used in a test environment. Which of the following should be the practitioner's PRIMARY concern?
Which of the following is MOST helpful in identifying gaps between the current and desired state of the IT risk environment?
Who is MOST likely to be responsible for the coordination between the IT risk strategy and the business risk strategy?
The BEST way to test the operational effectiveness of a data backup procedure is to:
Which of the following is a risk practitioner's BEST course of action upon learning that a control under internal review may no longer be necessary?
The MOST essential content to include in an IT risk awareness program is how to:
An IT organization is replacing the customer relationship management (CRM) system. Who should own the risk associated with customer data leakage caused by insufficient IT security controls for the new system?
The risk associated with a high-risk vulnerability in an application is owned by the:
Which of the following controls would BEST reduce the likelihood of a successful network attack through social engineering?
Which of the following is the MOST effective way to help ensure an organization's current risk scenarios are relevant?
Which of the following is the GREATEST concern when an organization uses a managed security service provider as a firewall administrator?
What should a risk practitioner do FIRST upon learning a risk treatment owner has implemented a different control than what was specified in the IT risk action plan?
An organization's risk practitioner learns a new third-party system on the corporate network has introduced vulnerabilities that could compromise corporate IT systems. What should the risk practitioner do
FIRST?
Which of the following BEST supports the communication of risk assessment results to stakeholders?
Sensitive data has been lost after an employee inadvertently removed a file from the premises, in violation of organizational policy. Which of the following controls MOST likely failed?
Which of the following should be a risk practitioner's NEXT action after identifying a high probability of data loss in a system?
The MOST important reason to monitor key risk indicators (KRIs) is to help management:
Which of the following MUST be assessed before considering risk treatment options for a scenario with significant impact?
Which of the following is MOST important to sustainable development of secure IT services?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of a vulnerability management process?
Which of the following is the GREATEST concern associated with business end users developing their own applications on end user spreadsheets and database programs?
Which of the following requirements is MOST important to include in an outsourcing contract to help ensure sensitive data stored with a service provider is secure?
The risk associated with inadvertent disclosure of database records from a public cloud service provider (CSP) would MOST effectively be reduced by:
A business manager wants to leverage an existing approved vendor solution from another area within the organization. Which of the following is the risk practitioner's BEST course of action?
Which of the following is MOST helpful to management when determining the resources needed to mitigate a risk?
The implementation of a risk treatment plan will exceed the resources originally allocated for the risk response. Which of the following should be the risk owner's NEXT action?
Which of the following would be MOST beneficial as a key risk indicator (KRI)?
Which of the following indicates an organization follows IT risk management best practice?
IT stakeholders have asked a risk practitioner for IT risk profile reports associated with specific departments to allocate resources for risk mitigation. The BEST way to address this request would be to use:
It is MOST important to the effectiveness of an IT risk management function that the associated processes are:
Business areas within an organization have engaged various cloud service providers directly without assistance from the IT department. What should the risk practitioner do?
A risk practitioner has learned that an effort to implement a risk mitigation action plan has stalled due to lack of funding. The risk practitioner should report that the associated risk has been:
Which of the following key risk indicators (KRIs) is MOST effective for monitoring risk related to a bring your own device (BYOD) program?
An organization has opened a subsidiary in a foreign country. Which of the following would be the BEST way to measure the effectiveness of the subsidiary's IT systems controls?
Which of the following provides the BEST evidence that risk mitigation plans have been implemented effectively?
Which of the following would provide executive management with the BEST information to make risk decisions as a result of a risk assessment?
Which of the following is the BEST way to detect zero-day malware on an end user's workstation?
A control owner identifies that the organization's shared drive contains personally identifiable information (Pll) that can be accessed by all personnel. Which of the following is the MOST effective risk response?
A control owner responsible for the access management process has developed a machine learning model to automatically identify excessive access privileges. What is the risk practitioner's BEST course of action?
Which of the following is the BEST measure of the effectiveness of an employee deprovisioning process?
A key risk indicator (KRI) threshold has reached the alert level, indicating data leakage incidents are highly probable. What should be the risk practitioner's FIRST course of action?
Which of the following BEST contributes to the implementation of an effective risk response action plan?
Which of the following will MOST improve stakeholders' understanding of the effect of a potential threat?
Which of the following should be considered FIRST when assessing risk associated with the adoption of emerging technologies?
What should be the PRIMARY objective for a risk practitioner performing a post-implementation review of an IT risk mitigation project?
Which of the following is the GREATEST concern associated with the transmission of healthcare data across the internet?
Which of the following BEST helps to balance the costs and benefits of managing IT risk?
Which of the following is the MOST important reason to revisit a previously accepted risk?
An organization is considering modifying its system to enable acceptance of credit card payments. To reduce the risk of data exposure, which of the following should the organization do FIRST?