Which of the following BEST supports ethical IT risk management practices?
An organization has implemented a cloud-based backup solution to help prevent loss of transactional data from offices in an earthquake zone. This strategy demonstrates risk:
A vendor’s planned maintenance schedule will cause a critical application to temporarily lose failover capabilities. Of the following, who should approve this proposed schedule?
When determining which control deficiencies are most significant, which of the following would provide the MOST useful information?
Key control indicators (KCls) help to assess the effectiveness of the internal control environment PRIMARILY by:
It is MOST important that entries in an organization’s risk register be updated:
What is the MAIN benefit of using a top-down approach to develop risk scenarios?
Which of the following trends would cause the GREATEST concern regarding the effectiveness of an organization's user access control processes? An increase in the:
Which of the following is MOST important to the integrity of a security log?
A business impact analysis (BIA) enables an organization to determine appropriate IT risk mitigation actions by:
Which of the following is the BEST indication that an organization's risk management program has not reached the desired maturity level?
A company has located its computer center on a moderate earthquake fault. Which of the following is the MOST important consideration when establishing a contingency plan and an alternate processing site?
Which of the following activities is a responsibility of the second line of defense?
When performing a risk assessment of a new service to support a ewe Business process. which of the following should be done FRST10 ensure continuity of operations?
A failure in an organization’s IT system build process has resulted in several computers on the network missing the corporate endpoint detection and response (EDR) software. Which of the following should be the risk practitioner's IMMEDIATE concern?
Which of the following should be done FIRST when developing a data protection management plan?
A control process has been implemented in response to a new regulatory requirement, but has significantly reduced productivity. Which of the following is the BEST way to resolve this concern?
During the creation of an organization's IT risk management program, the BEST time to identify key risk indicators (KRIs) is while:
In which of the following system development life cycle (SDLC) phases should controls be incorporated into system specifications?
Which of the following would be MOST relevant to stakeholders regarding ineffective control implementation?
An IT risk practitioner has determined that mitigation activities differ from an approved risk action plan. Which of the following is the risk practitioner's BEST course of action?
It is MOST important for a risk practitioner to have an awareness of an organization s processes in order to:
In an organization that allows employee use of social media accounts for work purposes, which of the following is the BEST way to protect company sensitive information from being exposed?
Which of the following will BEST support management repotting on risk?
Of the following, who should be responsible for determining the inherent risk rating of an application?
From a risk management perspective, which of the following is the PRIMARY purpose of conducting a root cause analysis following an incident?
Which of the following is MOST likely to cause a key risk indicator (KRI) to exceed thresholds?
Which of the following is the PRIMARY risk management responsibility of the second line in the three lines model?
Which of the following should be the PRIMARY consideration when assessing the risk of using Internet of Things (loT) devices to collect and process personally identifiable information (Pll)?
An IT risk practitioner has been asked to regularly report on the overall status and effectiveness of the IT risk management program. Which of the following is MOST useful for this purpose?
In which of the following scenarios would a risk practitioner be required to provide the MOST justification for a risk assessment?
To effectively address ethical risk within an organization, who MUST ensure the ethics policy is enforced and equally applied to all levels of authority'?
Which of the following is the BEST indicator of executive management's support for IT risk mitigation efforts?
Which of the following will be the GREATEST concern when assessing the risk profile of an organization?
Which of the following is the BEST approach for determining whether a risk action plan is effective?
Which of the following is MOST helpful in identifying new risk exposures due to changes in the business environment?
Which of the following is the MOST important driver of an effective enterprise risk management (ERM) program?
Which of the following is MOST important to the successful development of IT risk scenarios?
Which of the following is the BEST way to support communication of emerging risk?
Which of the following is MOST important for a risk practitioner to verify when evaluating the effectiveness of an organization's existing controls?
After an annual risk assessment is completed, which of the following would be MOST important to communicate to stakeholders?
An organization recently implemented an automated interface for uploading payment files to its banking system to replace manual processing. Which of the following elements of the risk register is MOST appropriate for the risk practitioner to update to reflect the improved control?
When developing IT risk scenarios, it is MOST important to consider:
A new international data privacy regulation requires personal data to be
disposed after the specified retention period, which is different from the local
regulatory requirement. Which of the following is the risk practitioner's
BEST course of action?
Which of the following situations would BEST justify escalation to senior management?
A newly enacted information privacy law significantly increases financial penalties for breaches of personally identifiable information (Pll). Which of the following will MOST likely outcome for an organization affected by the new law?
Which of the following roles is BEST suited to help a risk practitioner understand the impact of IT-related events on business objectives?
Which of the following is the GREATEST benefit when enterprise risk management (ERM) provides oversight of IT risk management?
Which of the following is the MOST important consideration when performing a risk assessment of a fire suppression system within a data center?
Which of the following findings of a security awareness program assessment would cause the GREATEST concern to a risk practitioner?