After undertaking a risk assessment of a production system, the MOST appropriate action is fcr the risk manager to
A risk practitioner has identified that the agreed recovery time objective (RTO) with a Software as a Service (SaaS) provider is longer than the business expectation. Which ot the following is the risk practitioner's BEST course of action?
The PRIMARY benefit of conducting continuous monitoring of access controls is the ability to identify:
Which of the following should be the GREATEST concern for an organization that uses open source software applications?
Which of the following is the MOST important data attribute of key risk indicators (KRIs)?
Which of the following would MOST likely drive the need to review and update key performance indicators (KPIs) for critical IT assets?
Which of the following BEST reduces the probability of laptop theft?
When assessing the maturity level of an organization’s risk management framework, which of the following should be of GREATEST concern to a risk practitioner?
Which of the following would BEST enable a risk-based decision when considering the use of an emerging technology for data processing?
Which of the following would provide the MOST reliable evidence of the effectiveness of security controls implemented for a web application?
Which of the following provides the BEST indication that existing controls are effective?
When an organization's business continuity plan (BCP) states that it cannot afford to lose more than three hours of a critical application's data, the three hours is considered the application’s:
Which of the following is MOST important for the organization to consider before implementing a new in-house developed artificial intelligence (Al) solution?
The PRIMARY benefit of using a maturity model is that it helps to evaluate the:
The purpose of requiring source code escrow in a contractual agreement is to:
Which of the following BEST enables the identification of trends in risk levels?
Which of the following will BEST help to ensure that information system controls are effective?
Which of the following is the BEST method for identifying vulnerabilities?
Which of the following is the FIRST step in managing the risk associated with the leakage of confidential data?
Which of the following is the BEST way to determine the ongoing efficiency of control processes?
An organization is considering allowing users to access company data from their personal devices. Which of the following is the MOST important factor when assessing the risk?
Which of the following BEST indicates effective information security incident management?
Which of the following is the BEST indication of the effectiveness of a business continuity program?
Which of the following BEST indicates the risk appetite and tolerance level (or the risk associated with business interruption caused by IT system failures?
Which of the following is the MAIN reason for documenting the performance of controls?
Which of the following is MOST important to the effectiveness of a senior oversight committee for risk monitoring?
In an organization with a mature risk management program, which of the following would provide the BEST evidence that the IT risk profile is up to date?
Several newly identified risk scenarios are being integrated into an organization's risk register. The MOST appropriate risk owner would be the individual who:
Which of the following is MOST important for developing effective key risk indicators (KRIs)?
Which of the following is the MOST important data source for monitoring key risk indicators (KRIs)?
An organization has outsourced its billing function to an external service provider. Who should own the risk of customer data leakage caused by the service provider?
Which of the following is the PRIMARY purpose of a risk register?
Which of the following BEST indicates that an organization has implemented IT performance requirements?
Which of the following should be done FIRST when information is no longer required to support business objectives?
An organization has procured a managed hosting service and just discovered the location is likely to be flooded every 20 years. Of the following, who should be notified of this new information FIRST.
A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?
Which of the following BEST enables the timely detection of changes in the security control environment?
When assessing the maturity level of an organization's risk management framework, which of the following deficiencies should be of GREATEST concern to a risk practitioner?
Which of the following is the BEST indication that key risk indicators (KRls) should be revised?
Which of the following is the MAIN benefit to an organization using key risk indicators (KRIs)?
Which of the following is the MAIN purpose of monitoring risk?
A risk practitioner has been notified of a social engineering attack using artificial intelligence (Al) technology to impersonate senior management personnel. Which of the following would BEST mitigate the impact of such attacks?
Which of the following is the MOST efficient method for monitoring control effectiveness?
Which of the following activities is a responsibility of the second line of defense?
Which of the following criteria is MOST important when developing a response to an attack that would compromise data?
Which of the following activities should only be performed by the third line of defense?
Which of the following will MOST improve stakeholders' understanding of the effect of a potential threat?
An organization's risk tolerance should be defined and approved by which of the following?
Which of the following is the BEST key performance indicator (KPI) to measure the ability to deliver uninterrupted IT services?
Which of the following is the BEST key performance indicator (KPI) to measure the effectiveness of an anti-virus program?