What should be the PRIMARY objective for a risk practitioner performing a post-implementation review of an IT risk mitigation project?
An organization's senior management is considering whether to acquire cyber insurance. Which of the following is the BEST way for the risk practitioner to enable management’s decision?
An organization has decided to implement a new Internet of Things (loT) solution. Which of the following should be done FIRST when addressing security concerns associated with this new technology?
Which of the following should be done FIRST upon learning that the organization will be affected by a new regulation in its industry?
An organization is making significant changes to an application. At what point should the application risk profile be updated?
Which of the following provides the BEST evidence that risk responses have been executed according to their risk action plans?
Which of the following is the BEST method to track asset inventory?
Which of the following, who should be PRIMARILY responsible for performing user entitlement reviews?
Of the following, who is accountable for ensuing the effectiveness of a control to mitigate risk?
Which of the following tools is MOST effective in identifying trends in the IT risk profile?
In an organization dependent on data analytics to drive decision-making, which of the following would BEST help to minimize the risk associated with inaccurate data?
During implementation of an intrusion detection system (IDS) to monitor network traffic, a high number of alerts is reported. The risk practitioner should recommend to:
An IT organization is replacing the customer relationship management (CRM) system. Who should own the risk associated with customer data leakage caused by insufficient IT security controls for the new system?
The BEST reason to classify IT assets during a risk assessment is to determine the:
Which of the following is a risk practitioner's BEST recommendation to address an organization's need to secure multiple systems with limited IT resources?
Whether the results of risk analyses should be presented in quantitative or qualitative terms should be based PRIMARILY on the:
The MOST important reason to monitor key risk indicators (KRIs) is to help management:
Which of the following conditions presents the GREATEST risk to an application?
A service organization is preparing to adopt an IT control framework to comply with the contractual requirements of a new client. Which of the following would be MOST helpful to the risk practitioner?
Who should be responsible for approving the cost of controls to be implemented for mitigating risk?
Which of the following is a business asset for an organization that runs only in a Software as a Service (SaaS) cloud computing environment?
Which of the following is the MOST important consideration when sharing risk management updates with executive management?
Key control indicators (KCls) help to assess the effectiveness of the internal control environment PRIMARILY by:
Which of the following should be the PRIMARY input when designing IT controls?
Which of the following would BEST enable mitigation of newly identified risk factors related to internet of Things (loT)?
Which of the following is the BEST way to maintain a current list of organizational risk scenarios?
Which of the following presents the GREATEST concern associated with the
use of artificial intelligence (Al) systems?
When evaluating enterprise IT risk management it is MOST important to:
Which of the following controls BEST helps to ensure that transaction data reaches its destination?
Which of the following is the MOST effective control to ensure user access is maintained on a least-privilege basis?
During a risk assessment of a financial institution, a risk practitioner discovers that tellers can initiate and approve transactions of significant value. This team is also responsible for ensuring transactions are recorded and balances are reconciled by the end of the day. Which of the following is the risk practitioner's BEST recommendation to mitigate the associated risk?
During a risk treatment plan review, a risk practitioner finds the approved risk action plan has not been completed However, there were other risk mitigation actions implemented. Which of the fallowing is the BEST course of action?
An organization plans to implement a new Software as a Service (SaaS) speech-to-text solution Which of the following is MOST important to mitigate risk associated with data privacy?
A control owner identifies that the organization's shared drive contains personally identifiable information (Pll) that can be accessed by all personnel. Which of the following is the MOST effective risk response?
An organization's recovery team is attempting to recover critical data backups following a major flood in its data center. However, key team members do not know exactly what steps should be taken to address this crisis. Which of the following is the MOST likely cause of this situation?
Which of the following is MOST likely to introduce risk for financial institutions that use blockchain?
Which of the following will BEST help to ensure the continued effectiveness of the IT risk management function within an organization experiencing high employee turnover?
Which of the following BEST enables an organization to address new risk associated with an Internet of Things (IoT) solution?
Which of the following is the STRONGEST indication an organization has ethics management issues?
A risk assessment has identified increased losses associated with an IT risk scenario. It is MOST important for the risk practitioner to:
Which of the following is MOST important to add to the risk register for a remediated risk scenario?
Changes in which of the following would MOST likely cause a risk practitioner to adjust the risk impact rating in the risk register?
Which of the following risk scenarios would be the GREATEST concern as a result of a single sign-on implementation?
An effective control environment is BEST indicated by controls that:
A vulnerability assessment of a vendor-supplied solution has revealed that the software is susceptible to cross-site scripting and SQL injection attacks. Which of the following will BEST mitigate this issue?
Which of the following would be MOST helpful to a risk owner when making risk-aware decisions?
An organization has established a single enterprise-wide risk register that records high-level risk scenarios. The IT risk department has created its own register to record more granular scenarios applicable to IT. Which of the following is the BEST way to ensure alignment between these two registers?
The PRIMARY purpose of using a framework for risk analysis is to:
When developing IT risk scenarios, it is MOST important to consider: