Numerous media reports indicate a recently discovered technical vulnerability is being actively exploited. Which of the following would be the BEST response to this scenario?
Which of the following is MOST important for an organization to have in place when developing a risk management framework?
Which of the following is the FIRST step in managing the security risk associated with wearable technology in the workplace?
Risk mitigation procedures should include:
Which of the following is the ULTIMATE objective of utilizing key control indicators (KCIs) in the risk management process?
An organization is conducting a review of emerging risk. Which of the following is the BEST input for this exercise?
The MOST important objective of information security controls is to:
Which of the following is the BEST method to maintain a common view of IT risk within an organization?
A failed IT system upgrade project has resulted in the corruption of an organization's asset inventory database. Which of the following controls BEST mitigates the impact of this incident?
External auditors have found that management has not effectively monitored key security technologies that support regulatory objectives. Which type of indicator would BEST enable the organization to identify and correct this situation?
Which of the following is the PRIMARY risk management responsibility of the second line of defense?
An organization is increasingly concerned about loss of sensitive data and asks the risk practitioner to assess the current risk level. Which of the following should the risk practitioner do FIRST?
Which of the following would BEST help minimize the risk associated with social engineering threats?
Which of the following approaches BEST identifies information systems control deficiencies?
What is the BEST approach for determining the inherent risk of a scenario when the actual likelihood of the risk is unknown?
Which of the following would provide the MOST useful input when evaluating the appropriateness of risk responses?
To ensure key risk indicators (KRIs) are effective and meaningful, the KRIs should be aligned to:
Which of the following activities is PRIMARILY the responsibility of senior management?
Which of the following is the GREATEST benefit of identifying appropriate risk owners?
Which of the following is a KEY outcome of risk ownership?
Which of the following BEST enables the development of a successful IT strategy focused on business risk mitigation?
Which of the following is the BEST evidence that risk management is driving business decisions in an organization?
Which of the following BEST enables the integration of IT risk management across an organization?
A peer review of a risk assessment finds that a relevant threat community was not included. Mitigation of the risk will require substantial changes to a software application. Which of the following is the BEST course of action?
When establishing leading indicators for the information security incident response process it is MOST important to consider the percentage of reported incidents:
Which of the following is the MOST important factor when deciding on a control to mitigate risk exposure?
A recent audit identified high-risk issues in a business unit though a previous control self-assessment (CSA) had good results. Which of the following is the MOST likely reason for the difference?
Which of the following should be a risk practitioner's PRIMARY focus when tasked with ensuring organization records are being retained for a sufficient period of time to meet legal obligations?
Which of the following is PRIMARILY a risk management responsibly of the first line of defense?
Which of the following would be MOST effective in monitoring changes in an organization's IT risk environment?
Which of the following could BEST detect an in-house developer inserting malicious functions into a web-based application?
During a risk assessment, a risk practitioner learns that an IT risk factor is adequately mitigated by compensating controls in an associated business process. Which of the following would enable the MOST effective management of the residual risk?
Which of the following would be of GREATEST concern to a risk practitioner reviewing current key risk indicators (KRIs)?
A business impact analysis (BIA) has documented the duration of maximum allowable outage for each of an organization's applications. Which of the following MUST be aligned with the maximum allowable outage?
Which of the following is the GREATEST benefit of using IT risk scenarios?
Which of the following BEST supports an accurate asset inventory system?
Which of the following risk register elements is MOST likely to be updated if the attack surface or exposure of an asset is reduced?
Which of the following would present the MOST significant risk to an organization when updating the incident response plan?
Which of the following should be considered FIRST when managing a risk event related to theft and disclosure of customer information?
After a business unit implemented an Internet of Things (IoT) solution, the organization became aware of an emerging risk from the interoperability of IoT devices. Which of the following should be done FIRST in response to this situation?
A cote data center went offline abruptly for several hours affecting many transactions across multiple locations. Which of the to" owing would provide the MOST useful information to determine mitigating controls?
Which of the following is MOST important for a risk practitioner to verify when evaluating the effectiveness of an organization's existing controls?
What should a risk practitioner do FIRST when vulnerability assessment results identify a weakness in an application?
An organization has opened a subsidiary in a foreign country. Which of the following would be the BEST way to measure the effectiveness of the subsidiary's IT systems controls?
What should a risk practitioner do FIRST when a shadow IT application is identified in a business owner's business impact analysis (BIA)?
Who should be responsible for implementing and maintaining security controls?
Which of the following is a risk practitioner's BEST recommendation upon learning that an employee inadvertently disclosed sensitive data to a vendor?
The PRIMARY basis for selecting a security control is:
Which of the following activities would BEST contribute to promoting an organization-wide risk-aware culture?
The PRIMARY objective of testing the effectiveness of a new control before implementation is to: