The MOST important measure of the effectiveness of risk management in project implementation is the percentage of projects:
Which of the following would BEST enable a risk-based decision when considering the use of an emerging technology for data processing?
Which of the following is a benefit of implementing user and entity behavior analytics to help mitigate information security threats?
A cote data center went offline abruptly for several hours affecting many transactions across multiple locations. Which of the to " owing would provide the MOST useful information to determine mitigating controls?
Which of the following is the BEST control to prevent unauthorized access to an organization ' s critical assets?
Which of the following is the PRIMARY reason to perform periodic vendor risk assessments?
Which of the following situations presents the GREATEST challenge to creating a comprehensive IT risk profile of an organization?
A risk practitioner has observed that there is an increasing trend of users sending sensitive information by email without using encryption. Which of the following would be the MOST effective approach to mitigate the risk associated with data loss?
During a control review, the control owner states that an existing control has deteriorated over time. What is the BEST recommendation to the control owner?
Which of the following should management consider when selecting a risk mitigation option?
Which of the following is the BEST way to address a board ' s concern about the organization ' s current cybersecurity posture?
Which of the following conditions presents the GREATEST risk to an application?
An organization automatically approves exceptions to security policies on a recurring basis. This practice is MOST likely the result of:
Which of the following is the BEST way to reduce the likelihood of an individual performing a potentially harmful action as the result of unnecessary entitlement?
An organization is developing a plan to address new information security risks emerging from business changes. Which of the following BEST enables stakeholders to make decisions impacting organizational strategy?
A risk practitioner learns of an urgent threat intelligence alert to patch a critical vulnerability identified in the organization ' s operating system. Which of the following should the risk practitioner do FIRST?
Which of the following is MOST important to the effective monitoring of key risk indicators (KRIS)?
Malware has recently affected an organization. The MOST effective way to resolve this situation and define a comprehensive risk treatment plan would be to perform:
Which of the following is the BEST indication of a mature organizational risk culture?
Which risk response strategy could management apply to both positive and negative risk that has been identified?
Which of the following is the BEST course of action for a system administrator who suspects a colleague may be intentionally weakening a system ' s validation controls in order to pass through fraudulent transactions?
Which of the following is the PRIMARY purpose of conducting risk and control self-assessments?
Which of the following would MOST effectively enable a business operations manager to identify events exceeding risk thresholds?
What is the PRIMARY purpose of a business impact analysis (BIA)?
A business manager wants to leverage an existing approved vendor solution from another area within the organization. Which of the following is the risk practitioner ' s BEST course of action?
An organization retains footage from its data center security camera for 30 days when the policy requires 90-day retention The business owner challenges whether the situation is worth remediating Which of the following is the risk manager s BEST response '
Key performance indicators (KPIs) are BEST utilized to provide a high-level overview of:
An organization is moving its critical assets to the cloud. Which of the following is the MOST important key performance indicator (KPI) to include in the service level agreement (SLA)?
Risk appetite should be PRIMARILY driven by which of the following?
Numerous media reports indicate a recently discovered technical vulnerability is being actively exploited. Which of the following would be the BEST response to this scenario?
Which of the following is the BEST way for a risk practitioner to consolidate the results of risk assessments across multiple operating units?
Senior management has requested a risk practitioner ' s guidance on whether
a new technical control requested by a business unit is worth the investment.
Which of the following should be the MOST important consideration before
providing input?
Which process is MOST effective to determine relevance of threats for risk scenarios?
Which of the following is MOST important to ensure before using risk reports in decision making?
Which of the following is the PRIMARY benefit when senior management periodically reviews and updates risk appetite and tolerance levels?
Which of the following should be the MOST important consideration for senior management when developing a risk response strategy?
An IT department has organized training sessions to improve user awareness of organizational information security policies. Which of the following is the BEST key performance indicator (KPI) to reflect effectiveness of the training?
When reporting on the performance of an organization ' s control environment including which of the following would BEST inform stakeholders risk decision-making?
Which of the following is the BEST way to support communication of emerging risk?
Which of the following is the BEST indication of the effectiveness of a business continuity program?
A risk assessment has identified that an organization may not be in compliance with industry regulations. The BEST course of action would be to:
Which of the following is the MOST important component of effective security incident response?
Which of the following is the GREATEST concern if user acceptance testing (UAT) is not conducted when implementing a new application?
A risk practitioner is advising management on how to update the IT policy framework to account for the organization s cloud usage. Which of the following should be the FIRST step in this process?
From a risk management perspective, which of the following is the PRIMARY purpose of conducting a root cause analysis following an incident?
Which of the following is the MOST important input when developing risk scenarios?
Which of the following is the BEST method for determining an enterprise ' s current appetite for risk?
Which of the following facilitates a completely independent review of test results for evaluating control effectiveness?
Which of the following BEST enables risk-based decision making in support of a business continuity plan (BCP)?
Which of the following is the BEST course of action when risk is found to be above the acceptable risk appetite?