Which of the following issues found during the review of a newly created disaster recovery plan (DRP) should be of MOST concern?
A risk practitioner has observed that there is an increasing trend of users sending sensitive information by email without using encryption. Which of the following would be the MOST effective approach to mitigate the risk associated with data loss?
Which of the following is the MOST essential characteristic of a good IT risk scenario?
Which of the following is the GREATEST concern associated with redundant data in an organization's inventory system?
Which of the following BEST informs decision-makers about the value of a notice and consent control for the collection of personal information?
Which of the following would be MOST useful to management when allocating resources to mitigate risk to the organization?
Who is accountable for risk treatment?
Which of the following is MOST important to the integrity of a security log?
Which of the following would be the BEST way to help ensure the effectiveness of a data loss prevention (DLP) control that has been implemented to prevent the loss of credit card data?
Senior leadership has set guidelines for the integration of a new acquisition. The guidelines allow for a variation in the level of risk-taking. The variation indicates which of the following risk management concepts?
An organization has just started accepting credit card payments from customers via the corporate website. Which of the following is MOST likely to increase as a result of this new initiative?
Which of the following provides the MOST useful input to the development of realistic risk scenarios?
From a risk management perspective, which of the following is the PRIMARY purpose of conducting a root cause analysis following an incident?
Which of the following is MOST important for a risk practitioner to understand about an organization in order to create an effective risk
awareness program?
The PRIMARY purpose of a maturity model is to compare the:
Who is PRIMARILY accountable for identifying risk on a daily basis and ensuring adherence to the organization's policies?
A risk practitioner has identified that the organization's secondary data center does not provide redundancy for a critical application. Who should have the authority to accept the associated risk?
When reviewing a risk response strategy, senior management's PRIMARY focus should be placed on the:
Which of the following is the PRIMARY responsibility of the first line of defense related to computer-enabled fraud?
A business is conducting a proof of concept on a vendor’s AI technology. Which of the following is the MOST important consideration for managing risk?
Which of the following would BEST assist in reconstructing the sequence of events following a security incident across multiple IT systems in the organization's network?
Which of the following is MOST important to identify when developing generic risk scenarios?
When of the following is the MOST significant exposure when an application uses individual user accounts to access the underlying database?
An organization wants to grant remote access to a system containing sensitive data to an overseas third party. Which of the following should be of GREATEST concern to management?
Which of the following is necessary to enable an IT risk register to be consolidated with the rest of the organization’s risk register?
A business unit is updating a risk register with assessment results for a key project. Which of the following is MOST important to capture in the register?
Which of the following is MOST important for a risk practitioner to consider when determining the control requirements for data privacy arising from emerging technologies?
Prudent business practice requires that risk appetite not exceed:
Who is ULTIMATELY accountable for the confidentiality of data in the event of a data breach within a Software as a Service (SaaS) environment?
Which of the following is the MOST effective way to help ensure future risk levels do not exceed the organization's risk appetite?
When prioritizing risk response, management should FIRST:
A new international data privacy regulation requires personal data to be
disposed after the specified retention period, which is different from the local
regulatory requirement. Which of the following is the risk practitioner's
BEST course of action?
Which of the following methods is the BEST way to measure the effectiveness of automated information security controls prior to going live?
Which of the following is the MOST important consideration when identifying stakeholders to review risk scenarios developed by a risk analyst? The reviewers are:
The PRIMARY benefit of selecting an appropriate set of key risk indicators (KRIs) is that they:
Which of the following is the GREATEST concern associated with insufficient focus on addressing blockchain interoperability in the SDLC?
A business unit has implemented robotic process automation (RPA) for its
repetitive back-office tasks. Which of the following should be the risk
practitioner's GREATEST concern?
Which of the following is the MOST important objective from a cost perspective for considering aggregated risk responses in an organization?
Who should be accountable for ensuring effective cybersecurity controls are established?
Which of the following provides a risk practitioner with the MOST reliable evidence of a third party's ability to protect the confidentiality of sensitive corporate information?
When classifying and prioritizing risk responses, the areas to address FIRST are those with:
A risk owner has accepted a high-impact risk because the control was adversely affecting process efficiency. Before updating the risk register, it is MOST important for the risk practitioner to:
Following a review of a third-party vendor, it is MOST important for an organization to ensure:
A web-based service provider with a low risk appetite for system outages is reviewing its current risk profile for online security. Which of the following observations would be MOST relevant to escalate to senior management?
The MOST effective approach to prioritize risk scenarios is by:
Which of the following would be MOST relevant to stakeholders regarding ineffective control implementation?
An organization has outsourced a critical process involving highly regulated data to a third party with servers located in a foreign country. Who is accountable for the confidentiality of this data?
The PRIMARY reason to have risk owners assigned to entries in the risk register is to ensure:
An organization has operations in a location that regularly experiences severe weather events. Which of the following would BEST help to mitigate the risk to operations?
The analysis of which of the following will BEST help validate whether suspicious network activity is malicious?