A risk practitioner discovers several key documents detailing the design of a product currently in development have been posted on the Internet. What should be the risk practitioner's FIRST course of action?
Senior management has asked the risk practitioner for the overall residual risk level for a process that contains numerous risk scenarios. Which of the following should be provided?
A change management process has recently been updated with new testing procedures. What is the NEXT course of action?
The design of procedures to prevent fraudulent transactions within an enterprise resource planning (ERP) system should be based on:
Who is BEST suited to provide objective input when updating residual risk to reflect the results of control effectiveness?
An organization retains footage from its data center security camera for 30 days when the policy requires 90-day retention The business owner challenges whether the situation is worth remediating Which of the following is the risk manager s BEST response'
The BEST way for management to validate whether risk response activities have been completed is to review:
Which of the following is the BEST method for assessing control effectiveness against technical vulnerabilities that could be exploited to compromise an information system?
Which of the following is MOST useful input when developing risk scenarios?
When updating the risk register after a risk assessment, which of the following is MOST important to include?
Which of the following will BEST help an organization select a recovery strategy for critical systems?
Which of the following BEST reduces the likelihood of fraudulent activity that occurs through use of a digital wallet?
A chief information officer (CIO) has identified risk associated with shadow systems being maintained by business units to address specific functionality gaps in the organization'senterprise resource planning (ERP) system. What is the BEST way to reduce this risk going forward?
A department allows multiple users to perform maintenance on a system using a single set of credentials. A risk practitioner determined this practice to be high-risk. Which of the following is the MOST effective way to mitigate this risk?
Which of the following is the BEST approach for an organization in a heavily regulated industry to comprehensively test application functionality?
After the review of a risk record, internal audit questioned why the risk was lowered from medium to low. Which of the following is the BEST course of action in responding to this inquiry?
Implementing which of the following controls would BEST reduce the impact of a vulnerability that has been exploited?
Which of the following management action will MOST likely change the likelihood rating of a risk scenario related to remote network access?
Which of the following would be the result of a significant increase in the motivation of a malicious threat actor?
Which of the following BEST enables the risk profile to serve as an effective resource to support business objectives?
Periodically reviewing and updating a risk register with details on identified risk factors PRIMARILY helps to:
Which of the following should be a risk practitioner's GREATEST concern upon learning of failures in a data migration activity?
Which of the following factors will have the GREATEST impact on the implementation of a risk mitigation strategy for an organization?