A risk practitioner has observed that risk owners have approved a high number of exceptions to the information security policy. Which of the following should be the risk practitioner's GREATEST concern?
For no apparent reason, the time required to complete daily processing for a legacy application is approaching a risk threshold. Which of the following activities should be performed FIRST?
Which of the following is BEST measured by key control indicators (KCIs)?
An organization has implemented a system capable of comprehensive employee monitoring. Which of the following should direct how the system is used?
Which of the following is MOST useful input when developing risk scenarios?
Which of the following BEST supports the management of identified risk scenarios?
Who should be responsible for strategic decisions on risk management?
Which of the following is MOST important for a risk practitioner to understand about an organization in order to create an effective risk
awareness program?
A risk practitioner implemented a process to notify management of emergency changes that may not be approved. Which of the following is the BEST way to provide this information to management?
Which of the following would MOST effectively enable a business operations manager to identify events exceeding risk thresholds?
A Software as a Service (SaaS) provider has determined that the risk of a client's sensitive data being compromised is low. Which of the following is the client's BEST course of action?
Which of the following is the GREATEST risk associated with inappropriate classification of data?
A risk practitioner has just learned about new malware that has severely impacted industry peers worldwide data loss?
Which of the following is MOST useful when communicating risk to management?
Which of the following would be MOST helpful to an information security management team when allocating resources to mitigate exposures?
Changes in which of the following would MOST likely cause a risk practitioner to adjust the risk impact rating in the risk register?
Which of the following is the MOST important consideration when sharing risk management updates with executive management?
Which of the following would BEST facilitate the implementation of data classification requirements?
A risk practitioners PRIMARY focus when validating a risk response action plan should be that risk response:
Which of the following can be interpreted from a single data point on a risk heat map?
Which of the following would be a risk practitioner's MOST important action upon learning that an IT control has failed?
An organization's risk profile indicates that residual risk levels have fallen significantly below management's risk appetite. Which of the following is the BEST course of action?
Which of the following is MOST important to the effectiveness of a senior oversight committee for risk monitoring?
While reviewing an organization's monthly change management metrics, a risk practitioner notes that the number of emergency changes has increased substantially Which of the following would be the BEST approach for the risk practitioner to take?
Which of the following is the MOST important document regarding the treatment of sensitive data?
When collecting information to identify IT-related risk, a risk practitioner should FIRST focus on IT:
An organization striving to be on the leading edge in regard to risk monitoring would MOST likely implement:
Which of the following BEST supports ethical IT risk management practices?
Management has required information security awareness training to reduce the risk associated with credential compromise. What is the BEST way to assess the effectiveness of the training?
The BEST indicator of the risk appetite of an organization is the
Which of the following outcomes of disaster recovery planning is MOST important to enable the initiation of necessary actions during a disaster?
What should a risk practitioner do FIRST upon learning a risk treatment owner has implemented a different control than what was specified in the IT risk action plan?
An organization has made a decision to purchase a new IT system. During when phase of the system development life cycle (SDLC) will identified risk MOST likely lead to architecture and design trade-offs?
When classifying and prioritizing risk responses, the areas to address FIRST are those with:
What are the MOST important criteria to consider when developing a data classification scheme to facilitate risk assessment and the prioritization of risk mitigation activities?
Who is responsible for IT security controls that are outsourced to an external service provider?
Which of the following is MOST important for an organization that wants to reduce IT operational risk?
Which of the following is the MOST important benefit of reporting risk assessment results to senior management?
An organization delegates its data processing to the internal IT team to manage information through its applications. Which of the following is the role of the internal IT team in this situation?
What should be the PRIMARY driver for periodically reviewing and adjusting key risk indicators (KRIs)?
The PRIMARY reason for communicating risk assessment results to data owners is to enable the:
Effective risk communication BEST benefits an organization by:
A bank has outsourced its statement printing function to an external service provider. Which of the following is the MOST critical requirement to include in the contract?
Which of the following is the MOST important consideration when multiple risk practitioners capture risk scenarios in a single risk register?
Which of the following is a risk practitioner's BEST course of action when a control is not meeting agreed-upon performance criteria?
To reduce costs, an organization is combining the second and third tines of defense in a new department that reports to a recently appointed C-level executive. Which of the following is the GREATEST concern with this situation?
Which type of cloud computing deployment provides the consumer the GREATEST degree of control over the environment?
An organization has been experiencing an increasing number of spear phishing attacks Which of the following would be the MOST effective way to mitigate the risk associated with these attacks?
Which of the following is MOST helpful in developing key risk indicator (KRl) thresholds?
Which of the following MUST be assessed before considering risk treatment options for a scenario with significant impact?