Which of the following statements BEST describes risk appetite?
Which of the following should be management ' s PRIMARY focus when key risk indicators (KRIs) begin to rapidly approach defined thresholds?
Which of the following is necessary to enable an IT risk register to be consolidated with the rest of the organization’s risk register?
An organization has raised the risk appetite for technology risk. The MOST likely result would be:
When collecting information to identify IT-related risk, a risk practitioner should FIRST focus on IT:
Which of the following is the MOST important consideration when sharing risk management updates with executive management?
Which of the following is the BEST way to help ensure risk will be managed properly after a business process has been re-engineered?
Which of the following is the BEST key control indicator (KCI) for risk related to IT infrastructure failure?
Which of the following scenarios represents a threat?
Which of the following should be a risk practitioner ' s PRIMARY focus when tasked with ensuring organization records are being retained for a sufficient period of time to meet legal obligations?
A third-party vendor has offered to perform user access provisioning and termination. Which of the following control accountabilities is BEST retained within the organization?
Which of the following is MOST helpful in verifying that the implementation of a risk mitigation control has been completed as intended?
Which of the following would BEST assist in reconstructing the sequence of events following a security incident across multiple IT systems in the organization ' s network?
An organization is planning to outsource its payroll function to an external service provider Which of the following should be the MOST important consideration when selecting the provider?
In response to the threat of ransomware, an organization has implemented cybersecurity awareness activities. The risk practitioner ' s BEST recommendation to further reduce the impact of ransomware attacks would be to implement:
A control owner identifies that the organization ' s shared drive contains personally identifiable information (Pll) that can be accessed by all personnel. Which of the following is the MOST effective risk response?
Which of the following provides the MOST helpful information in identifying risk in an organization?
A multinational organization is considering implementing standard background checks to ' all new employees A KEY concern regarding this approach
Which of the following would be a risk practitioner ' s MOST important action upon learning that an IT control has failed?
Which of the following metrics is BEST used to communicate to senior management that the control environment manages risk within appetite and tolerance?
A global company s business continuity plan (BCP) requires the transfer of its customer information….
event of a disaster. Which of the following should be the MOST important risk consideration?
Which of the following would be a risk practitioners’ BEST recommendation for preventing cyber intrusion?
Which of the following is the BEST metric to demonstrate the effectiveness of an organization ' s change management process?
Which of the following shortcomings of perimeter security does Zero Trust aim to resolve?
Which of the following is the BEST way to ensure ongoing control effectiveness?
Which of the following is a risk practitioner ' s MOST important responsibility in managing risk acceptance that exceeds risk tolerance?
Which of the following is the BEST metric to demonstrate the effectiveness of an organization’s software testing program?
The BEST way for management to validate whether risk response activities have been completed is to review:
Which of the following is the PRIMARY reason for managing emerging risk?
Which of the following is MOST critical when designing controls?
An organization has restructured its business processes, and the business continuity plan (BCP) needs to be revised accordingly. Which of the following should be identified FIRST?
An organization uses a biometric access control system for authentication and access to its server room. Which control type has been implemented?
Which of the following is MOST helpful in providing a high-level overview of current IT risk severity*?
Which of the following is the MOST important objective of establishing an enterprise risk management (ERM) function within an organization?
An organization has outsourced its backup and recovery procedures to a third-party cloud provider. Which of the following is the risk practitioner s BEST course of action?
Which of the following would be MOST relevant to stakeholders regarding ineffective control implementation?
Which of the following will MOST improve stakeholders ' understanding of the effect of a potential threat?
A risk practitioner is reporting on an increasing trend of ransomware attacks in the industry. Which of the following information is MOST important to include to enable an informed response decision by key stakeholders?
Which of the following would BEST provide early warning of a high-risk condition?
Which of the following is the MOST useful indicator to measure the efficiency of an identity and access management process?
Which component of a software inventory BEST enables the identification and mitigation of known vulnerabilities?
Within the three lines of defense model, the accountability for the system of internal control resides with:
Which of the following will BEST help to ensure that information system controls are effective?
A threat intelligence team has identified an indicator of compromise related to an advanced persistent threat (APT) actor. Which of the following is the risk practitioner ' s BEST course of action?
Which of the following is MOST likely to be impacted as a result of a new policy which allows staff members to remotely connect to the organization ' s IT systems via personal or public computers?
Which of the following will BEST communicate the importance of risk mitigation initiatives to senior management?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of an antivirus program?
The PRIMARY purpose of using a framework for risk analysis is to:
Which of the following is MOST important for maintaining the effectiveness of an IT risk register?
Which of the following is the BEST approach for performing a business impact analysis (BIA) of a supply-chain management application?