An organization control environment is MOST effective when:
For a large software development project, risk assessments are MOST effective when performed:
The MAIN reason for creating and maintaining a risk register is to:
Who is responsible for IT security controls that are outsourced to an external service provider?
Which of the following will BEST mitigate the risk associated with IT and business misalignment?
A rule-based data loss prevention {DLP) tool has recently been implemented to reduce the risk of sensitive data leakage. Which of the following is MOST likely to change as a result of this implementation?
When documenting a risk response, which of the following provides the STRONGEST evidence to support the decision?
Which of the following would BEST help to ensure that identified risk is efficiently managed?
Which of the following is the MOST cost-effective way to test a business continuity plan?
Which of the following should be the MOST important consideration when performing a vendor risk assessment?
Which of the following is MOST useful for measuring the existing risk management process against a desired state?
Which of the following provides the BEST evidence of the effectiveness of an organization's account provisioning process?
The BEST way to demonstrate alignment of the risk profile with business objectives is through:
An organization has committed to a business initiative with the knowledge that the risk exposure is higher than the risk appetite. Which of the following is the risk practitioner's MOST important action related to this decision?
An organization operates in an environment where the impact of ransomware attacks is high, with a low likelihood. After quantifying the impact of the risk associated with ransomware attacks exceeds the organization's risk appetite and tolerance, which of the following is the risk practitioner's BEST recommendation?
Which of the following is the BEST approach for selecting controls to minimize risk?
To drive effective risk management, it is MOST important that an organization's policy framework is:
In a public company, which group is PRIMARILY accountable for ensuring sufficient attention and resources are applied to the risk management process?
A risk practitioner has identified that the agreed recovery time objective (RTO) with a Software as a Service (SaaS) provider is longer than the business expectation. Which of the following is the risk practitioner's BEST course of action?
Which of the following is the PRIMARY reason to update a risk register with risk assessment results?
A risk practitioner's BEST guidance to help an organization develop relevant risk scenarios is to ensure the scenarios are:
The BEST key performance indicator (KPI) to measure the effectiveness of a vulnerability remediation program is the number of:
An organization wants to transfer risk by purchasing cyber insurance. Which of the following would be MOST important for the risk practitioner to communicate to senior management for contract negotiation purposes?
An organization needs to send files to a business partner to perform a quality control audit on the organization’s record-keeping processes. The files include personal information on theorganization's customers. Which of the following is the BEST recommendation to mitigate privacy risk?
Which of the following is the MOST important consideration when sharing risk management updates with executive management?
Which of the following process controls BEST mitigates the risk of an employee issuing fraudulent payments to a vendor?
Which group has PRIMARY ownership of reputational risk stemming from unethical behavior within the organization?
A maturity model is MOST useful to an organization when it:
The BEST way to determine the likelihood of a system availability risk scenario is by assessing the:
Which of the following should be the MOST important consideration when determining controls necessary for a highly critical information system?
A global company s business continuity plan (BCP) requires the transfer of its customer information….
event of a disaster. Which of the following should be the MOST important risk consideration?
A PRIMARY advantage of involving business management in evaluating and managing risk is that management:
A new regulator/ requirement imposes severe fines for data leakage involving customers' personally identifiable information (Pll). The risk practitioner has recommended avoiding the risk. Which of the following actions would BEST align with this recommendation?
When developing a new risk register, a risk practitioner should focus on which of the following risk management activities?
Which of the following is a risk practitioner's BEST recommendation to help reduce IT risk associated with scheduling overruns when starting a new application development project?
A risk practitioner has been asked to evaluate the adoption of a third-party blockchain integration platform based on the value added by the platform and the organization's risk appetite. Which of the following is the risk practitioner's BEST course of action?
An organization has implemented a system capable of comprehensive employee monitoring. Which of the following should direct how the system is used?
A chief risk officer (CRO) has asked to have the IT risk register integrated into the enterprise risk management (ERM) process. Which of the following will BEST facilitate the reporting of IT risk at the enterprise level?
Which of the following is the BEST way to validate the results of a vulnerability assessment?
Which of the following BEST enables effective risk reporting to the board of directors?
Which of the following events is MOST likely to trigger the need to conduct a risk assessment?
Who is BEST suited to provide information to the risk practitioner about the effectiveness of a technical control associated with an application?
Which of the following requirements is MOST important to include in an outsourcing contract to help ensure sensitive data stored with a service provider is secure?
Which of the following functions can be performed by any of the three lines of defense?
Which of the following is the PRIMARY benefit of stakeholder involvement in risk scenario development?
During a risk assessment, the risk practitioner finds a new risk scenario without controls has been entered into the risk register. Which of the following is the MOST appropriate action?
A risk practitioner has recently become aware of unauthorized use of confidential personal information within the organization. Which of the following should the risk practitioner do FIRST?
Which of the following should be the PRIMARY concern when changes to firewall rules do not follow change management requirements?
Business areas within an organization have engaged various cloud service providers directly without assistance from the IT department. What should the risk practitioner do?